CNET

About CNET

This author has not yet filled in any details.
So far CNET has created 141 blog entries.

Usernames, Passwords Leaked For Uber, Fitbit, OKCupid Among Websites Hit By Security Bug

SAN FRANCISCO - Usernames and passwords leaked onto the open internet earlier this month because of a security bug that affected 3,400 websites, including popular services like Uber, Fitbit and OkCupid. You wouldn't mind if someone could break into the personal accounts you use to track your movements, your fitness and your love life, would

By |2017-03-02T16:57:49-05:00March 2nd, 2017|Cyber Defense|

U.S. Visitors May Be Asked To Give Up Social Media Passwords To Border Agents

WASHINGTON DC - Visitors to the US might be asked to relinquish their social media passwords to border agents as part of an attempt to tighten security checks. "We want to get on their social media, with passwords: What do you do, what do you say?" Homeland Security Secretary John Kelly told the House Homeland

By |2017-02-09T18:23:51-05:00February 9th, 2017|Cyber Defense|

New CIA Director Pompeo Wants To Track Info From Social Media Accounts

WASHINGTON DC - Rep. Mike Pompeo will lead the Central Intelligence Agency, after the US Senate confirmed his nomination Monday evening in a vote of 66 to 32. Pompeo, a graduate of West Point and Harvard Law, currently represents Kansas in the House of Representatives. Casting some of those no votes were senators who raised

By |2017-01-26T19:52:23-05:00January 26th, 2017|Cyber Defense, Social Media|

Facebook Now Lets You Lock Down Logins With Hardware Token – A Key

SAN FRANCISCO - If you're worried someone's trying to hack into your Facebook account, now you can lock it up with a key. On Thursday, the social media giant said it would let users link a hardware token to their accounts. When you log in from new browsers or geographic regions, you can plug the

By |2017-01-26T19:52:23-05:00January 26th, 2017|Cyber Defense|

Your Eyes Will Unlock Your Computer Devices, Smartphone By 2018

SAN FRANCISCO - Future passwords could be more secure than anything you type, and all you'll have to do is look at your device's iris scanner to unlock it. Your eyes would serve as a more secure form of biometric security than your fingerprints, which hackers have been known to fool with high-resolution photos. The

By |2016-12-21T20:46:03-05:00December 21st, 2016|Cyber Defense, Featured|

Malls Should Just Name Their Public Wi-Fi networks Danger – Same Thing

SAN FRANCISCO - Evan Robertson won his school science fair this year by proving just how thoughtless people can be on public Wi-Fi networks. Evan, now 11, programmed fake Wi-Fi portals and took them to food courts shopping centers across the Austin, Texas, area and waited to see how many agreed to some pretty outrageous

By |2016-12-08T19:04:38-05:00December 8th, 2016|Cyber Defense|

Federal Investigators Can Hack Computers With Magistrate Approval – Privacy Advocates Call It Big Brother Watching

WASHINGTON DC - Starting Dec. 1, federal investigators can seek permission from a magistrate to plant hacking software on a computer that’s disguising its location. The change affects Rule 41 of the Federal Rules of Criminal Procedure, which are proposed by the US Department of Justice and approved by the US Supreme Court. This form

By |2016-12-01T21:14:57-05:00December 1st, 2016|Cyber Defense|

Massive DDoS Attack Friday – Your IoT Device Could Have Been Involved

SAN FRANCISCO - If you've never heard of a DDoS attack before, you could be forgiven for wondering what the frak was going on Friday as half your favorite websites stopped working. The acronym stands for "distributed denial of service attack," which is technical speak for a simple but increasingly powerful tool for knocking websites

By |2016-10-24T08:50:54-04:00October 24th, 2016|Cyber Defense, Featured|

Despite Russian Hackers Best Efforts, National Election Results Will Be Accurate

WASHINGTON DC - Russian hackers are attempting to alter the outcome of the US national election by tampering with voter registration databases with the simple goal of undermining confidence in one of the most contentious presidential elections in history. But cybersecurity experts said actually altering results is impossible because voter registration databases are not the

By |2016-10-13T21:15:39-04:00October 13th, 2016|Cyber Defense, Featured|