Darlene Storm, Computerworld

Darlene Storm

Computerworld

Contact Darlene

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Computerworld
  • Macworld
  • CIO.com

Past articles by Darlene:

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 11

Apple still has not patched the hole allowing you to bypass the iPhone lock screen. As of iOS 11.0.2, you can still trick Siri into getting into a person’s iPhone. → Read More

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 10

As of iOS 10.3.2, the vulnerability allowing attackers to bypass the passcode lock screen on iPhone and iPads still exists. → Read More

Leak: Secret Facebook rules on what violence, self-harm and child abuse can be posted

Internal Facebook documents advising moderators on what content is to be censored or allowed has leaked. → Read More

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

The NSA collected 151 million records of Americans' calls, according to a new transparency report, and allowed 1,934 Americans to be 'unmasked' upon requests of government officials. → Read More

Microsoft reveals what data Windows 10 collects from you

In an effort to be more transparent, Microsoft revealed more about what data Windows 10 Creators Update will collect from users' PCs and clarified what the privacy settings mean. → Read More

iPad bomb plot allegedly led to electronic device ban on flights

A fake iPad stuffed with explosives allegedly contributed to the US and UK's ban on electronics in plane cabins. → Read More

NASA scientist detained at US border until handing over PIN to unlock his phone

A US border agent demanded the PIN code to unlock a NASA scientist's phone before letting him into the country. → Read More

3 security reports about shopping online for Black Friday and Cyber Monday

Amazon and Walmart listed among the “least secure” online retailers; popular WordPress e-commerce plugins have severe vulnerabilities; spammy scammers again cashing in on store brands and “Black Friday.” → Read More

Articles by darlene storm

Read expert opinions by darlene storm at Computerworld.comtitle.index.blog=desc.index.blog=desc.blogs= → Read More

Security Is Sexy

Most security news is about insecurity, hacking and cyber threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security IS sexy. → Read More

Articles by Darlene Storm

Read expert opinions by Darlene Storm at Computerworld.comtitle.index.blog=desc.index.blog=desc.blogs= → Read More

Researchers nab millions of stolen credentials for Gmail, Hotmail, Yahoo, banking

A hacker handed over millions of stolen credentials for Google, Microsoft and Yahoo email accounts, as well as thousands for banking, manufacturing and retail, in exchange for researchers liking and voting up his social media page. → Read More

If we create autonomous killing machines, expect shoddy code and hacking

What if humans miss one tiny error in the code of killer robots or autonomous weapons? What if enemy nations hack those killing machines? Those are but a few of the dangers highlighted in a report about the risks of creating autonomous weapons. → Read More

Ransom32: First-of-its-kind JavaScript-based ransomware spotted in the wild

A new JavaScript-based ransomware spotted in the wild uses Node.js to infect victims, meaning Windows, Linux and Mac users could be affected; Ransom32 is being sold on dark web as ransomware-as-a-service. → Read More

Could cool smart mirror in futuristic fitting room lead to creepy data tracking?

Ralph Lauren will use Oak Labs' futuristic fitting rooms with interactive smart mirrors; the mirrors are cool, but from a privacy perspective it could lead to potentially creepy data collection. → Read More

Researchers hack a pacemaker, kill a man(nequin)

After researchers wirelessly launched successful brute force, denial of service and security control attacks against the "most advanced" medical mannequin, they realized you don't need to be a penetration tester to wirelessly hack a pacemaker and kill simulated human iStan. → Read More

MIT researchers create file system guaranteed not to lose data even if a PC crashes

MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes. → Read More

Controversial confessions of a professional cyber-stalker and spyware developer

You might not think being either a cyber-stalker or spyware developer is a good thing, but what if that person, who knows how to be tricky with tech for tracking purposes, starts handing out privacy tips? → Read More

Macs can be remotely infected with firmware malware that remains after reformatting

Researchers created Thunderstrike 2 firmware malware that could remotely infect Apple computers and remain even if a user were to wipe the hard drive and reinstall OS X. → Read More

Team GhostShell hacktivists dump data from US universities and hundreds of sites

The hacker group GhostShell is back, claiming to have access to billions of accounts, trillions of records, hacking sites and dumping data to show that governments, educational institutions and other sites still have shoddy cybersecurity. → Read More