Verizon gives 120 million customers a cookie they can’t delete
Verizon has been adding a unique identifier to its cell phone customers’ web traffic – and it can be used to track users’ actions in exactly the same way as a cookie can.
But, unlike a cookie, it can’t be deleted.
Tags: Flash Cookies, header, https, internet, O2, phone, traffic, website
Want to disrupt a flight? Just give your Wi-Fi hotspot this name…
American Airlines Flight 136 from Los Angeles to London Heathrow was supposed to have left at 9pm last night.
But then a passenger spotted an unusual Wi-Fi hotspot name listed on their smartphone.
Tags: access point, American Airlines Flight, LAX, Los Angeles, wifi, WiFi hotspot, wireless
Hackers target military, embassy and defense workers in Operation Pawn Storm
A group of organised hackers are targeting government, media and military organisations in the United States, Pakistan, and across Europe.
Always take care logging into your company’s email via the web…
Read more in my article on the Lumension Optimal Security blog.
Tags: Malware, Operation Pawn Storm, Sednit
Google blocking all bit.ly links as malicious [now fixed]
Hopefully this is a false alarm.
Let’s hope it gets fixed soon, because boy oh boy it’s going to be inconvenient.
Tags: bit.ly, false alarm, Google, Malware
Ouch! Security expert writes book about hackers, then his publisher is hacked
Brian Krebs’s upcoming book is bound to be brilliant because, well.. frankly, everything Krebs does is brilliant.
But it’s kinda ironic that his publisher got hacked, with customers’ credit card details put at risk.
Read more in my article on the Hot for Security blog.
Tags: Brian Krebs, Spam Nation, vulnerability
Could hackers give you a heart attack or drugs overdose? US authorities investigate
In the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Read more in my article for the We Live Security blog.
Tags: healthcare, medical
WYSIWYG editors could be an avenue for XSS attacks, warns researcher
Online WYSIWYG editors allowing rich content could be making it easier for attackers to launch cross-site scripting (XSS) attacks.
Read more in my article on the Tripwire State of Security blog.
Tags: vulnerability, XSS
Hackers exploit Windows zero-day flaw in targeted PowerPoint attacks
Be on your guard. Another zero-day vulnerability has been uncovered that affects almost all supported versions of Windows, and it is being actively exploited by hackers in targeted attacks.
Read more in my article on the Optimal Security blog.
Tags: Microsoft, OLE, Powerpoint, vulnerability, Zero Day
Spotlight Suggestions in OS X Yosemite and iOS. Are you staying private?
Concerns are raised that OS X Yosemite is precise details of users’ locations and their search terms back to Apple… and others.
Learn what to do about it, in my article for the Intego Mac Security blog.
Tags: OS X, Privacy, Spotlight, Spotlight Searches, Yosemite
iCloud users in China under attack. But who could be after their passwords?
Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.
That appears to be the lesson to learn from the latest attack on Chinese internet users.
Read more in my article on the We Live Security blog.







