search slide
search slide
pages bottom
Currently Browsing: Results for Tag "Security"

Apple patches critical security flaws used to steal encrypted data

Apple patches critical security flaws used to steal encrypted data Apple products have a reputation for security, especially compared with the systemic security flaws baked into the Android update system (or lack thereof).In the world of device security, however, no one is ever perfect, and the critical flaws that Apple patched today underscore that point.

HP launches laptops with privacy-guarding displays, limited field of view

HP launches laptops with privacy-guarding displays, limited field of view The new technology, developed with 3M, is different from aftermarket overlays and filters that have been available for years.Users can still adjust the brightness level after enabling Sure View, though this may make the panel more visible again.

How to give your social media security an important boost

How to give your social media security an important boost Here are a few things to keep an eye out for: Different social media sites have a fairly wide variety of options available for preserving the security of your login credentials.At this point most social media sites offer some sort of two-factor authentication.

Computer-killing USB drives now on sale for less than $60

Computer-killing USB drives now on sale for less than $60 But there’s now a Hong Kong-based company selling a USB Kill Drive 2.Here’s how the company describes the product: The USB Kill 2.

Wells Fargo faces $185 million fine for massive fraud and theft scheme, 5,300 employees fired

Wells Fargo faces $185 million fine for massive fraud and theft scheme, 5,300 employees fired For the past five years, thousands of Wells Fargo employees collectively participated in a scam to systemically defraud and abuse its customers.The problems at Wells Fargo are tied to a company culture that values cross-selling products across the entire range of services that the bank offers.

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security Nearly four years ago, the Electronic Privacy Information Center released FBI documents discussing a controversial surveillance technique.Both federal and local authorities often have access to cell phone surveillance hardware, dubbed Stingrays (Harris Corp.

Yahoo confirms massive attack hit 500 million users, blames state-sponsored hackers

Yahoo confirms massive attack hit 500 million users, blames state-sponsored hackers The company has now revealed that it had 500 million accounts stolen (previous reports pegged the number at 200 million) and that state actors may have been responsible.Motherboard first took note of a sale of 200 million accounts in August, and the low price of $2,000 seems to imply that the information may be incorrect.

Yahoo hack analysis shows little evidence of foreign involvement

Yahoo hack analysis shows little evidence of foreign involvement Last week, Yahoo owned up to the largest hack known to have occurred in computing history.At the time, Yahoo claimed that the hack was the work of state-sponsored actors — but independent analysts working on analyzing the hack have begun pushing back that assessment, while current and former Yahoo employees say security was a distant priority at Yahoo.

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA Ever since the Snowden leaks in 2013, there’s been an ongoing debate over the nature of state surveillance.If a new report from Reuters is accurate, the Yahoo that went to bat to defend its users is a dim and distant memory today.

DARPA may borrow blockchain tech from Bitcoin to secure military networks

DARPA may borrow blockchain tech from Bitcoin to secure military networks You’ve probably heard about blockchain technology most often in the context of digital cryptocurrencies like Bitcoin, but the blockchain can be much more than that.With Bitcoin, the blockchain is the universal record of all the transactions that take place.

Internet struck by waves of outages as massive DDoS attack affects major services

Internet struck by waves of outages as massive DDoS attack affects major services Rolling outages and intermittent connectivity problems hit the Internet today, thanks to a massive DDoS (Distributed Denial of Service) attack launched at DNS provider Dyn.Attacking a DNS (Domain Name System) provider is a good way to knock out large swaths of the Internet.

Security firm claims implantable cardiac devices can be hacked

Security firm claims implantable cardiac devices can be hacked Now a security firm says that a connected implantable cardiac device made by Minnesota-based healthcare company St.After implantation, it uses small flexible wires to detect your heart rate and applies an electric current to stop abnormal cardiac rhythms.

IoT devices likely drove Friday Internet blackout, some products already recalled

IoT devices likely drove Friday Internet blackout, some products already recalled A few weeks ago, security researcher Brian Krebs, author of the blog Krebs on Security, was driven offline by mammoth DDoS attacks driven by IoT devices.The attack now seems to have been a warm-up for last Friday’s wide-scale internet outage, and security researchers suspect that Internet of Things products were once again to blame.

DARPA tests network of 1,000 handheld radiation detectors in Washington

DARPA tests network of 1,000 handheld radiation detectors in Washington As the first large-scale test of the SIGMA program, DARPA put together a mock kidnapping adventure game.Participants in the exercise were each given a backpack with a small SIGMA radiation detector.

Backdoor found on some Android phones that sends personal data to Chinese server

Backdoor found on some Android phones that sends personal data to Chinese server So many companies are making and selling phones, that staggering security mistakes continue to occur from time to time.The problem: that smartphone had a rather large security hole that sent user data to a server in China.

Last-minute online Xmas shopping poses security risks

Last-minute online Xmas shopping poses security risks The recent Centrify 2016 Online Shopping Survey reveals that one in eight respondents would accept discounts and special offers from retailers in exchange for their passwords.Niall King, Centrify senior director APAC Sales, says the recent Centrify Online Shopping survey showed many consumers still make basic security mistakes.

Ransomware shuts down San Fran transit, but the hacker just got hacked

Ransomware shuts down San Fran transit, but the hacker just got hacked This week, the San Fransisco transit system experienced the latest in a growing trend of “ransomware” attacks against important pieces of infrastructure.There is some good news, though: as reported by Forbes, it seems that the hacker has had his or her own email address infiltrated in retaliation.

Why you should (or shouldn't) root your Android device

Why you should (or shouldn't) root your Android device There were several apps and tools that could root almost any Android phone or tablet, and you’d be ready to truly master your device in mere minutes.Gaining root access on Android is akin to running Windows as an administrator.

Researchers use 'guessing attack' to hack credit card in 6 seconds

Researchers use 'guessing attack' to hack credit card in 6 seconds Even if you only have part of the information, researchers from Newcastle University have worked out a way that a credit card can be stolen in as little as six seconds simply by guessing wrong really, really fast, according to PCMag.For most online transactions, all you need in order to verify a card are the account number, expiration date, and CVV.