Android Porn App Resets Your Passcode, Demands Money
There's a new piece of mobile ransomware hitting Android users, but giving in to its demands won't help. In a novel twist, LockerPIN locks users out of their phones by randomizing their PIN codes; even if you pay, the criminals behind the malware can't unlock your device....
Security
Android Porn App Resets Your Passcode, Demands MoneyThere's a new piece of mobile ransomware hitting Android users, but giving in to its demands won't help. In a novel twist, LockerPIN locks users out of their phones by randomizing their PIN codes; even if you pay, the criminals behind the malware can't unlock your device....SecuritySeptember 20, 2015, 4:25:16Android Porn App Resets Your Passcode, Demands Moneysource: http://www.tomsguide.com/us/android-porn-ransomware-pin-reset,news-21592.html | September 20, 2015, 4:25:16
Share on Tumblr
Can typing habits prevent cybercrime?
New research proposes a new keystroke algorithm which intends on making online authentication processes more secure, reliable, and cheap. The new method hopes to alleviate some of the common issues for internet users including loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots....
Security
Can typing habits prevent cybercrime?New research proposes a new keystroke algorithm which intends on making online authentication processes more secure, reliable, and cheap. The new method hopes to alleviate some of the common issues for internet users including loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots....SecuritySeptember 19, 2015, 2:11:26Can typing habits prevent cybercrime?source: http://www.sciencedaily.com/releases/2015/09/150910164530.htm | September 19, 2015, 2:11:26
Share on Tumblr
Who Really Owns Your iPhone? It May Not Be You
So you just bought yourself a new iPhone 6S. Congratulations. But do you really own that new smartphone? Or is still the property of the company that built it and/or your wireless carrier? The answer depends on who made it and how you acquired it....
Security
Who Really Owns Your iPhone? It May Not Be YouSo you just bought yourself a new iPhone 6S. Congratulations. But do you really own that new smartphone? Or is still the property of the company that built it and/or your wireless carrier? The answer depends on who made it and how you acquired it....SecuritySeptember 19, 2015, 1:59:56Who Really Owns Your iPhone? It May Not Be Yousource: https://www.yahoo.com/tech/who-really-owns-your-iphone-it-may-not-be-you-129321095449.html | September 19, 2015, 1:59:56
Share on Tumblr
How the Government Surveils Cellphones: A Primer
Last week, the state of cellphone tracking became slightly more confusing. The U.S. Department of Justice announced that, except in emergency situations, federal agents would now seek warrants before using "Stingrays." Stingrays are devices that mimic cellphone towers and can pinpoint a phone’s physical location or record which number they’re calling....
Security
How the Government Surveils Cellphones: A PrimerLast week, the state of cellphone tracking became slightly more confusing. The U.S. Department of Justice announced that, except in emergency situations, federal agents would now seek warrants before using "Stingrays." Stingrays are devices that mimic cellphone towers and can pinpoint a phone’s physical location or record which number they’re calling....SecuritySeptember 14, 2015, 3:29:11How the Government Surveils Cellphones: A Primersource: http://www.theatlantic.com/technology/archive/2015/09/how-the-government-surveils-cell-phones-a-primer/404818/ | September 14, 2015, 3:29:11
Share on Tumblr
Issues surrounding security tools for software developers
For software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities long before the software goes to market. But these tools can have shortcomings, and programmers don't always use them. New research tackles three different aspects of the issue....
Security
Issues surrounding security tools for software developersFor software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities long before the software goes to market. But these tools can have shortcomings, and programmers don't always use them. New research tackles three different aspects of the issue....SecuritySeptember 13, 2015, 4:4:36Issues surrounding security tools for software developerssource: http://www.sciencedaily.com/releases/2015/08/150824130509.htm | September 13, 2015, 4:4:36
Share on Tumblr
How to Make Privacy Policies Better, in Two Easy Steps
The end of last week saw one of those tech stories that runs the cycle—from Twitter outrage to corporate chagrin—in less than 48 hours. Here’s what happened: On Thursday, a major tech company (in this case, Spotify) debuted a new privacy policy. The policy permitted the software to access more information than seemed reasonable (in this case, a user’s photos, contacts, and ...
Security
How to Make Privacy Policies Better, in Two Easy StepsThe end of last week saw one of those tech stories that runs the cycle—from Twitter outrage to corporate chagrin—in less than 48 hours. Here’s what happened: On Thursday, a major tech company (in this case, Spotify) debuted a new privacy policy. The policy permitted the software to access more information than seemed reasonable (in this case, a user’s photos, contacts, and ...SecurityAugust 30, 2015, 3:30:33How to Make Privacy Policies Better, in Two Easy Stepssource: http://www.theatlantic.com/technology/archive/2015/08/privacy-policies-better-in-two-easy-steps-spotify-scandal/402235/ | August 30, 2015, 3:30:33
Share on Tumblr
Kill the Password: A String of Characters Won’t Protect You
It’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you....
Security
Kill the Password: A String of Characters Won’t Protect YouIt’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you....SecurityAugust 26, 2015, 17:40:37Kill the Password: A String of Characters Won’t Protect Yousource: http://www.wired.com/2012/11/ff-mat-honan-password-hacker/ | August 26, 2015, 17:40:37
Share on Tumblr
You can look, but Ashley Madison information is hard to verify
The website suffered a massive breach in July, when hackers broke in to its systems and stole 37 million user profiles, as well as internal information about the company. The hackers then tried to blackmail the site's parent company, claiming they'd release customer names on the Web if the company didn't shut down Ashley Madison and another site it runs, cal...
Security
You can look, but Ashley Madison information is hard to verifyThe website suffered a massive breach in July, when hackers broke in to its systems and stole 37 million user profiles, as well as internal information about the company. The hackers then tried to blackmail the site's parent company, claiming they'd release customer names on the Web if the company didn't shut down Ashley Madison and another site it runs, cal...SecurityAugust 20, 2015, 23:54:41You can look, but Ashley Madison information is hard to verifysource: http://www.cnet.com/news/you-can-look-but-ashley-madison-information-is-hard-to-verify/ | August 20, 2015, 23:54:41
Share on Tumblr
New internet routing method allows users to avoid sending data through undesired countries
Computer scientists have developed a method for providing concrete proof to Internet users that their information did not cross through specified, undesired geographic areas. Called Alibi Routing, the system is immediately deployable and does not require knowledge of -- or modifications to -- the Internet's routing hardware or policies....
Security
New internet routing method allows users to avoid sending data through undesired countriesComputer scientists have developed a method for providing concrete proof to Internet users that their information did not cross through specified, undesired geographic areas. Called Alibi Routing, the system is immediately deployable and does not require knowledge of -- or modifications to -- the Internet's routing hardware or policies....SecurityAugust 19, 2015, 21:33:11New internet routing method allows users to avoid sending data through undesired countriessource: http://www.sciencedaily.com/releases/2015/08/150819083419.htm | August 19, 2015, 21:33:11
Share on Tumblr
Securing data from tomorrow's supercomputers
For the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a synch. But a team of cryptographers is already working at future-proofing the privacy of today's Internet communications from tomorrow's powerful computers....
Security
Securing data from tomorrow's supercomputersFor the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a synch. But a team of cryptographers is already working at future-proofing the privacy of today's Internet communications from tomorrow's powerful computers....SecurityAugust 19, 2015, 21:32:19Securing data from tomorrow's supercomputerssource: http://www.sciencedaily.com/releases/2015/08/150818102920.htm | August 19, 2015, 21:32:19
Share on Tumblr
Hackers prove how hard it is to hack a Tesla
Car hacking has been the story of the moment, with a lack of cybersecurity understanding evident among large automakers. Tesla, however, is a different case. Security researchers Kevin Mahaffey and Marc Rogers gave a presentation at this year's Def Con hacking conference on how they were able to hack into a Tesla Model S and control its various functions, reports CNET. Thei...
Security
Hackers prove how hard it is to hack a TeslaCar hacking has been the story of the moment, with a lack of cybersecurity understanding evident among large automakers. Tesla, however, is a different case. Security researchers Kevin Mahaffey and Marc Rogers gave a presentation at this year's Def Con hacking conference on how they were able to hack into a Tesla Model S and control its various functions, reports CNET. Thei...SecurityAugust 12, 2015, 4:42:10Hackers prove how hard it is to hack a Teslasource: http://mashable.com/2015/08/10/tesla-model-s-hack/ | August 12, 2015, 4:42:10
Share on Tumblr
LG joins Samsung and Google by promising monthly security updates
Just like Samsung and Google, LG also plans to roll out security updates once a month directly to smartphones, in order to help prevent exploits like Stagefright from occurring again. LG confirmed said plans with Wired in an email:...
Security
LG joins Samsung and Google by promising monthly security updatesJust like Samsung and Google, LG also plans to roll out security updates once a month directly to smartphones, in order to help prevent exploits like Stagefright from occurring again. LG confirmed said plans with Wired in an email:...SecurityAugust 10, 2015, 22:20:58LG joins Samsung and Google by promising monthly security updatessource: http://www.androidcentral.com/lg-joins-samsung-and-google-promising-monthly-security-updates | August 10, 2015, 22:20:58
Share on Tumblr
How to protect your wireless network from Wi-Fi Sense
If the recent controversy over Windows 10's Wi-Fi Sense feature has you concerned about wireless security, good. In this post, I explain why wireless security is as much social as it is technological, and suggest four ways to make your wireless network safer....
Security
How to protect your wireless network from Wi-Fi SenseIf the recent controversy over Windows 10's Wi-Fi Sense feature has you concerned about wireless security, good. In this post, I explain why wireless security is as much social as it is technological, and suggest four ways to make your wireless network safer....SecurityAugust 10, 2015, 2:10:6How to protect your wireless network from Wi-Fi Sensesource: http://www.zdnet.com/article/how-to-protect-your-wireless-network-from-wi-fi-sense/ | August 10, 2015, 2:10:6
Share on Tumblr
What’s Safer From Hackers: A PC or a Mac?
Apple’s vaunted reputation for safety and security has taken some hits recently. Just this week came news of DYLD_PRINT_TO_FILE — a bug in Apple’s OS X operating system that has allowed a malicious program to take complete control of Macs. Apple has known of the flaw for a few weeks but hasn’t gotten out a patch yet. Then there were reports of a vulnerability in the Mac’s...
Security
What’s Safer From Hackers: A PC or a Mac?Apple’s vaunted reputation for safety and security has taken some hits recently. Just this week came news of DYLD_PRINT_TO_FILE — a bug in Apple’s OS X operating system that has allowed a malicious program to take complete control of Macs. Apple has known of the flaw for a few weeks but hasn’t gotten out a patch yet. Then there were reports of a vulnerability in the Mac’s...SecurityAugust 9, 2015, 2:19:53What’s Safer From Hackers: A PC or a Mac?source: https://www.yahoo.com/tech/whats-safer-from-hackers-a-pc-or-a-mac-126098613384.html | August 9, 2015, 2:19:53
Share on Tumblr