data

Wed
12
Jun
John Lister's picture

Would You Pay for Firefox? Mozilla Says 'Yes'

Mozilla has confirmed a premium (paid) version of the Firefox browser is on the way. It says it won't charge for any features that are currently free. The details are still quite hazy and Mozilla is still considering exactly what will be in the paid ... version of the "enhanced" browser. It plans to launch it in October, 2019 and will most likely be an on-going subscription service rather than a one-off payment. (Source: techradar.com ) One feature that looks very likely to be included is a Virtual Private Network or VPN . This uses a combination of s ecure s ocket l ayer encryption ( ... (view more)

Wed
08
May
John Lister's picture

Scientists: Social Media Effects on Kids 'Trivial'

A University of Oxford study claims any negative effects of social media on teens are likely trivial. It said other life events had a far greater effect. The study used data from extensive household surveys that ran between 2009 and 2016 which ... covered a wide range of issues. The researchers mined the survey results for responses from children who were aged 10 to 15 at the time of questioning, with more than 12,000 children covered. (Source: pnas.org ) The researchers looked at questions about how many hours the children spent communicating on social networks on school days. They compared this ... (view more)

Wed
13
Mar
John Lister's picture

Apple Wants To Block Police Phone Tracking

Apple wants to patent a technology that would make it harder for police to track people's location through their phone. The technology wouldn't make messages and calls secret, but rather make it harder to prove who owned the phone in question. The ... patent is for end-to-end encryption for the mobile subscriber identification number (MSNI). That's part of a longer number that also identifies the country and mobile network a phone is registered to What's important here is that the MSNI identifies the specific handset. Police could then force a mobile carrier to hand over the ... (view more)

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Wed
23
Jan
John Lister's picture

Google Fined $50 Million For Data Violation

Google's use of data to personalize advertisements could cost it more than $50 million. It's been fined for breaching European rules on data protection. The fine comes under the General Data Protection Regulation (GDPR), a set of rules drawn up by ... the European Union and covering activity in 27 countries. It follows a complaint filed by privacy groups the day the rules came into force last May. The breach is all to do with Google's obligation to get user consent before using personal data to provide targeted ads - one of the key aspects of the company's business. Although Google does allow ... (view more)

Tue
01
Jan
John Lister's picture

Apps Share Data With Facebook, Even if No FB Account

20 popular Android apps are sharing user data with Facebook without permission, according to a new report. Privacy International says the data sharing happens even if the user doesn't have a Facebook account. The organization tested 34 apps, each of ... which have been installed at least 10 million times on Android devices. It looked at data that was transmitted through the Facebook Software Development Kit (SDK). The kit is a set of tools that are designed to help app developers coordinate their apps with the Facebook system. This is more commonly associated with retrieving data from ... (view more)

Thu
06
Dec
John Lister's picture

Quora Site Hacked; Names, Emails and Passwords Stolen

Question site "Quora" has become the latest high-profile hacking victim, with details of more than 100 million users breached. Fortunately, the implications likely won't be as serious as some previous hacks. The site lets users post questions and ... then get answers from other users. A voting system means more helpful answers from its community means the best answers float to the top. Quora says its systems were accessed without authorization and that it discovered the breach on November 30, 2018. It says the exposed information included account information such as name, email address ... (view more)

Thu
29
Nov
John Lister's picture

Web Users Warned Over Browser Green Padlock Trickery

Security researchers have warned that nearly half of all phishing sites falsely display the browser padlock symbol commonly associated with secure websites. It's a reminder that the browser padlock symbol only covers one aspect of security. Most ... major browsers display the padlock symbol when a website uses a technology, most commonly Secure Sockets Layer (SSL), to encrypt data as it passes between the user's computer and the website, or vice versa. Such sites have an address starting "https://" rather than "http://". The purpose of the padlock symbol is to indicate to the user that the ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Pages

Subscribe to RSS - data