A Michigan woman is suing a police officer who used the baby monitor app on her fiance’s cell phone that he confiscated when the fiance was arrested, to spy on her while she was nude and breastfeeding her son. Note that nothing has been proved yet, so this is only claims and allegations, but it points […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Authorities in L.A. obtained a search warrant compelling the girlfriend of an alleged gang member to press her finger on an iPhone to unlock it because they wanted to see what was in it. Whether this violates the 5th amendment or not is in dispute and this was an L.A. court – likely a district […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the security research community (and me) has been saying for years, the Internet of Things is really an Internet of insecurity and researchers have now demonstrated that in a noisy way. Researchers at the University of Michigan and Microsoft (yes, really, THAT Microsoft) have published a paper that they are going to present at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Motherboard is reporting that over 7 million user accounts belonging to the Minecraft community “Lifeboat” are for sale. Security researcher Troy Hunt is loading the data onto his web site “Have I been Pwned?” so that people can check if there data was in hacked group. Lifeboat runs servers for custom multiplayer editions of Minecraft […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As could be expected, the Wendy’s data breach saga continues. A proposed class action lawsuit was filed by a credit union in Pittsburgh representing all banks who were affected by the breach. As reported by Brian Krebs in March, credit unions said that they saw a rise in fraudulent credit card use that was greater […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Blackberry CEO John Chen said that tech companies must balance customer privacy with lawful government interests. The translation of this is “we have given the Blackberry keys to a variety of governments”. And we only THOUGHT that Blackberrys were secure. One point that is important to understand is that for companies that have their own […]
Continue reading →
[DISPLAY_ACURAX_ICONS]