comScore

Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.

security

  1. iCloud Not Breached In “Targeted” Attack on Celebrity Accounts, Says Apple

    Ugh.

    After hundreds of private nude photographs were stolen from celebrities' phones and then posted to the Internet without any of their consent, many theorized that this security breach pointed out a huge flaw in cloud-based storage systems like Apple's iCloud. Today Apple acknowledged that while these celebrity accounts had been accessed through them, their iCloud system was not technically breached in any way.

    Read More
  2. Chinese Hackers Steal 4.5 Million Hospital Patient Records From Community Health Services Network

    Call Zero Cool on these chumps.

    Community Health Systems is a network of 206 hospitals in 29 states, and today they've announced they were hacked. The hackers, working out of China, managed to get 4.5 million patient records including names, social security numbers, and addresses. CHS is now working with the FBI to identify and arrest the thieves.

    Read More
  3. eBay was Hacked, Change Your Password and Blame Embarrassing Late Night Bids on Criminals

    Weird this Jar Jar mask has zero bids.

    Good Bad news, everyone! eBay was hacked, and they're saying passwords have been compromised. According to the company there's nothing that indicates any financial information has been compromised, but it's best to be safe and update your account before you end up paying for someone's limited edition Jem and the Holograms figurines.

    Read More
  4. Security Flaw Makes Baby Monitors Appear Possessed

    For sale: baby monitor, very haunted.

    Being a parent is terrifying enough without some jag-off hacking into your baby monitor and wreaking Paranormal Activity-type havoc, but that's exactly what happened recently to the Schreck family of Ohio--and they're not the first to be affected by a little-known security flaw in Foscam's IP cameras.

    Read More
  5. Five-Year-Old Discovers Xbox Account Password Security Hole, Uses His Powers to Play Age-Inappropriate Games

    Well, I did always suspect Microsoft's coders were five years old, so...

    Microsoft, long a bastion of computer security, has been bested by the finest mind in computer hacking: a five-year-old trying to play age-inappropriate games on his dad's Xbox.

    Read More
  6. Hotel Keys Do Not Store Your Personal Information, but Here’s Why You Might Think That

    They can store your personal information, but it doesn't mean they do.

    As I learned on a family vacation this weekend, some people think that their hotel keycard is encoded with all sorts of personal information. This belief leads to people refusing to turn in their keycards at the end of a hotel stay for fear of that information being stolen. It's not true, but here's why some people think it is.

    Read More
  7. Edward Snowden Receives Travel Documents, Free to Leave Moscow Airport

    After spending a month living in the Sheremetyevo Airport in Moscow, we'll bet pretty much anywhere that's not an airport concourse looks pretty good right now.

    According to Reuters, NSA leaker Edward Snowden has finally been granted travel papers that would let him leave the transit area of Moscow's Sheremetyevo airport, where he has spent the last few weeks working to find his way to one of several nation's that has granted him asylum. Exactly where Snowden is heading now is still up in the air, but sources have indicated to Russian news site RT that Snowden is getting a fresh set of clothes and preparing to leave the airport shortly.

    Read More
  8. FBI Drones Are Engaged in Surveillance Over the U.S.

    Every move you make, every step you take...well, you know the rest.

    At a hearing before the Senate Judiciary Committee earlier today, FBI Director Robert Mueller said that the agency uses unmanned drones to conduct surveillance in the United States. The admission came in response to questioning from Senator Chuck Grassley (R-IA). According to Mueller, drones are used by the FBI to carry out domestic surveillance missions "in a very, very minimal way, and seldom.”

    Read More
  9. Meet PRISM, the NSA’s Internet Intelligence Gathering Service

    Don't worry about introducing yourself, though. PRISM already knows you quite well.

    Yesterday, when it became clear that the National Security Agency was once again gathering the phone records of millions of American citizens without warrants or cause, it seemed like...oh, let's be politic and call it "an overstep." Turns out, we didn't even know what an overstep was, as it has now become clear that the NSA's phone record gathering program is far from the only questionable activity the NSA has its fingers in. Take for example the PRISM program, which collects data on Internet users -- including emails, file transfer records, and voice and video chats -- by tapping directly into the servers of Internet companies like Google, Microsoft and Facebook, just to name a few.

    Read More
  10. Just 20 ISPs Are Responsible for Nearly Half of All Email Spam Worldwide

    Considering the wide variety of products spam email acts as a barker for, you might assume that there are an equally diverse range of individuals, or at least programs, trying to sell you important goods like mirrors, plastic sheers, and of course medications for male stamina. (Also, wow, am I ever troubled by what my spam folder seems to think of me.) According to a recent look at the numbers, though, that's not the case. In fact, the study from the University of Twente suggests that just 20 of the more than 42,000 Internet service providers worldwide are responsible for nearly half of the emails that you get looking to sell you penis enlargement pills and various other high quality goods and services.

    Read More
  11. Japanese Security Firm Will Let You Rent Your Own Drone For Less Than $60 a Month

    If you're one of those folks who is always on the lookout for the latest and greatest new advance in home security technology, we've got you covered -- or at least, we know who does. Japanese security firm Secom is preparing to launch a new service that will let home and small business owners rent a quadcopter drone that the company claims will launch automatically in the event of a burglary, snapping pictures of the invaders and even capturing live video of them as the crime is in progress.

    Read More
  12. Unsecure Passwords Just Got More Unsecure, Cracking Them Now Even Faster

    A new method of cracking passwords hashed with SHA-1 (Secure Hash Algorithm) made the relatively unsecured algorithm even less secure by greatly decreasing the time and computing power necessary to crack it. The news came out of the Passwords^12 conference in Oslo, Norway, which focused on password and PIN code security. It might be a good time to change your password, or more importantly change the way your passwords are stored.

    Read More
  13. DIY Backscatter X-Ray Machine Keeps Your Garage Safe From Nail Files

    There's good news for those of you who just can't get enough of airport security this holiday season -- now, you can build your own backscatter X-ray machine, just like the one that ensures you're not bringing anything unsafe like nail clippers or a lighter onto the airplane. It's a little more cumbersome than a pair of X-ray specs, but as the video demonstrates, it's a pretty effective tool for seeing through things. Considering it was built entirely with parts purchased off of eBay, it's a pretty serious feat of DIY engineering, and we doff our caps to inventor Ben Krasnow, who will no doubt be scanning friends and family as they come through the door for his holiday party. Anything to avoid the Christmas pat down, right?

    Read More
  14. Mannequin Spies May be Dressing You With Their Camera-Eyes

    Shopping for clothes can be, for some of us, a private affair. Some people will only shop with their closest friends, others prefer to do it alone. One thing is certain: Nobody wants to get caught and judged after finding that a pair of pants doesn't fit the way it should. It may concern you, then, to find out that certain retailers have begun employing a new type of camera to keep tabs on their customers, hidden behind the eye-sockets of mannequins.

    Read More
  15. Kaspersky’s Top 10 Computer Vulnerabilities Includes Not a Single One From Microsoft

    Microsoft typically gets a bad rap from the security community. To be fair, the company's history hasn't exactly been full of reasons for folks to think that they're terribly secure, but perhaps that's all about to change. Kaspersky Lab, one of the major worldwide IT security companies, just released their IT Threat Evolution report for the third quarter, and Microsoft's managed to not be included at all in the top 10 products with vulnerabilities. Seriously.

    Read More
  16. Swedish Nuclear Plants Host Surprise Activist Slumber Party, Intruders Avoid Detection for 28 Hours

    Nuclear plant security is one of those things that pretty much everyone agrees on. In essence, it's probably a bad idea to let just anyone wander around a nuclear facility without proper clearance. Just wanting security to be without faults doesn't make it that way, unfortunately. After around 70 Greenpeace activists swarmed two nuclear plants in Sweden, six managed to avoid security overnight by hiding out on rooftops. In fact, plant owner Vattenfall claimed that all the activists had been detained and their security measures had worked.

    Read More
  17. Palm Reading Technology Could Unlock Your Next Cell Phone

    Science has finally cracked the code of ancient gypsy magic, making it possible to unlock your cell phone with just a quick digital palm reading, rather than typing in a password. Engineers are still working out kinks in the program that will also inform you of the winning lottery numbers, where you'll meet the love of your life, and the exact time and circumstances of your demise, but for now the unlocking the phone thing seems pretty good.

    Read More
  18. Latest Apple Security Update Exposes User Passwords

    Mac users are still reeling from the Flashback, the nasty OS X malware which illustrated painfully that even Apple users are vulnerable to attack. Now it seems that Apple is following that up with the embarrassing revelation that the latest update, Mac OS 10.7.3, exposes passwords for certain users. The scenario where this information is exposed is very specific, but it is nonetheless disquieting.

    Read More
  19. DARPA Wants To Identify Users By Typing Style, Do Away With Passwords

    The combination of a username and password seems like an inextricable part of using a secured computer. Sure, you can use biometrics, but username and password just seems like the most natural way to identify and authorize users without the bulk of extra, expensive, and specialized equipment. That being the case, it has become second nature to most of us, but is it really natural at all? Memorizing passwords, especially "strong" ones, involves remembering long, arbitrary strings of seemingly random numbers and characters, hardly natural. That's why DARPA has undertaken an initiative to eliminate passwords altogether and instead identify users in the background, as they work, by paying very close attention to the idiosyncratic way they type.

    Read More
  20. New TSA-Compliant Cupcakes Will (Hopefully) Breeze Through Security Checkpoints

    In response to the TSA confiscating a "cupcake in a jar," the Silver Spoon Bakery in Rhode Island decided that they could make the world a better, sweeter place with their TSA compliant cupcake. In addition to looking delicious, the cupcake is guaranteed (by the bakery, not the government) to pass swiftly through security checkpoints. Its secret? It contains exactly three ounces of icing, which the TSA classifies as a gel, and it comes in its own clear baggy.

    Read More
© 2015 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContact RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop