data

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Wed
23
Jan
John Lister's picture

Google Fined $50 Million For Data Violation

Google's use of data to personalize advertisements could cost it more than $50 million. It's been fined for breaching European rules on data protection. The fine comes under the General Data Protection Regulation (GDPR), a set of rules drawn up by ... the European Union and covering activity in 27 countries. It follows a complaint filed by privacy groups the day the rules came into force last May. The breach is all to do with Google's obligation to get user consent before using personal data to provide targeted ads - one of the key aspects of the company's business. Although Google does allow ... (view more)

Tue
01
Jan
John Lister's picture

Apps Share Data With Facebook, Even if No FB Account

20 popular Android apps are sharing user data with Facebook without permission, according to a new report. Privacy International says the data sharing happens even if the user doesn't have a Facebook account. The organization tested 34 apps, each of ... which have been installed at least 10 million times on Android devices. It looked at data that was transmitted through the Facebook Software Development Kit (SDK). The kit is a set of tools that are designed to help app developers coordinate their apps with the Facebook system. This is more commonly associated with retrieving data from ... (view more)

Thu
06
Dec
John Lister's picture

Quora Site Hacked; Names, Emails and Passwords Stolen

Question site "Quora" has become the latest high-profile hacking victim, with details of more than 100 million users breached. Fortunately, the implications likely won't be as serious as some previous hacks. The site lets users post questions and ... then get answers from other users. A voting system means more helpful answers from its community means the best answers float to the top. Quora says its systems were accessed without authorization and that it discovered the breach on November 30, 2018. It says the exposed information included account information such as name, email address ... (view more)

Thu
29
Nov
John Lister's picture

Web Users Warned Over Browser Green Padlock Trickery

Security researchers have warned that nearly half of all phishing sites falsely display the browser padlock symbol commonly associated with secure websites. It's a reminder that the browser padlock symbol only covers one aspect of security. Most ... major browsers display the padlock symbol when a website uses a technology, most commonly Secure Sockets Layer (SSL), to encrypt data as it passes between the user's computer and the website, or vice versa. Such sites have an address starting "https://" rather than "http://". The purpose of the padlock symbol is to indicate to the user that the ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Thu
18
Oct
John Lister's picture

New 'LiFi' Gets 8 Gigabit Speed; Faster than WiFi, 5G

Light could be the key to solving one of the big problems of faster mobile Internet. But the technology, which uses spotlights to send out signals, has some limited range of uses. The technology developed by pureLiFi works on a simple principle: ... rather than using radio waves to transmit data (as does WiFi), it uses light waves. A demo of the system uses ceiling spotlights which blast out light in a cone shape. To the human eye it looks like an ordinary constant light supply. In fact it's actually flickering at incredibly high speeds to create a pattern. 5G Signals Hurt By Walls A plug-in ' ... (view more)

Wed
10
Oct
John Lister's picture

Google+ Social Network Bites Dust amid Data Breach

Google is to shut its social network Google+. Although the service was something of a flop, the closure is more to do with a massive data exposure. Google+ launched back in 2011 and was one of several attempts by the company to compete with the ... likes of Facebook. Its main selling point was the concept of Circles, which meant that users weren't restricted to sharing posts and updates with a fixed set of friends. Instead, they could write a post that was seen by a particular group, such as work colleagues or people with a shared hobby. Facebook does have such a feature, but it's not as ... (view more)

Mon
01
Oct
John Lister's picture

Report: Google Maps For Pedestrians 'Not Safe Enough'

Google is under pressure to provide safer routes for pedestrians in its mapping tools. It's previously done so for cyclists, though hasn't yet pleased everyone. The latest call comes in international business newspaper the Financial Times. Special ... reports writer Madison Darbyshire highlighted a recent walk from a concert venue to a stop for a late night bus in which she used Google's suggested walking route. According to Darbyshire, "I found myself meandering along unlit side streets and away from the traffic that makes the city feel alive at all hours." (Source: ft.com ) Pedestrians Offer ... (view more)

Pages

Subscribe to RSS - data