search slide
search slide
pages bottom
Currently Browsing: Results for Tag "Security"

FBI charges Russian spies over Yahoo hack

FBI charges Russian spies over Yahoo hack These claims were initially met with disdain — there was no evidence, at the time, of foreign involvement.At least one hacker, Alexsey Belan, is believed to be cooperating directly with the Russian FSB (the main successor to the KGB).

Put a lock screen on your phone, sheeple!

Put a lock screen on your phone, sheeple! ) of respondents didn't even use a lock screen on their smartphone.Those without lock screens must be very open to anyone scrolling through their phones.

This creepy Facebook stalking app was a hoax—but it should still scare the hell out of you

This creepy Facebook stalking app was a hoax—but it should still scare the hell out of you Earlier this week, sketchy-looking app  Facezam caught the internet's attention, and whipped up some controversy.”  It all comes down to how developers are allowed to use Facebook's data in their apps.

We’ve Brought These Stupid ‘Internet of Things’ Hacks Upon Ourselves

We’ve Brought These Stupid ‘Internet of Things’ Hacks Upon Ourselves These devices are usually referred to as Internet of Things (IoT).Hacking into your IoT devices to get into your network, hacking into your devices to create a botnet, and spying on you.

HP New Zealand reveals why your printers might be the biggest risk in your mpany

HP New Zealand reveals why your printers might be the biggest risk in your mpany We spoke to Grant Hopkins, HP New Zealand’s managing director about secure printing, managed print services and The Wolf web series.Run-time Intrusion Detection is now in new HP enterprise printers and can be added to most printers developed in 2010 through the FutureSmart firmware update.

SXSW 2017: A look at the complex cyber security chess game

SXSW 2017: A look at the complex cyber security chess game To start, he refutes that we should consider cyber war as another domain of war, like land, sea, or air.The newest trends in cyber attacks have gone beyond disruptive denial of service attacks on internet sites.

More than 300 Cisco switch models vulnerable to CIA hack

More than 300 Cisco switch models vulnerable to CIA hack A cache of CIA documents was dropped on the internet two weeks ago via WikiLeaks.Now, Cisco has said its examination of the documents points to a gaping security hole in more than 300 models of its switches.

Dell outfits its XPS 13 2-in-1 with enterprise-grade hardware, security

Dell outfits its XPS 13 2-in-1 with enterprise-grade hardware, security At the request of its customers in the business sector, Dell is now offering new configurations of its XPS 13 2-in-1 device that pack security and manageability features specific to that market.The Dell XPS 13 made its first appearance during CES 2017 in January.

Critical LastPass security hole would allow hackers to steal your passwords

Critical LastPass security hole would allow hackers to steal your passwords According to Google's vulnerability researcher Tavis Ormandy, there's at least one unpatched vulnerability in LastPass that would allows attackers to steal passwords "from any domain."  Ormandy recently reported a few other LastPass bugs, including vulnerabilities in the LastPass add-ons for Firefox and Chrome.

Security hole lets burglars knock out your smart home camera

Security hole lets burglars knock out your smart home camera Smart home systems are supposed to make our lives easier and safer — but some of the most popular connected security cameras could make your place an easy target if your neighborhood is visited by a tech-savvy burgling crew.The flaws, which take advantage of the camera system's always-on Bluetooth, allow anyone within the devices' Bluetooth Low Energy (BLE) range to overwhelm them and shut them down.

LastPass is patching up bugs that left passwords at risk of theft

LastPass is patching up bugs that left passwords at risk of theft The latest bugs were discovered by Google Project Zero researcher Tavis Ormandy, who is renown for finding and disclosing flaws in security software.More: LastPass, used by millions, may be vulnerable to shockingly simple exploits “Therefore, this allows complete access to internal privileged LastPass RPC [remote procedure calls] commands,” he said.

Android security came a long way in 2016 but Google says there is more work

Android security came a long way in 2016 but Google says there is more work With hundreds of different Android devices out in the wild, running different versions of the operating system on different hardware, Google faces a massive challenge in distributing critical security updates.More: Top 5 Android security apps: Do they protect you?

Google is (slowly) fixing the biggest problem with Android

Google is (slowly) fixing the biggest problem with Android At least that's the takeaway from Google's Android Security Year in Review, the latest update on the company's ongoing plan to get phone makers to adopt security updates more quickly.While Android fans often cite the amount of choice in Android devices as one of the main draws of the platform, the fact remains that this continues to be its biggest weakness as well.

India's controversial biometric ID card system could become the only one

India's controversial biometric ID card system could become the only one If you were waiting for the Indian government to slow down (or completely stop) with its push to bring Aadhaar biometric identity system into your lives, don’t hold your breath.Addressing the criticism, Jaitley said the move will help the government zero-in on citizens who don’t pay taxes.

Senate Votes to Let Internet Providers Sell Your Web History

Senate Votes to Let Internet Providers Sell Your Web History Today, the US Senate voted 50-48 to overturn broadband privacy rules that would have required internet service providers get consumer consent before selling their web browsing data to advertisers or other data companies.Those rules would have required internet providers to ask for permission before selling data about your usage, like web browsing history and location, as well as data about finances, health, app usage, and more.

Latest WikiLeaks docs show how the CIA hacked iPhones and MacBooks

Latest WikiLeaks docs show how the CIA hacked iPhones and MacBooks The last round of leaks covered the covert tools used by the CIA to exploit Android, Windows, and other platforms.The “Dark Matter” documents describe how the CIA has sought to crack Apple’s products, including the MacBook and iPhone.

iCloud wasn't hacked for ransom, but you should make sure to keep your account safe, anyway

iCloud wasn't hacked for ransom, but you should make sure to keep your account safe, anyway Still, the TCF's claims and threats haven't  totally been put to rest.ZDnet took a closer look into the TCF's claims and obtained a set of 54 account credentials from the group's alleged cache of over 750 million emails.

9 secret apps to hide your sexts

9 secret apps to hide your sexts While one option is always to delete them ASAP, if you're going to keep them, do yourself and your partner a favor and lock them down.Best Secret Folder disguises itself on your home screen as an unassuming app folder labeled "My Utilities.