Sign Up Now!

Sign up and get personalized intelligence briefing delivered daily.


Sign Up

Articles related to "security"


A Dutch YouTuber and his friend were arrested and jailed when they tried getting near Area 51

  • Ties Granzier, 20, and Govert Charles Wilhelmus Jacob Sweep, 21, were arrested about three miles deep into the Nevada National Security Site, the Nye County Sheriff's Office said.
  • When arrested September 10, both men told deputies they could read, write and speak English and had seen the 'No Trespassing' signs at the entrance of the site.
  • Deputies found cameras, a phone, a laptop and a drone in the men's vehicle.
  • The two pleaded guilty to trespassing and illegal parking, both misdemeanors, Nye County District Attorney Chris Arabia said.
  • But that sentence was suspended and the two will spend a total of three days in the county jail if they pay a fine of $2,280 each on Thursday -- when they're scheduled to be released.
  • They have additionally given up the electronic equipment found at the time of their arrest, Arabia said.

save | comments | report | share on


How users and applications stay safe on the Internet: it's proxy servers all the way down

  • Thanks to tracking cookies, browser fingerprinting, Internet Service Providers (ISPs) selling our browsing logs to advertisers, and our own inexplicable inclination to put our names and faces on social networks, online anonymity is out like last year’s LaCroix flavours.
  • This provides us with some anonymity, as the website we’re trying to reach will not see our originating IP address; however, the proxy server that we choose to use will know exactly who originated the request.
  • My preferred method, if we have a little time and a few monthly dollars to invest in our security, is to set up our own virtual instance with a company such as Amazon Web Services or Digital Ocean and use this as our proxy server.

save | comments | report | share on


All the privacy issues Apple didn’t talk about at its annual event, and why they matter

  • That seems incongruous for a company that ran a giant billboard ad proclaiming, “What happens on your iPhone, stays on your iPhone,” particularly given that consumers value personal data protection more than ever amidst the seemingly never-ending stream of leaks, hacks, and missteps.
  • To keep consumers hooked on its newest services like Apple Arcade and Apple TV+, the company will no doubt want to analyze our behavioral data.
  • Apple’s announcement wasn’t just a bid for our wallets but also for our data: Use an iPhone to capture all your personal moments, make an iPad your primary computing device, watch all your entertainment through Apple TV and Apple TV+, and let Apple Watch track and analyze your health stats.
  • If the company wants consumers to trust it with some of their most sensitive data, it needs to earn that trust through words and actions and live up to its stated belief that privacy is a fundamental human right.

save | comments | report | share on


#discussIf you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

  • I would personally start by auditing server and database access, before delving into the code of the app and database queries themselves.
  • Also, if you need development access to the database (I wouldn't recommend for production, but sometimes it can't be avoided), never accept the case of "easy access" which will add security vulnerabilities.
  • After the security of access is resolved, I would focus on more codebase stuff, like ensuring that there are no user accounts or connection strings password in the code, as these can be resolved by using local environment variables on the host machines.
  • If you are good on all the mentioned fronts, continue testing the app to most common attack types (like SQL injection and XSS), and especially focus on testing API responses, with and without authentication.

save | comments | report | share on


Hillary Clinton issues dire warnings about election integrity to Democratic 2020 hopefuls

  • Washington (CNN) - Hillary Clinton said Tuesday she has spoken with many of the 2020 Democratic presidential candidates and warned them about voter suppression and hacking, which she has blamed for her 2016 election loss to Donald Trump.
  • In the weeks leading up to the 2016 election, WikiLeaks began releasing emails stolen from the personal account of Clinton campaign chairman John Podesta, who was spammed with a link that appeared to come from Google as a security notification but led Podesta to a GRU-created website.
  • Clinton indirectly referred to that effort as she discussed on Tuesday her warnings to Democrats.
  • In April, CNN reported that Department of Homeland Security officials and senior leaders have had difficulty getting the White House to pay attention to threats of Russian election interference.

save | comments | report | share on


How users and applications stay safe on the Internet: it's proxy servers all the way down

  • Thanks to tracking cookies, browser fingerprinting, Internet Service Providers (ISPs) selling our browsing logs to advertisers, and our own inexplicable inclination to put our names and faces on social networks, online anonymity is out like last year’s LaCroix flavours.
  • This provides us with some anonymity, as the website we’re trying to reach will not see our originating IP address; however, the proxy server that we choose to use will know exactly who originated the request.
  • My preferred method, if we have a little time and a few monthly dollars to invest in our security, is to set up our own virtual instance with a company such as Amazon Web Services or Digital Ocean and use this as our proxy server.

save | comments | report | share on


The drone attack on Saudi Arabia means the one-way pain of the war on terror is over

  • But there is a danger of complacency when the United States has the world's most formidable and best-equipped military.
  • When the United States gives full support to Saudi Arabia in its relentless air campaign against Houthi forces in Yemen, is there a tacit belief that the pain would largely run only one way?
  • Despite the shrill rhetoric about the Iranian threat, did US decision-makers actually believe that Iran, a middle-level power with very limited military capabilities, would or could do real damage to US interests?
  • Was there also a realization that the United Arab Emirates, one of the strongest US allies in the Persian Gulf and the host of the base where the drone flight originated, might have to pay a price for a US action taken without UAE permission?
  • As other forces begin to master the relatively inexpensive technology of drone warfare, the assumption of total air superiority by the United States and its allies is going to be challenged.

save | comments | report | share on


Trump has already told us who his new national security adviser will be

  • Because what Trump said about the national security adviser job echoes past statements he's made about other key openings in his administration.
  • There's a clear pattern here: Trump views himself as the only indispensable member of his administration, the person who makes all the calls because he knows more about any given subject than the so-called experts and because, well, he's the President and they're not.
  • But, there are a whole lot of smaller decisions that happen 1,000 times a day across government that a president should leave to the true experts in the field.
  • Because Trump believes himself to be an expert in every field -- and because he is deeply concerned about the image that he is not totally in charge -- he tries to make all sorts of calls and decisions that in past administrations were left to cabinet secretaries and senior staff.

save | comments | report | share on


Edward Snowden says he would like to return to the US if he is guaranteed a fair trial

  • Washington (CNN) - Edward Snowden, who has been living in exile in Russia after leaking American intelligence secrets in 2013, said Monday that he would like to return to the United States if he is guaranteed a fair trial.
  • Snowden, a former US National Security Agency contractor, is accused of espionage and theft of government property in the US for leaking volumes of information on American intelligence and surveillance operations to the media.
  • Snowden settled in Moscow after initially traveling to Hong Kong following his 2013 public disclosure of the classified information.
  • In 2015, Snowden indicated that he is willing to go to prison if he is permitted to return to the United States.
  • In the final weeks of the Obama administration, more than a million supporters petitioned the White House to pardon Snowden, but the administration said he hadn't submitted official documents requesting clemency.

save | comments | report | share on


Future demand for elderly care services like assisted living & in-home care are rife for digital disruption

  • As the Baby Boomer population ages, society is on the cusp of dealing with an unprecedented number of senior citizens who will need elder care.
  • An intensifying shortage of US home health aides and physicians, a booming senior population, and the prevalence of chronic illnesses all point to a need for transformative solutions when it comes to senior care services.
  • Depending on the source you check, one becomes a senior citizen at different ages.
  • According to Medicare, you become a senior at age 65.
  • Regardless, senior care takes many forms in the U.S. One of the most common types is assisted living, sometimes known as senior living or more colloquially as "a home." As the name implies, these locations assist people who cannot or choose not to live on their own.

save | comments | report | share on