Rob Waugh

Rob Waugh

Independent Correspondent



736 articles by Rob Waugh

Less Technical

Fake iPhone charger can hack iOS in under 60 seconds

Fake iPhone charger can hack iOS in under 60 seconds

Less Technical

Fake iPhone charger can hack iOS in under 60 seconds

A fake iPhone charger could be used to bypass the defenses of Apple's smartphone, three researchers from Georgia Tech have claimed. In an upcoming presentation at this summer’s Black Hat security conference in Las Vegas, the researchers claim to have created a “malicious charger” which can inject software into an iOS device in under a minute.

Rob Waugh03 Jun 20132 min. read


Less Technical

Cybercriminals use photo-sharing to snare victims in auction scams, FBI warns

Cybercriminals use photo-sharing to snare victims in auction scams, FBI warns

Less Technical

Cybercriminals use photo-sharing to snare victims in auction scams, FBI warns

Cybercriminals are using online car auctions and photo-sharing services to dupe victims into downloading malware, the FBI has warned. Once infected, the victims are led to fake websites to buy cars - and when they pay up, the criminals vanish.

Rob Waugh03 Jun 20131 min. read


Less Technical

Evernote and LinkedIn boost security with two-factor authentication

Evernote and LinkedIn boost security with two-factor authentication

Less Technical

Evernote and LinkedIn boost security with two-factor authentication

Evernote and LinkedIn have both added an option for two-factor authentication in the past few days - days after Twitter announced its optional two-factor security system.

Rob Waugh31 May 20132 min. read


Less Technical

Motorola predicts passwords could be replaced by arm tattoos and “authentication pills”

Motorola predicts passwords could be replaced by arm tattoos and “authentication pills”

Less Technical

Motorola predicts passwords could be replaced by arm tattoos and “authentication pills”

Motorola has revealed plans for hi-tech authentication systems that could make accessing data faster and easier - including a “tattoo” with embedded sensors and antenna, and an “authentication pill” which turns the human body into a giant authentication token.

Rob Waugh31 May 20131 min. read


Less Technical

Drupal.org resets passwords after hack exposes usernames, email addresses

Drupal.org resets passwords after hack exposes usernames, email addresses

Less Technical

Drupal.org resets passwords after hack exposes usernames, email addresses

The free open-source content management system Drupal has reset all Drupal.org passwords after unknown attackers gained access to user account data including usernames, email addresses and hashed passwords.

Rob Waugh30 May 20131 min. read


Less Technical

Charges against cybercrime's “bank of choice” for laundering $6 billion

Charges against cybercrime's “bank of choice” for laundering $6 billion

Less Technical

Charges against cybercrime's “bank of choice” for laundering $6 billion

U.S. prosecutors allege that virtual currency company Liberty Reserve processed 55 million transactions since 2006, becoming “the bank of choice” for cyber criminals.

Rob Waugh29 May 20131 min. read


Less Technical

Mass malware attacks “could be triggered by music”, researchers claim

Mass malware attacks “could be triggered by music”, researchers claim

Less Technical

Mass malware attacks “could be triggered by music”, researchers claim

Future malware attacks could be triggered by music or even lighting - allowing cybercriminals to command and control large numbers of infected devices in the same area, according to Alabama researchers.

Rob Waugh29 May 20131 min. read


Less Technical

Advanced U.S. weapons system designs are "compromised by hackers"

Advanced U.S. weapons system designs are "compromised by hackers"

Less Technical

Advanced U.S. weapons system designs are "compromised by hackers"

Designs for more than two dozen advanced weapons systems have been compromised by hackers, according to a report prepared for the Pentagon. The hackers are said to be Chinese.

Rob Waugh28 May 20131 min. read


Less Technical

Sky TV app users worry after broadcaster Google Play "hack"

Sky TV app users worry after broadcaster Google Play "hack"

Less Technical

Sky TV app users worry after broadcaster Google Play "hack"

Users of British broadcaster Sky’s Android apps were left worried after hackers defaced the company’s Google Play page, and simultaneously sent out a warning via a company Twitter account that the apps had been “hacked and replaced”.

Rob Waugh27 May 20131 min. read