Category: Security

New and Hopeful Breakthroughs in Touch Based Password Security

Scientists at the University of Washington think they have stumbled onto a technology that will render your passwords virtually un-hackable. How? By using passwords that are able to be sent through the human body, with the use of low-frequency transmissions. Scientists believe that by reversing the same system used in fingerprint scanners, they can create viable transmissions on the body that will make room for a more secure sensor lock …
[Read More]

Europol Releases the 2016 Internet Organized Crime Threat Assessment

The Europol’s newest report, the 2016 Internet Organized Crime Threat Assessment, was released yesterday. The report cites that due to the increase in cyber criminals using sophisticated tools, it has become more difficult for law enforcement to apprehend these criminals. The Europol’s report covers what different types of Malware have been released, child-related internet threats, payment fraud, and data breaches. It also contains tips for the general public on how …
[Read More]

Mass Gmail and iCloud Hacker Pleads Guilty to Charges

Edward Majerczyk, 28, of Chicago plead guilty to hacking and illegally gaining access to over a hundred people’s private emails and iCloud accounts. Reports say that over 30 celebrities were hacked as well. Majerczyk’s official charge was computer fraud, and was issued in an Illinois Federal Court. Between November 2013 and August 2014,  Majerczyk operated a phishing scheme by sending fraud emails that appeared to be from the victims’ Internet …
[Read More]

Microsoft Announces the Launch of Project Springfield

Microsoft’s newest venture, Project Springfield, has been revealed. It uses in-house testing technology for Windows and Office apps, as well as using whitebox fuzzing technology to sniff out flaws that lead to crashes. Microsoft started testing a cloud-based bug detector. Microsoft is calling Project Springfield one of its most advanced tools when it comes to finding potentially harmful vulnerabilities. The project uses whitebox fuzzing. This technology is reported to have …
[Read More]