Items tagged with security

It's a dangerous online world out there and to keep the bad guys at bay, many companies require that employees use two-factor authentication. Typically the second method of verification entails tapping a Security Key or entering a verification code that's sent to a mobile device, but to make things easier Google is adding a third method, an approval prompt that pops up on a user's phone.This is something that's built right into the latest version of Google Play Services, which gives just about every Android user access to the feature. If you're rocking an iOS device, don't sweat it, you just need... Read more...
We wrote earlier about the kind of success Google has been seeing with its Android bug bounty program -- success that has led the company to actually increase its rewards. Over the years, we've seen other major companies offer bug bounties as well, such as Facebook and Microsoft, so it's clear that they can provide some real value. Could that value be important enough for the US government to get in on the action? It appears that "yes", it certainly can. In a new report from the Pentagon, the groundwork is laid for future programs that target much more than some front-facing websites, which is... Read more...
If you've shopped at Acer's US website at any point between May 12, 2015 and April 28, 2016, you have immediate reason for concern. Acer has just revealed to the California Attorney General's office that its ecommerce servers were hit last spring, and remained vulnerable up until this spring. Unfortunately, this isn't a mere case of someone gaining access to names and addresses - it gets much worse. Acer admits that credit card information could have been fetched by these third parties, which includes not only the credit card number, but also the CCV security code and expiry date. It's not clear... Read more...
Has it been a long time since you've changed up your passwords? Now is a good time to think about doing so. A hacker or band of hackers obtained the login credentials of 45 million Internet users spread across 1,100 websites and communities, including many major and popular online destinations  such as Motorcycle.com, Mothering.com, and others. The folks at LeakedSource, a breach notification website, says VerticalScope and all of its domains were hacked in February of this year. It's not known how the attack was carried out, though LeakedSource surmises that VerticalScope stored too much... Read more...
It doesn't matter who you are or how much money you make, if you don't practice good security habits on the web you're likely to get hacked. Case in point, Mark Zuckerberg, the billionaire whiz kid and co-founder of Facebook, the most popular social media site on the planet, had his Twitter and Pinterest accounts hacked into over the weekend. To be fair, Zuckerberg is a bigger target than most people, but that wasn't the real reason his social media accounts outside of Facebook were compromised. It's because he was lazy with security, both with the password he chose and in reusing the same one... Read more...
There are enough bad drivers on the road as it is, but what's particularly frustrating is seeing a fellow motorist drive recklessly as a result of using a mobile phone. Jason R. Humphrey from Florida must have seen it one too many times, hence his decision to use a cell phone jammer during his commute. That decision will cost him tens of thousands of dollars. The Federal Communications Commission fined Mr. Humphrey $48,000 for using a cell phone jammer in his car going to and from his place of employment in Tampa. Mr. Humphrey managed to evade detection and interfere with cellular service along... Read more...
We don't need to tell you that Apple has been dealing with some extreme issues revolving around encryption in recent months. Most of the hassle was spurred back in December when the FBI wanted the Cupertino company to help break into a terrorist's iPhone 5c, something it refused to do. As time went on, the FBI figured out its own solution to getting in, much to Apple's chagrin. Since then, government agencies have made use of this newfound power to gain access to consumer iPhones, and that has guaranteed just one thing: hardware vendors are going to push even harder to make sure this isn't possible... Read more...
Using passwords as a form of security may not be long for this world, not if Google gets its way. The Mountain View outfit's ATAP (Advanced Technology and Projects) division is hard at work on Project Abacus, a scheme that relies on biometric data to determine a person's identity rather than relying on traditional password input. Core to Project Abacus is a "Trust Score" that takes into account a variety of factors. One of the biggest ones is your physical location, though it's far from the only way Project Abacus calculates the likelihood that you are who you claim to be. It also analyzes things... Read more...
If you haven't changed your LinkedIn password in several years, now would be a good time to get on that. Not only is it good practice to change passwords much more frequently than that, there's a chance that your login details were compromised four years ago and are just now being shopped around in an underground marketplace. A hacker who goes by the name "Peace" is shopping around account information of 117 million LinkedIn users. The data was stolen during a security breach at LinkedIn in 2012, at which time around 6.5 million encrypted passwords were posted to the web. LinkedIn never said how... Read more...
It's fair to say that relations between the U.S. and China are strained, especially in regards to technology. Security researchers have often traced cyberattacks big and small back to China, for which the Chinese government often denies, and there's contention over shipping products to the region. The latter is likely to escalate as China ramps up its security reviews on U.S. tech companies such as Apple and Microsoft.China has a deep distrust of technology products originating from the U.S. As a result, China's been conducting more intensive reviews of tech companies with a focus on encryption... Read more...
John McAfee, the antivirus pioneer who created the self-titled AV software that was eventually sold to Intel for $7.68 billion, tried shopping a story to the media that he and his merry band of hackers thwarted WhatsApp's encryption because of a major flaw in Android. The only problem is it didn't exactly happen that way.WhatsApp is an interesting target because it recently announced the addition of end-to-end encryption. It's also the most used messaging application in the world with over a billion users, so if there's a flaw in Android, the most popular mobile OS on the planet, that compromises... Read more...
The rise of the Internet has forever changed the way we go about our daily lives and made certain things more convenient, but the more online services a person uses, the higher the potential privacy cost. That's been a rising deterrent for Americans, many of which now avoid certain online activities over concerns about privacy and security, according to a recent study by the National Telecommunications & Information Administration. NTIA combed over survey data collected by the U.S. Census Bureau, which included answers to several privacy and security questions by more than 41,000 households... Read more...
Researchers at Aarhus University in Denmark caused quite the online kerfuffle when they posted personal information of nearly 70,000 users registered at OkCupid, a popular online dating website. The data dump contained usernames, ages, gender, religion, personality traits, and answers to questions designed to help the site find matches for singles. Lead author Emil Kirkegaard and his research partner Julius Daugbjerg Bjerrekaer zeroed in on OkCupid "because users often answer hundreds of not thousands of questions," making it a rich and readily available source of survey data. The information obtained... Read more...
The FBI ultimately dropped its suit against Apple involving the now infamous iPhone that was connected to a terrorist in the San Bernardino shooting, but the quest to set a legal precedent marches on. FBI Director James Comey hinted as much when said this week there would be more legal battles over encryption and with regards to forcing tech companies to help law enforcement access data on electronic devices.It's not game over, in other words. Though the FBI ultimately didn't need Apple's help in extracting data from the iPhone 5c model it confiscated from a dead terrorist who had locked the handset... Read more...
1 2 3 4 5 Next ... Last