Darlene StormComputerworld

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Army of Fake Social Media Friends to Promote Propaganda

Does a code of ethics still exist in Intelligence firms? Does it disappear behind closed doors, dirty deeds done in the dark and used against the American people who are supposed to be free to express themselves?

2011: The Year of Epic Hacking

Millions of passwords have been breached and when information that is supposed to be private becomes public, it can open the way to identity theft.

Attack of the Killer Widgets?

Widgets are used by millions of legitimate websites to deliver content and advertising. But attackers are using widgets for evil intent and infection, warned a security researcher at Black Hat DC.

Text Message of Death Threatens Phones

Analysis: Researchers identify a way to send toxic SMS messages that can infect and shut down even feature phones.

on techhive.com

EFF: Government Wants to Know if You Send Any Money Overseas

The EFF opposes new rules proposed by the Financial Crimes Enforcement Network that would pry into users' privacy if they send any money overseas electronically.

Espionage Act Makes Felons of Us All

If you are not "authorized" personnel, but you have read, written about, commented upon, tweeted, spread links by "liking" on Facebook, shared by email, or otherwise discussed "classified" information disclosed from WikiLeaks, you could be implicated for crimes under the U.S. Espionage Act

NASA Sells Space Shuttle PCs Without Wiping Secret Data

The Office of Inspector General found "serious" security breaches at NASA centers after computers were sold with sensitive data still on them.

Holiday Security: Even If You Don't Drink and Drive Your Keyboard This Weekend

Some security tips, whether you plan on drinking and typing or not.

Hackers Attack With Digital Kung-Fu, Demand Taekwondo Gold Medal

After a Taiwanese athlete was disqualified for misplacing her foot sensors in a taekwondo tournament, Taiwanese hackers attacked the Asian Taekwondo Union's Website and demanded the gold medal.

Malware Aimed at Social Networks May Steal Your Reality

Experts predict it's "inevitable" that malicious attackers will attempt to craft Stealing Reality malware that will be much more dangerous and much harder to detect than tradition malware attacks.

Murder by Malware: Can a Computer Virus Kill?

Analysis: Viruses and trojans may cause suffering and empty bank accounts, but let's look at fatalities.

EFF: Apple Patent Is 'Traitorware'

When a new device is activated on the sly and used against you, that's a step beyond spyware. In fact, it inspired the EFF to coin a new term, "traitorware."

Sexy Malware Bound for Smartphones

Analysis: Beware the creative and destructive bots finding their way onto mobile devices.

on techhive.com