security

Mon
03
Mar
Brandon Dimmel's picture

Gov't, Hackers Spy on Yahoo Messages, Video: Report

A new report shows that Yahoo instant messages can be easily intercepted and read by government spies and hackers. The problem: Yahoo fails to encrypt those messages. A recent study by CNET shows that Yahoo continues to transmit message content in ... unencrypted form. This makes the instant messages vulnerable and exploitable by third parties. To compound the problem, a recent article by UK-based The Guardian shows that a number of government agencies are, in fact, spying on Yahoo's unencrypted messages. (Source: cnet.com ) Government Agents Spying on Everyday People Worse still, evidence ... (view more)

Thu
27
Feb
Brandon Dimmel's picture

Would You Buy A Smartphone That Self-Destructs?

Boeing is reportedly working on a new smartphone capable of self-destructing if lost or stolen. Reports suggest the device will be targeted at people -- like politicians, law enforcement officials, and corporate executives -- who store lots of ... sensitive information on their smartphones. At this point Boeing's smartphone, which is simply called "Black", is at the patent filing stage. If it eventually heads into production, the device will run a variant of the Android operating system (OS). It's expected Black will feature USB, HDMI, and SIM storage and will support various ... (view more)

Wed
26
Feb
John Lister's picture

Kaspersky Targets Windows Phone with 'Safe' Browser

Security firm Kaspersky has released a special web browser for Windows phones aimed at blocking unwanted threats. The browser, "Kaspersky Safe Browser for Windows Phone" app, is available to download free of charge from the official Windows Phone ... Store. The main security feature is to block web links that may take a user to a harmful site. This isn't just sites that house malicious software that could damage a phone, but also "phishing" sites. (Source: kaspersky.com ) A phishing site is one that is set up to look like the real website of a legitimate company, for ... (view more)

Fri
21
Feb
John Lister's picture

Microsoft Issues Emergency Fix for IE 9, 10 Users

Microsoft has released a temporary fix to an important security bug affecting two recent versions of Internet Explorer. The exploit has been linked to attacks that compromised a website for US military veterans. The bug affects Internet Explorer ... versions 9 and 10. It does not affect version 11, nor anything previous to version 9. That said, using an earlier version Internet Explorer less than what is currently available (depending on which version of Windows you're running) is definitely not advised. JavaScript Bug Exploits Drive-by Download Attack The exploit involves JavaScript, a ... (view more)

Thu
20
Feb
Brandon Dimmel's picture

Internet-enabled Cars Vulnerable to Attack, says Expert

Is your car less likely than your desktop computer to be infected with malware? The answer may surprise you. Security expert Mark O'Neill believes that automotive companies need to think very carefully about protecting the high-tech vehicles they're ... now offering consumers in greater numbers than ever before. O'Neill currently serves as vice president of innovation at UK-based software firm Axway. His scary prediction for 2014 is that we'll see far more hackers target vehicles than in previous years. More Malicious Attacks Coming, Expert Says "I think we are going to see ... (view more)

Tue
18
Feb
John Lister's picture

New Tech Pairs Cellphone, Sound for Secure Logins

If Google's latest acquisition is any indication, sound could be the key to enhanced login security. Set up by former members of the Israeli military, SlickLogin is based around high-frequency tones, virtually inaudible to the human ear. In theory ... the system could be used as the main way to log in to a site, but Google seems more likely to use it for two-factor authentication. The idea of two-factor authentication is to combine two different types of security measure: something you know, and something you have. With the system Google already uses, the 'something you know' is your ... (view more)

Thu
12
Dec
Dennis Faas's picture

Microsoft Unveils New Security Features

Microsoft has unveiled several new security features designed to help users protect their accounts against hackers. The list includes a recent activity log, security email notifications, and changes to two-step verification. The new features apply ... to Microsoft Accounts, or the platform used by Microsoft for its various online services, including SkyDrive, Office 365, Xbox Live, etc. Because many Microsoft Accounts contain sensitive information -- from email addresses to credit card and banking data -- the Redmond, Washington-based firm is taking security very seriously. Activity Log Shows ... (view more)

Fri
06
Dec
Dennis Faas's picture

Kaspersky Lab Names World's Top Security Threats

Russian security firm Kaspersky Lab has released a list of the top security threats facing the world right now. Leading the pack: ransomware like 'CryptoLocker' and cyber espionage, like the work carried out by the United States' National Security ... Agency (NSA). Kaspersky says the past year has seen a number of cyber espionage tools used on the web. Some, like "Red October", "NetTraveler", and "MiniDuke", are sophisticated tools designed to help professional spies and advanced hackers infiltrate government agencies. MiniDuke was used to steal sensitive data from dozens of organizations and ... (view more)

Wed
04
Dec
Dennis Faas's picture

NSA Using Adult Websites to Shame Terrorists

A leaked document shows the National Security Agency (NSA) is trying to use adult websites to discredit people suspected of participating in terrorism campaigns targeting Americans. However, critics suggest it's a flawed approach that could hurt ... innocent civilians. The document was leaked by former NSA contractor Edward Snowden. It refers to agents gathering together evidence on "radicalizers" whose "private and public behaviors are not consistent". In other words, in private these radicalizers do things they would not want other people to know about. The suggestion is that releasing this ... (view more)

Tue
19
Nov
Dennis Faas's picture

Google Patches Security Flaws Exposed by 'Pwn2Own'

Google has already patched a security flaw exposed by a public hacking contest. Chrome and Internet Explorer were both hacked at the Tokyo event, though contestants said doing so is getting tougher all the time. The contest is called "Pwn2Own," and ... the idea behind it is that the first person to successfully hack a computer or mobile device wins the compromised hardware and a cash prize. But winning is really about gaining prestige in the security community. Similar contests have concentrated on desktop computers, but this event focused on mobile devices. One participant successfully ... (view more)

Pages

Subscribe to RSS - security