AppZUMBi Background Image
Recent Security News
Security

Android Porn App Resets Your Passcode, Demands MoneyThere's a new piece of mobile ransomware hitting Android users, but giving in to its demands won't help. In a novel twist, LockerPIN locks users out of their phones by randomizing their PIN codes; even if you pay, the criminals behind the malware can't unlock your device....SecurityAndroid Porn App Resets Your Passcode, Demands Money
source: | September 20, 2015, 4:25:16

Pinterest Pin ButtonShare on Tumblr
Security

Can typing habits prevent cybercrime?New research proposes a new keystroke algorithm which intends on making online authentication processes more secure, reliable, and cheap. The new method hopes to alleviate some of the common issues for internet users including loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots....SecurityCan typing habits prevent cybercrime?
source: | September 19, 2015, 2:11:26

Pinterest Pin ButtonShare on Tumblr
Security

Who Really Owns Your iPhone? It May Not Be YouSo you just bought yourself a new iPhone 6S. Congratulations. But do you really own that new smartphone? Or is still the property of the company that built it and/or your wireless carrier? The answer depends on who made it and how you acquired it....SecurityWho Really Owns Your iPhone? It May Not Be You
source: | September 19, 2015, 1:59:56

Pinterest Pin ButtonShare on Tumblr
Security

How the Government Surveils Cellphones: A PrimerLast week, the state of cellphone tracking became slightly more confusing. The U.S. Department of Justice announced that, except in emergency situations, federal agents would now seek warrants before using "Stingrays." Stingrays are devices that mimic cellphone towers and can pinpoint a phone’s physical location or record which number they’re calling....SecurityHow the Government Surveils Cellphones: A Primer
source: | September 14, 2015, 3:29:11

Pinterest Pin ButtonShare on Tumblr
Security

Issues surrounding security tools for software developersFor software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities long before the software goes to market. But these tools can have shortcomings, and programmers don't always use them. New research tackles three different aspects of the issue....SecurityIssues surrounding security tools for software developers
source: | September 13, 2015, 4:4:36

Pinterest Pin ButtonShare on Tumblr
Security

APIs Are The New FTEsFacebook, Google and Twitter have to deal with outrageous amounts of spam and abuse. They hire teams of engineers to stop trolls, outwit bad actors and otherwise keep their walled gardens free of misanthropes. It’s a costly business....SecurityAPIs Are The New FTEs
source: | September 7, 2015, 23:36:3

Pinterest Pin ButtonShare on Tumblr
Security

How to Make Privacy Policies Better, in Two Easy StepsThe end of last week saw one of those tech stories that runs the cycle—from Twitter outrage to corporate chagrin—in less than 48 hours. Here’s what happened: On Thursday, a major tech company (in this case, Spotify) debuted a new privacy policy. The policy permitted the software to access more information than seemed reasonable (in this case, a user’s photos, contacts, and ...SecurityHow to Make Privacy Policies Better, in Two Easy Steps
source: | August 30, 2015, 3:30:33

Pinterest Pin ButtonShare on Tumblr
Security

Kill the Password: A String of Characters Won’t Protect YouIt’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you....SecurityKill the Password: A String of Characters Won’t Protect You
source: | August 26, 2015, 17:40:37

Pinterest Pin ButtonShare on Tumblr
Security

You can look, but Ashley Madison information is hard to verifyThe website suffered a massive breach in July, when hackers broke in to its systems and stole 37 million user profiles, as well as internal information about the company. The hackers then tried to blackmail the site's parent company, claiming they'd release customer names on the Web if the company didn't shut down Ashley Madison and another site it runs, cal...SecurityYou can look, but Ashley Madison information is hard to verify
source: | August 20, 2015, 23:54:41

Pinterest Pin ButtonShare on Tumblr
Security

New internet routing method allows users to avoid sending data through undesired countriesComputer scientists have developed a method for providing concrete proof to Internet users that their information did not cross through specified, undesired geographic areas. Called Alibi Routing, the system is immediately deployable and does not require knowledge of -- or modifications to -- the Internet's routing hardware or policies....SecurityNew internet routing method allows users to avoid sending data through undesired countries
source: | August 19, 2015, 21:33:11

Pinterest Pin ButtonShare on Tumblr
Security

Securing data from tomorrow's supercomputersFor the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a synch. But a team of cryptographers is already working at future-proofing the privacy of today's Internet communications from tomorrow's powerful computers....SecuritySecuring data from tomorrow's supercomputers
source: | August 19, 2015, 21:32:19

Pinterest Pin ButtonShare on Tumblr
Security

Hackers exploit Flash in one of the largest malware attacks in recent historyIn case it wasn’t clear yet, Adobe’s Flash isn’t exactly the safest tool for delivering Internet content. Hackers are already more than aware of the software’s security issues and are happy to exploit them for various malicious purposes. That’s exactly what happened in late July when hackers used Flash to infect Yahoo websites with malware in what has been described as on...SecurityHackers exploit Flash in one of the largest malware attacks in recent history
source: | August 12, 2015, 23:10:58

Pinterest Pin ButtonShare on Tumblr
Security

Hackers prove how hard it is to hack a TeslaCar hacking has been the story of the moment, with a lack of cybersecurity understanding evident among large automakers. Tesla, however, is a different case. Security researchers Kevin Mahaffey and Marc Rogers gave a presentation at this year's Def Con hacking conference on how they were able to hack into a Tesla Model S and control its various functions, reports CNET. Thei...SecurityHackers prove how hard it is to hack a Tesla
source: | August 12, 2015, 4:42:10

Pinterest Pin ButtonShare on Tumblr
Security

LG joins Samsung and Google by promising monthly security updatesJust like Samsung and Google, LG also plans to roll out security updates once a month directly to smartphones, in order to help prevent exploits like Stagefright from occurring again. LG confirmed said plans with Wired in an email:...SecurityLG joins Samsung and Google by promising monthly security updates
source: | August 10, 2015, 22:20:58

Pinterest Pin ButtonShare on Tumblr
Security

How to protect your wireless network from Wi-Fi SenseIf the recent controversy over Windows 10's Wi-Fi Sense feature has you concerned about wireless security, good. In this post, I explain why wireless security is as much social as it is technological, and suggest four ways to make your wireless network safer....SecurityHow to protect your wireless network from Wi-Fi Sense
source: | August 10, 2015, 2:10:6

Pinterest Pin ButtonShare on Tumblr
Security

What’s Safer From Hackers: A PC or a Mac?Apple’s vaunted reputation for safety and security has taken some hits recently. Just this week came news of DYLD_PRINT_TO_FILE — a bug in Apple’s OS X operating system that has allowed a malicious program to take complete control of Macs. Apple has known of the flaw for a few weeks but hasn’t gotten out a patch yet. Then there were reports of a vulnerability in the Mac’s...SecurityWhat’s Safer From Hackers: A PC or a Mac?
source: | August 9, 2015, 2:19:53

Pinterest Pin ButtonShare on Tumblr




Recent Security News

Home
Apps
Portals
Online Games
News
Images/Clipart
Developers
Site Map
AppZUMBi on Facebook AppZUMBi on Google+ AppZUMBi on Twitter AppZUMBi on Pinterest AppZUMBi on Tumblr AppZUMBi on LinkIn HTML5 Powered with CSS3 / Styling, Device Access, and Semantics