Advanced indeed! Anything that can remain undetected in the wild for five years has some kind of stealth. This is software for espionage. Read the story... … [Read more...]
I Spy on My Own Wi-Fi
Ever wonder if someone is poaching on your Wi-Fi or worse, trying to hack your network? Here is how to see who and what is connected to your Wi-Fi. Read on... … [Read more...]
Pentagon Launches the Feds’ First ‘Bug Bounty’ for Hackers
Of course you must break several parts of the Computer Fraud and Abuse Act to find these bugs, but what the h377 - it's only the Pentagon! Pentagon Launches the Feds’ First ‘Bug Bounty’ for Hackers … [Read more...]
Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid
Is Ukraine's power system any more vulnerable than ours? Maybe, or maybe not. Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid … [Read more...]
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
In one of my posts yesterday, I said that ransomeware did not seem to be out to steal your information, but that could change. Well, it has changed. Here is a report of the most opportunistic malware I've seen. You want to be particularly careful if you do banking from your phone or tablet as this … [Read more...]
Hacker Lexicon: A Guide to Ransomware, the Scary Hack That’s on the Rise
Both businesses and individuals get caught by this malware. Entire networks can be encrypted. The perpetrators are not out to steal your info, although that could become a bonus in this enterprise. This is all about lots of fast money and it works. If this malware hits your system, in all … [Read more...]
February 18th – Single Board Computer Workshop
In February, we’ll look at some purpose-built Linux distributions available for the Raspberry Pi. Our January meeting was devoted to two projects. First we discussed how my fuel oil tank gauge had failed in testing. When the transducer head of the distance sensor was located in the pipe, the … [Read more...]
Internet Security – July 2015
By Richard Teasdale DACS broke new ground at the July General meeting, with a speaker who was remote from the audience. Ira Wilsker, an expert on Internet Security, spoke to us for over an hour from Texas, on the threats to the United States posed by hackers based in China and elsewhere. As Ira … [Read more...]
Secure Digital Communications
Presenter: Bruce Preston Date: Tuesday, November 4, 7 p.m. Location: Danbury Hospital Auditorium Have you ever wondered how private and personal information can be exchanged between your computer and a remote site such as a bank or an on-line retailer? The answer is that it is done by way … [Read more...]