What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

Spectre / Meltdown
Just when you thought it was impossible to use a connected device without getting hacked, 2018 arrives with the discovery of an entirely new class of network vulnerability built into the processors of virtually every computing device in active consumer and business use. Two distinct hardware flaws -- dubbed "Meltdown" and "Spectre" -- were recently disclosedby white hat researchers. They did this responsibly. The hackers first...
computer nightmare
If you think 2017 was bad, hold on for dear life because 2018 is going to be the worst yet when it comes to cyberattacks. The astounding amount of personal information "out there" coupled with criminal innovation will allow cyber incursions of unprecedented scale and sophistication. There is a confluence of intractable forces informing this prediction. First, the headline-grabbing data breaches of 2017 cap a five-year run...
UC Browser
Owned by the Alibaba Group, the UC Browser was developed by the Chinese mobile Internet company UCWeb to compete with Google’s Chrome browser, and it’s doing just that, specifically on lower-end smartphones that are dominating Asian markets. Size is everything here. Most phones in the emerging markets of Asia have between 8 and 12 GB of storage—compared to phones sold...
Spectre Meltdown
The Meltdown and Spectre vulnerabilities that were revealed after the New Year have been the talk of the cybercommunity, and for good reason. The problem, if exploited, would be capable of breaking down basic security partitions by targeting a design feature in chips manufactured by Intel, AMD and ARM. First, don’t panic. The vulnerability may have existed for 20 years....
Apple Spectre Vulnerability
Apple admitted yesterday that all Macs and iOS devices are affected by the Meltdown and Spectre chip bugs, a massive vulnerability that was discovered by Project Zero, a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. While it was assumed among cybersecurity experts that the vulnerability extended to Apple, the announcement confirmed it. At issue are...
Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight. Assume for the moment that, unlike most people, you think a lot...
Spam
Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous. There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away...
The announcement of a sixth subterranean nuclear test has the world talking about how to contain the threat of a nuke-ready North Korea, but there is another concern getting insufficient attention: the potential for full spectrum cyber war. Just what that might look like is known, but seldom discussed. Remember the NASDAQ flash crash? It happened on May 6, 2010, at...
The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about. It’s crucial we give this latest market exuberance a...
From mid-May to July, 143 million U.S. consumers were more vulnerable to hackers than usual. Or rather, they were actively vulnerable. Equifax, one of the three major consumer credit reporting agencies, reported that the company had suffered a massive data compromise that exposed their customers' Social Security numbers, drivers license numbers and other sensitive personally identifiable information. In a statement, they...