One of the downsides to the news cycle is that no matter how big or hot a story is, something else inevitably comes along. The advent of ISIS and Ebola, combined with the passing of time, have pushed national security concerns out of the limelight -- until, that is, someone at the NSA helps out by reminding us that... Read more...
In case you hadn’t heard, data breaches are a problem--a huge problem--and to quantify that somewhat, New York AG Eric Schneiderman released a report detailing his state’s data breach information including the costs involved. There’s a lot of meaty data in the report, but one part that stands out is... Read more...
The news of two truly horrible security breaches broke this year; one was the NSA’s shadowy data grabbing and surveillance program, and the other was the Heartbleed bug that left about two-thirds of the Internet utterly exposed to any bad actor. According to a Bloomberg report, these two stories have merged, as “two people familiar... Read more...
If you’ve ever wondered how exactly NSA whistleblower Edward Snowden was able to access as much as he did, it’s apparently because he had help. According to an L.A. Times report, at least three other NSA workers helped him--wittingly or not. An NSA memo says that one of the three was an active-duty... Read more...
According to a new report, the NSA once paid the RSA Security $10M to implement a flawed security standard as the default protocol in its products. This new information builds on allegations from September that claimed the RSA had deployed a flawed, broken cryptographic standard. The new allegations, like much of what... Read more...
This summer, company founder Ladar Levison shut down his secure email service, Lavabit, rather than comply with data requests from the NSA. There is a widespread assumption that Lavabit was the email service used by whistleblower Edward Snowden, so any requests that Lavabit received were perhaps more targeted than... Read more...
The issues of security and privacy should always be on our minds, but ever since the revelation of NSA spying played out this past summer, those issues have been forced to the forefront - impossible to avoid. In reality, that's a great thing... we should be concerned about our privacy and definitely about our... Read more...
The average Internet user probably has no idea what "Tor" is. If you're one of those users, you've probably had no good reason to even investigate what it is, what it does, or how it hides. But if you're the NSA, you're acutely aware of Tor, and a new report suggests that both the NSA and GCHQ have had their sights on Tor. In simple terms,... Read more...
The train carrying a vast amount of NSA confidential information continues to trek along today, with a revelation that the government agency conducted man-in-the-middle (MITM) attacks involving a couple of the Web's largest companies. Falling under the guise of "FLYING PIG", one of the main traffic sources to... Read more...
Over the past few months, as the Snowden leaks have exposed increasing levels of detail about the scope and nature of the NSA's "oversight" of the Internet, there's been a great deal of discussion on how users can protect themselves. The latest leaks from the Guardian, New York Times, and Pro Publica shed light on... Read more...
Tired of changing passwords yet? Well, if you're a member of the NASDAQ OMX Group forums, your wish is still pending. The forum, where users can discuss stock happenings throughout the day, has been revealed to have been exploited, with an unknown number of usernames and passwords at risk. NASDAQ's OMX Group has said that it's reset all user... Read more...
When Oracle released its Java Update 11 earlier this week, it patched several zero-day exploits that security researchers had previously identified. Nevertheless, a number of firms still recommended uninstalling Java due to a number of remaining bugs. It's taken less than a week for new flaws to surface -- and these... Read more...
Nokia can ill-afford any missteps as it attempts to rebuild its brand into a major smartphone player, so it's a little concerning on a number of levels that it was caught intercepting Internet traffic on its phones and redirecting the data through its own server farm. Is Nokia engaging in so-called man-in-the-middle... Read more...
MasterCard is launching a new high tech card in Singapore that features an LCD display and a built-in keyboard. The card looks and functions just like a regular credit card but with the addition of the LCD screen and touch-sensitive buttons. MasterCard calls it Display Card technology. There are a number of banks and sites that require users... Read more...
According to new research sponsored by HP, the cost and frequency of cybercrime has increased for the third straight year. The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three... Read more...
While everyone is bringing their own mobile devices to work, those phones might as well be put to work contributing to building security; at least that’s the purview of HID Global, which announced the results of a pair of pilot studies using NFC technology in employee smartphones to (physically) open doors at... Read more...
Maybe it's because all the script kiddies are out of school for the summer, or perhaps there's something in the water that's to blame for the recent rash of hacker attacks. Whatever the reason, security breaches are once again starting to pile up. Following on the heels of a hack attack that compromised the passwords... Read more...
Have trouble keeping up with your belongings? Who doesn't right? UK's own TenBu has a solution that's probably perfect for your dilemma, and lo and behold, it involves that short-range communication module that's used far too infrequently on your current mobile. The simply titled nio Bluetooth tag is hailed as a personal gadget guardian, and... Read more...
Protection One is now offering an iPhone application that lets you access your home's security panels and receive real-time security updates from an iPhone or iPod Touch. The new eSecure application allows users to confirm that their security system is armed while away from home. Should you need to send a contractor or someone else into the... Read more...
Face it. A USB flash drive can be a really great way to carry around data you need to get your hands on when you're away from your computer or network.Problem is, you're not gonna put anything too sensitive on it for fear of losing it.Which brings you back to square one, getting access to important files on the go.Check this out: IronKey S200... Read more...
Notebook Computer Study Reveals Security Implications of Mobile Workforce Study Uncovers Surprising Financial Repercussions of Lost and Stolen Notebooks SANTA CLARA, Calif., April 22, 2009 – An independent study on notebook security, commissioned by Intel Corporation, analyzes the potential business costs of stolen or lost notebook computers,... Read more...
We had all been warned: April 1 was the day that the infamous DOWNAD/Conficker worm was supposed to activate and do its dastardly deeds, whatever they might be. The day came and went without a whimper of Conficker-initiated destruction, although that didn't stop countless media outlets from reporting on it (HotHardware included). Conficker... Read more...
Prev 1 2 3 4 5 Next