Security Flaw In Fisher Price “Smart Toys” Could Have Left Info For Children, Parents Vulnerable

Security Flaw In Fisher Price “Smart Toys” Could Have Left Info For Children, Parents Vulnerable

Once upon a time, teddy bears were simple, cute, cuddly friends for youngsters. Today, the seemingly benign toys can talk, hold a conversation, and give away your personal information. Or at least that’s what security experts are saying about the Smart Toy stuffed bear from Fisher Price.
[More]

If Your Password Is On This List, It’s Time To Change It

If Your Password Is On This List, It’s Time To Change It

We get it. Maybe you revived your childhood obsession with Star Wars. But don’t extend that fandom to your password, or you could end up welcoming in… the dark side. And by that, we mean anyone who happens to look at the list of 2015’s Worst Passwords. [More]

“Artisanal Spam” Is Today’s Sneaky New Trend In Email Scams

“Artisanal Spam” Is Today’s Sneaky New Trend In Email Scams

Because we live in a world where everything trendy is farm-to-table, or handcrafted, or whittled by free-trade fairies from reclaimed wood, we’re not entirely surprised that the new thing in email scams is something called “artisanal spam.” [More]

When It Comes To Privacy, Some Americans Are Willing To Negotiate

Rich Renomeron

We recently wrote about the apparent reluctance of drivers to join auto insurance programs that could save them money in exchange for giving up some of their privacy. While many people want little to do with this sort of tracking, there are still a large number of consumers who don’t take such a hardline stance and are willing to consider ceding their privacy if they receive some benefit in return. [More]

3 Common Misconceptions & 1 Important Truth About Privacy Policies

Jason Cook

It’s right there, somewhere. Buried deep in a menu under “legal” in an app, or lurking somewhere in the footer of a website that never seems to stop adding content while you scroll. Each of us encounters dozens of them every day and yet most of us never give any thought to them. It is, of course, the privacy policy. [More]

(Photo: Shelly Slater on Twitter)

In Wake Of Storms, Don’t Be Taken In By Home-Repair Scams Or Fake Charities

Over the weekend, tornadoes ripped through the Dallas area, rending homes into piles of wood and destroying lives. Additionally, bad weather in the region resulted in damage to the property of countless other Americans. We can understand the desire to get your life back in order immediately — or to donate money to help victims — but don’t let yourself be taken in by unscrupulous scammers. [More]

Lawmaker Questions Airlines, Plane Manufacturers On Cybersecurity Measures

Lawmaker Questions Airlines, Plane Manufacturers On Cybersecurity Measures

Eight months after a government report found that airplanes with WiFi connections may be vulnerable to cyber attacks and seven months after a hacker claimed to have commandeered a United Airlines flight via the plane’s in-flight entertainment system, one lawmaker wants to know just what airlines are doing to protect their computer systems — and passengers.  [More]

Adobe Joins Its Critics, Tells People Not To Use Flash

Adobe Joins Its Critics, Tells People Not To Use Flash

After years of critics piling on top of Adobe Flash for its track record as one of the buggiest, crashiest (now a word), least secure, most vulnerable pieces of software ever to hit the web, Adobe itself is siding with its detractors (including Google, Amazon, Facebook and Firefox, etc.), and is letting everyone know they should stop using Flash. No, really. [More]

(Renata Prazeres)

Some Dell Laptops Shipping With Big Security Flaw Pre-Installed

There are millions of Dell laptops out there in the world; businesses buy them by the tens of thousands and plenty of home consumers use them too. And unfortunately, that means there are millions of laptops out there with a big fat security hole that could allow mischief-makers and would-be-thieves a way to access users’ private, theoretically secure data. [More]

You Can Record Movies Off Netflix, Or Music Off Spotify, But You’re Not Allowed To

Don Buciak II

Once upon a time, in the long-long ago bygone years of the 20th century, teenagers communicated their feelings through a medium known as the mix tape. Those of us who can remember tape cassettes can remember hitting “record” on a boom box at exactly the right moment when a favorite song started on the radio or, as the ’90s waned into the shadow of Y2K, recording tracks off a bunch of CDs into one themed tape to play in the car or slip into the hand of a not-so-secret crush. [More]

(Flyinace2000)

Banks Ditching Online Security Images Some Experts Call “Worse Than Useless”

When you log into your bank account online, you might see an image of a birdhouse, or a teapot, or some other object you selected when you signed up. Those pictures are supposed to help keep a customer’s account safe, by assuring them that the web page they’re viewing is, in fact, the bank’s website and not a scammy fake. But as cybercriminals are catching on, banks are choosing to ditch the images in favor of other security measures. [More]

Copyright Office Rules: Yes, Security Researchers May Hack Cars (And A Couple Other Things) For Science

Copyright Office Rules: Yes, Security Researchers May Hack Cars (And A Couple Other Things) For Science

Copyright law is surprisingly pervasive. It affects everything from computers to cars (and tractors). The law says you’re not allowed to circumvent DRM on anything for any reason… except for a big pile of things you actually legally can. Those exemptions get re-evaluated every three years, and today the new list is out. [More]

Security Researcher Successfully Steals Home WiFi Passwords By Hacking Into Tea Kettles

Security Researcher Successfully Steals Home WiFi Passwords By Hacking Into Tea Kettles

While it might be super convenient to have everything in your home connected to the Internet, that interconnectivity can also give attackers a chance to sneak in through seemingly innocent devices. Take the humble tea kettle: a security researcher in England has been hacking into smart kettles across the country and gaining access to private WiFi networks. [More]

Tech Company Central To Samsung Pay’s System Breached, Consumer Info Not Targeted

Tech Company Central To Samsung Pay’s System Breached, Consumer Info Not Targeted

Mobile payment software company LoopPay – which provides much of the nuts and bolts for Samsung Pay – announced Wednesday that it became the victim of a hack attack back in March. Despite the breach, Samsung and its smaller subsidiary assured users of its mobile payment system their information was never at risk.  [More]

California Realizes Maybe It’s Not Such A Good Idea To Print Full Social Security Numbers On Mailed Documents

California Realizes Maybe It’s Not Such A Good Idea To Print Full Social Security Numbers On Mailed Documents

Earlier this year, a California state agency was heavily criticized for tempting identity thieves by printing full Social Security numbers on millions of documents it mailed out to state residents. Making matters worse, the agency didn’t really seem to understand why this might be a problem. After a few months to think about it, the bureaucrats appear to have finally come around. [More]

Crowdfunding Site Patreon Hacked, 15GB Of Donor Info Dumped Online

Crowdfunding Site Patreon Hacked, 15GB Of Donor Info Dumped Online

Patreon, a website that allows donors to give regularly to sites, artists, projects and other creators, yesterday evening that it’d been hit by a hack attack that accessed some registered names, email addresses and mailing addresses. And according to reports, 15GB of data was then dumped online, exposing information about donors and the projects they’ve funded. [More]

When Attempting To Shoplift From Walmart, Be Careful To Not Stab Yourself

When Attempting To Shoplift From Walmart, Be Careful To Not Stab Yourself

As always, we do not in any way condone shoplifting. Not just because it drives up retail prices for the rest of us, or causes stores to resort to overzealous security measures, or because it wastes the time and resources of police who probably have more important crimes to investigate. It can also land you in the hospital with a self-inflicted shoplifting-related wound. [More]

Senators Ask Automakers For Update On Cybersecurity Protection Measures

Senators Ask Automakers For Update On Cybersecurity Protection Measures

Following a string of high-profile incidents in which researchers were able to hack into – and in some cases take control of – a vehicle through its entertainment systems, lawmakers have renewed their push to ensure car manufacturers are adequately protecting consumers from such attacks. [More]