Data Security

Google unveils tools that track and secure your online life

Google unveils tools that track and secure your online life

Used to be identity theft only revolved around cards and social security numbers, but these days our virtual identities are just as important and even more vulnerable. With the enermous power that it wields over our Internet lives, Google is in the prime position to help mitigate the effects or sometimes even prevent incidents from happening in the first place. That is why it is releasing two new security tools that will let users check up on their online activity and, if necessary, batten down the hatches.

Continue Reading

Symantec discovers highly sophisticated Regin spyware

Symantec discovers highly sophisticated Regin spyware

Malware, even the spying kind, isn't uncommon, but it is quite rare to come across something as complex, modular, sophisticated, and long-lasting as the Backdoor.Regin that Symantec uncovered. This particular Trojan has managed to evade detection and forensic tools and in fact might still have some form out there. And it has been going around since circa 2008. This makes it a very dangerous tool in the hands of the very wrong people, and a bit of speculation suggests that it might indeed be the work of a nation state.

Continue Reading

Detekt tool hunts down government spyware on your PC

Detekt tool hunts down government spyware on your PC

Government surveillance is a hot topic, and as news about the extent of such monitoring keeps coming, many individuals have wondered at one point or another whether any of their own data is under some agency's watchful eye. To help (potentially) ease your paranoia is a new open-source malware tool called Detekt, which its maker Claudio Guarnieri -- with support from the Electronic Frontier Foundation -- says will help you determine whether your computer is infected. The malware detector is available for Windows users.

Continue Reading

BitTorrent Sync Beta Review: we’re ready for 2.0

BitTorrent Sync Beta Review: we’re ready for 2.0

The basic premise for BitTorrent Sync is sound: send a folder to a friend or colleague from your device to theirs in as simple a fashion as possible. You can keep that connection open indefinitely, or your can close it after a short period of time. It doesn't rely on cloud servers to do the work, it relies on your computer and the computer you're sharing with. Next year, BitTorrent will be releasing Sync 2.0 and a Pro edition for those users that wish to roll with premium features.

Continue Reading

Snapchat is asking users to stop using third-party apps

Snapchat is asking users to stop using third-party apps

The knock on Snapchat of late is that it’s not secure. That’s a largely fair complaint about the service, which has given up plenty of data to hackers, even though it’s meant as a ephemeral service that keeps nothing. Snapchat blamed third-party apps for the vulnerability, and today have taken the first steps toward securing their platform. Or at least educating users on the difference between Snapchat and a third-party app. In a bold move, Snapchat is actively asking users to stop using those off-brand apps.

Continue Reading

US DOJ accused of stealing cellphone data via “dirtyboxes”

US DOJ accused of stealing cellphone data via “dirtyboxes”

A troubling new report suggest the Department of Justice has been engaging in a practice that gave them data from your smartphone, but it’s not what you might think. Rather than wiretaps and hacking, the DOJ is instead accused of flying overhead with a device that spoofed a signal tower your carrier would have. In fooling your phone into thinking it was simply searching for a signal, the DOJ was pinching the data from it. The reason given? The never-ending hunt for criminals.

Continue Reading

Apple questioned by FTC over HealthKit data

Apple questioned by FTC over HealthKit data

Apple’s HealthKit may be ahead of the curve when it comes to platforms and data gathering from multiple sources, and the FTC wants to know how Apple will handle the data we give up. According to Reuters, Apple has been approached by the FTC in a fact-finding mission to discover how our health-related data will be used. More importantly, the FTC wants to know the data is secure, and won’t be sold to any third-parties along the way.

Continue Reading

Samsung, Blackberry double-team enterprise data security

Samsung, Blackberry double-team enterprise data security

Is the most secure of both worlds? It sure sounds that way. Samsung and Blackberry have come together, but it won’t be for a weird new phone. This time, both companies are taking their respective security platforms, and combining them into a single effort. Blackberry’s BES12 and Samsung’s KNOX will partner for an end-to-end security solution, which will be made available on all Galaxy phones that currently have KNOX. Their target market? You guessed it — the coveted enterprise space.

Continue Reading

US Postal Service employee, customer details hacked

US Postal Service employee, customer details hacked

If you thought only retail chains like Home Depot and Target or commercial services like Apple's iCloud are the only victims of data breaches, better thinking again and rethink your outlook on personal information security. The US Postal Service has just disclosed that it was the target of a cybercrime that compromised personal information stored in its databases. But unlike other data breaches, this one actually didn't affect customers as much as it did the USPS' own employees, with attackers able to run off with critical pieces of information.

Continue Reading

Everkey Kickstarter aims to replace passwords with wearable

Everkey Kickstarter aims to replace passwords with wearable

It's no doubt by now that we are living in the age of wearables. While most offer a combination of features such as telling time, ways to interact with messages, and number of health tracking options, Everkey hopes to use the wrist space to replace traditional passwords with a digital authenticator. They're Kickstarting their device with a hope of changing the task of logging in to simply being in physical proximity.

Continue Reading

1 2 3 4 5 Next