In-brief: Hobbled by draconian copyright restrictions from manufacturers like John Deere that make it impossible to modify or repair equipment, farmers in the U.S. have turned to unofficial software produced in countries like Ukraine to maintain their equipment.
In-brief: The recently disclosed trove of personnel files by an US Air Force officer is one piece of a much larger phenomenon: exposed, vulnerable and Internet-connected network attached storage (or NAS) devices chock full of gigabytes sensitive data.
In-brief: The Metasploit Framework has a new extension to test for wireless devices that communicate over radio frequency (RF), Bluetooth and other protocols.
In-brief: The Department of Justice announced charges against four men for the attack on Yahoo that netted information on 500 million users. But what do we know about the men and their alleged crime? Security Ledger Editor in Chief Paul Roberts speaks with Igor Baikalov of Securonix about the incident.
In-brief: Like Love Canal or the ‘flaming river’ in Cleveland that eventually prompted anti-pollution laws, the casual leak of data on 33 million U.S. professionals is a sign that our online environment is badly compromised. But can we fix it? (Editor’s note: this blog post originally appeared on Digital Guardian’s blog.)