data

Fri
11
Sep
John Lister's picture

Android 11 to Get Significant Security Boosts

Android devices will are getting some key security changes. The tweaks to the permissions system are meant to reduce the need to weigh up security against convenience. The changes will come in Android 11, which begins rolling out to handsets this ... month. Because its an open source system, the new version of the operating system will take longer to get to some brands than others, and older phones and tablets won't ever get it. The main changes are to Android's permission system, which allows users to theoretically control parts of the device's software and hardware an app can access or control ... (view more)

Tue
25
Aug
John Lister's picture

Fastest Internet Speed Record Destroyed

The new record for fastest Internet connection is quick enough to download everything on Netflix in under a second. It's safe to say the average home user won't see such speeds, but the techniques used to achieve the speeds could benefit everyone. ... The transfer was done over a fiber-optic cable between computers 25 miles apart. It reached a peak speed of 178 terabits per second. That's around 20 percent faster than the previous record and five times the speed of the fastest connections currently in regular use, namely cables running between machines in data centers. University College London, ... (view more)

Tue
09
Jun
John Lister's picture

Google Sued Over Incognito Mode

Google faces a class action lawsuit over claims it "misled users of Chrome's private browsing mode." But suggestions users are in for a $5,000 windfall are premature, to say the least. That's the minimum amount the lawsuit seeks per affected user, ... though for starters that assumes not only that the plaintiffs win the case, but that the court agrees to that amount. It also assumes the amount isn't reduced by lawyer fees and that anyone eligible is able to sign up to the case and provide any necessary proof. The crux of the case, brought in the United States District Court for the ... (view more)

Tue
12
May
John Lister's picture

Thunderbolt Flaw Could Bypass Security, Encryption

A researcher has found a major bug with Thunderbolt port technology that could undermine major security measures on multiple computer systems. There's a big mitigating factor though: an attacker would need extended physical access to the computer in ... order to carry out the exploit. Thunderbolt is a technology that is similar in concept to USB, but adds fiber optic to the usual copper wires. Compared to USB, Thunderbolt has high speed and capacity. Common uses include super-fast device charging (including laptops), 4K video, and extremely quick data transfers. Originally Thunderbolt was only ... (view more)

Tue
21
Apr
John Lister's picture

Android Store Hacked; Up to 40M Accounts Leaked

A third-party Android app store has been hit by a big data breach. Aptoide users who registered between 21 July 2016 and 28 January 2018 may be affected. Aptoide works in a same way as Google's own Play app store, but isn't subject to its content ... regulations or security vettings. As with all third-party stores, users must confirm they accept security risks when installing apps from it. A hacker has published data from 20 million users and claims to have details of another 19 million users altogether. That's a big chunk of the 150 million people Aptoide claims have used its service at some ... (view more)

Tue
03
Mar
John Lister's picture

Unsafe VPN Android Apps Threaten Privacy

Some of the most popular VPN apps for Android are dangerous to use, according to a leading review site. The VPN apps, which are supposed to protect privacy, actually expose users to attacks according to VPN Pro. A VPN, or virtual private network, is ... meant to be a way to boost privacy online. It works by re-routing traffic through a middle-man server to make it appear that your IP is in another location. When configured properly, the VPN effectively creates a secure online connection that means even though data is going through the Internet, it can't be read by anyone other than the sender and ... (view more)

Wed
22
Jan
John Lister's picture

Apple Drops Plan to Tighten iCloud Encryption

Reports suggest that Apple has been pressured by the FBI to drop plans to improve the security of its customer backups. The plan was to better encrypt backups on the iCloud service. iCloud serves two purposes: it's a way for Apple users to store ... data and documents online and access them from anywhere (from any Apple device) with a password; it's also a way to automatically backup the contents of iPads and iPhones. Data from the iCloud is stored on Apple servers in an encrypted format, which means that if somebody gained access to the files (either through a remote hack, or a physical breach ... (view more)

Tue
31
Dec
John Lister's picture

Wyze Camera, Customer Database Leaked

A "smart" security camera maker has suffered a significant data breach. No video footage was leaked, but email addresses and details of some home gadgets were exposed. Manufacture Wyze hasn't revealed full details of how the breach happened, but ... denied that the leak was due to using cloud computing in China. According to Wyze, the exposed data covered 2.4 million customers and included "customer emails along with camera nicknames, WiFi SSIDs, Wyze device information, body metrics for a small number of product beta testers, and limited tokens associated with Alexa integrations. ... (view more)

Fri
06
Dec
John Lister's picture

Mozilla Removes Security Extensions by Avast!, AVG

Mozilla has removed security tools from Avast and AVG from the Firefox extension store. It says the tools are collecting too much personal data about users. The extensions are third-party tools for the Firefox browser that add extra functionality to ... web browsing. In this case, the advertised purposes include highlighting and blocking malware that could be downloaded, and warning users when a page may be part of a phishing attack. That's where a user is tricked into typing in personal details into what they think is a legitimate site. Mozilla acted after online posts by Wladimir Palant, who ... (view more)

Tue
03
Dec
John Lister's picture

Facebook, Google Photos to Allow Data Sharing

Facebook is to let users automatically copy their uploaded photos and videos to Google's photo service. It's part of a "data portability" project between tech giants, but is also a demonstration of how slowly the project itself is moving. The tool ... will mean users can transfer files without needing to download them to their devices, then re-upload them to another service. In particular, Google's Photos service makes it easy to access photos on multiple devices. It also has automatic tagging so that users can quickly find all their photos of a particular location or activity, for example. It's ... (view more)

Pages

Subscribe to RSS - data