Hacking Continues: European Central Bank Is the Latest Victim

FindLaw columnist Eric Sinrod writes regularly in this section on legal developments surrounding technology and the Internet. WHEN WILL IT stop? We have been hearing about cyberhacking for years, and rather than hack attacks dropping out of the news, we continue to be inundated with reports of successful hacks. This time the latest victim is…

70 Percent of IoT Devices Vulnerable to Cyberattacks: HP

A new study published by HP on Tuesday reveals that 70% of the most popular Internet of Things (IoT) devices contain serious vulnerabilities. The company used its HP Fortify on Demand application security testing service to check ten of the most commonly used IoT devices and their cloud and mobile application components. The list includes…

Security: The Ultimate Balancing Act

The phrase “balls to the wall” is one that has been co-opted to mean things you wouldn’t want to discuss with your grandmother. But in its original context, it referred to a centrifugal governor used on steam engines to regulate a consistent speed, regardless of the load placed on the machine. The way it worked…

Tor Warns of Attack Attempting to Deanonymize Users

The Tor Project has disclosed details of an attack which appeared to be an attempt to deanonymize users of the popular anonymity network. According to Tor Project Leader Roger Dingledine, the attack was detected on July 4 while the organization was trying to identify attacks leveraging a method discovered by researchers at Carnegie Mellon University’s…

Facebook Attack Redirected Users to Notorious Exploit Kit

Facebook has removed a scam that was redirecting users to the Nuclear exploit kit, according to researchers with Symantec. The scam relied on users getting drawn into clicking on a link promoting a work-from-home opportunity with the headline: ‘EXPOSED: Mom Makes $8,000/Month and You Won’t Believe How She Does It!’ "If people believe these jobs…