Our lives are digital now. Everything we do online leaves a trail that leads directly to us; something privacy advocates are fighting to eliminate. However, we're our own worst enemy when it comes to privacy, and personal cloud adoption has done nothing to help the situation.
Each day millions of people across the globe create backups of their files. These backups are supposed to offer a measure of assurance that their files are safe and easily recovered if needed. But that's not entirely true. In fact, depending on how you've configured the device, your backups are freely available online to anyone who knows what they're looking for. The term personal cloud might seem a bit confusing.Read more
One of the 1.3 million names sent into space aboard NASA's Orion test capsule was a stowaway, uploaded to NASA's database by a security researcher who found and exploited a vulnerability. The name 'Payload1 Payload2' was one of three uploaded to the NASA Orion database that collected names to be later transferred to a chip aboard the rocket and shot into space.
The hack since closed was neither malicious nor dangerous to the mission but rather a flexing of grey matter by bug hunter. The filter bypass and persistent input validation web vulnerability was related to the first and surname fields of the Orion boarding pass module.Read more
Billionaire entrepreneur Elon Musk shook up the automotive and aerospace industries with electric cars and cheap rockets. Now, he is focused on satellites that can deliver Internet access across the globe, according to people familiar with the matter.
Mr. Musk is working with Greg Wyler, a satellite-industry veteran and former Google Inc. executive. In talks with industry executives, Musk and Wyler have discussed launching satellites. They are considering building a factory to make satellites. Initial talks have been held with state officials about locating the factory. In addition to Mr. Musk, WorldVu is seeking a satellite industry partner to lend expertise to the project.Read more
A malicious worm that can roam the net seeking data stored on insecure hardware has been created by a security researcher. The proof-of-concept worm was written to illustrate how vulnerable such data stores are to malicious attack.
Many people connect these devices to a home router to give family members a place to put important files such as photos and films or to act as a back-up for other gadgets. Some home routers can also connect to hard drives to turn them into an NAS-type device. Many of these, if exploited, would give an attacker complete control over a device letting them plunder the data on it.Read more
110 Reykjavik, Iceland