Items tagged with security
If you haven't changed your LinkedIn password in several years, now would be a good time to get on that. Not only is it good practice to change passwords much more frequently than that, there's a chance that your login details were compromised four years ago and are just now being shopped around in an underground...
Read more...
It's fair to say that relations between the U.S. and China are strained, especially in regards to technology. Security researchers have often traced cyberattacks big and small back to China, for which the Chinese government often denies, and there's contention over shipping products to the region. The latter is likely...
Read more...
John McAfee, the antivirus pioneer who created the self-titled AV software that was eventually sold to Intel for $7.68 billion, tried shopping a story to the media that he and his merry band of hackers thwarted WhatsApp's encryption because of a major flaw in Android. The only problem is it didn't exactly happen that...
Read more...
The rise of the Internet has forever changed the way we go about our daily lives and made certain things more convenient, but the more online services a person uses, the higher the potential privacy cost. That's been a rising deterrent for Americans, many of which now avoid certain online activities over concerns...
Read more...
Researchers at Aarhus University in Denmark caused quite the online kerfuffle when they posted personal information of nearly 70,000 users registered at OkCupid, a popular online dating website. The data dump contained usernames, ages, gender, religion, personality traits, and answers to questions designed to help the...
Read more...
The FBI ultimately dropped its suit against Apple involving the now infamous iPhone that was connected to a terrorist in the San Bernardino shooting, but the quest to set a legal precedent marches on. FBI Director James Comey hinted as much when said this week there would be more legal battles over encryption and with...
Read more...
Slack, the popular real-time messaging tool, is making it easy for users to register with and log into other services and applications. It's doing that through "Sign in with Slack," a feature that ties a person's Slack account to external services so they can use their same login information. Sounds familiar, doesn't...
Read more...
Apple would have you believe that it's iPhone devices are locked down tighter than Fort Knox, that its encryption and security schemes are so well implemented that even its own engineers would have trouble hacking a handset. But is that really the case? In a murder investigation involving an actor from The Shield, the...
Read more...
Buying into the Internet of Things (IoT) movement that's emerging means putting a great deal of trust into the cloud. It's a double-edged sword, because on the one hand the cloud is key to smart conveniences offered by IoT devices, but it also introduces risk. In case we need reminding of the latter, cybersecurity...
Read more...
It's beginning to look a lot like no website on Earth can be trusted with our important data, as attackers are attracted to any service that has a huge number of users. They're even attracted to websites that seek out attractiveness, apparently, as BeautifulPeople.com has had its mammoth user database stolen. Are you...
Read more...
Someone posted a list to Pastebin containing compromised account credentials belonging to a relatively small number of Spotify users. The list, which is few hundred names deep, contains usernames, passwords, emails, account type, and other details, seemingly suggesting the site has been hacked.
The accounts appear...
Read more...
In an attempt to kill Saddam Hussein and intimidate the enemy, United States military forces conducted a shock and awe campaign that saw a barrage of bombs dropped on Baghdad and other parts of Iraq over a decade ago. Fast forward to today and the U.S. is still dropping bombs on enemies, albeit instead of explosives...
Read more...
Sometimes you wake up not feeling real confident in yourself or your abilities and it seems as though Google might have been in that sort of mood yesterday. Had you used Google's own Safe Browsing Tool on Tuesday morning to check Google.com, as one reddit user did, you'd have discovered Google reporting its search...
Read more...
When Edward Snowden blew the whistle on the NSA's comprehensive spying efforts a few years ago, some might have thought that the agency (along with others) would cool their jets. After all, they were caught red-handed prying into our lives without our knowledge. As recent months have shown, however, the government...
Read more...
If you've ever tried to link someone to a Google Maps URL, you'll undoubtedly understand the benefit of URL shorteners. With them, we can take grossly long URLs and shorten them to a mere fraction of their original length, allowing your Facebook status update to retain a clean look and actually put a few words...
Read more...
Israeli tech firm Cellebrite has offered to help an Italian father hack into a locked iPhone 6 handset that belonged to his deceased son. It's the same tech firm that assisted the Federal Bureau of Investigation with hacking an iPhone 5c after Apple refused over fears that cracking its own security would leave...
Read more...
It's no secret that law enforcement agencies and governments at large want to have access to our personal data whether we like it or not. Hot on the heels of the FBI managing to bypass security measures that should have protected the data on a terrorist's iPhone 5c, we see that the case is definitely not closed. As...
Read more...
Picking up where the FBI left off against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-Calif) are getting ready to introduce a bill that would force companies like Apple and Google to provide "technical assistance" to government authorities trying to access encrypted data on locked devices.
"We're...
Read more...
Here's a tip for anyone who owns a smartphone (so pretty much everybody)—don't leave your handset out in the open and unattended, even if you've locked it. Case in point, an online video making the rounds showed how it was possible to bypass an iPhone's passcode using Siri to access the device's contacts and...
Read more...
A prosecutor in Arkansas will get an assist from the Federal Bureau of Investigation in a murder trial where key pieces of evidence may be contained in a pair of Apple devices. Having just recently thwarted the security on an iPhone 5c that belonged to one of the San Bernardino shooters, the FBI has agreed to help...
Read more...
The FBI dropped its case against Apple yesterday claiming it had extracted the contents of the now infamous iPhone 5c model that belonged to Syed Farook, the terrorist involved in the San Bernardino shooting, with the assistance of a third-party. It's as much a win for Apple as it is for the FBI, though instead of...
Read more...
In December, HotHardware reported that Microsoft had entered the planning stages for introducing a tweaked version of its Windows 10 operating system in China, and just three months later, the first iteration is being delivered. You have Windows 10 Pro? China has Windows 10 'Zhuangongban'. That rolls right off the...
Read more...