Infosecurity Slackspace

  1. Cybercriminals Look for a World Series Home Run

    The World Series can be a hook to attack consumers through phishing, texts with dangerous links and insecure Wi-Fi networks.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  2. Queens Man Pilfers $1Mn in Apple Gift Cards

    Profit allegedly was asked by shady higher-up operatives to re-code generic gift and prepaid cards.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  3. Hoverboards and Wearables: What Back to the Future Day Says About Security

    Marty McFly's journey is a cautionary tale for security—as in, be prepared for anything, even things that may not yet exist.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  4. Insecure Employees, Like Serial Killers, Look Just Like Everyone Else

    Like serial killers, the people that pose the most threat just seem like normal folks.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  5. Spy Gear to Thwart Piracy for Next James Bond Film

    Cinema pirates hide their recording devices in holes cut into popcorn cartons or cover their phones with a sock to hide the lit screen.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  6. Arms Dealer Offers $1m for iPhone Exploits

    Zerodium wil pay up to three teams the full amount for working exploits that can compromise Apple iOS 9 -- which it will then sell to the highest bidder

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  7. Chatbot Rose Takes on the Turing Test--and Wins Bronze

    Rose has a fun West Coast personality and a complicated family history--and for a while, convinced judges she was human.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  8. The Facebook Dislike Button: Negative and Spam-Inducing

    Because of the interest around going negative, scam artists have predictably targeted those who would love love LOVE to be early adopters.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  9. Self-Driving Cars, in Mordor Where the Shadows Lie

    A world where cars are 100% controlled via a network that’s open to the internet offers opportunities for a cyber-age Sauron.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  10. Today's Technology Babysitter: Any Different From Yesterday's?

    Kids spend twice the time in front of a screen than they spend on active play. But is this anything new?

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  11. World War II Dead Pigeon Code: Cracked?

    Homing pigeons were used to carry coded messages to and from England and friendlies in Nazi-occupied territories like France.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  12. Uber Picks Up Jeep-Hackers Charlie Miller and Chris Valasek

    The pair, who hacked a Jeep and prompted a 1.4-million-vehicle recall last month, have been hired to help develop self-driving cars

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  13. Shameless: Smart City Wi-Fi Blocks Personal Hotpots

    Users were forced instead to buy a Smart City pass at conventions and meetings for the not-so-low price of $80 per day.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  14. What Happens to Data When Cloud Services Say Goodbye?

    Cloud storage service Wuala has announced that it’s closing, and that all of the data that it keeps for its customers will be deleted.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  15. VW Hushed Up Auto Security Flaw for TwoYears

    The flaw allows keyless theft of more than 100 car models, including cars from Audi, Citroën, Fiat, Honda, Volvo and VW itself.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  16. Sex Offenders Cyber-Flash via Apple Airdrop

    “Cyber-flashing” is the modern-day version of the creepy naked dude in a trench coat.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  17. Hardcore Porn Hijacks Brazil Bus Station

    Hackers gave rush-hour travelers more than an eyeful.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  18. Oracle CSO's Tone-Deaf Rant on Bug-Hunting Both Patronizing and Misguided

    Her basic point is that independent security consultants shouldn’t go a-bug-hunting, because vendors know best.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  19. hitchBOT: A Lesson in American Callousness?

    Armed with an outstretched thumb, a smiling LED face and written instructions for random passersby, the bot was 'murdered' on his way across the States.

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  20. Biometrics: Swapping Privacy for Sort-of Security

    Can we really envision a time when a full-body scan that maps out your veins is considered the norm when, say, opening up a new checking account?

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

What’s hot on Infosecurity Magazine?