Data Security

Hyatt names dates and locations of credit card breach

Hyatt names dates and locations of credit card breach

Last month we brought you the news that Hyatt had discovered malware in its credit card processing systems. Obviously, that's the last place you'd want to find malware in a hotel chain. While the company said that it was investigating the issues, we didn't get much information pertaining to how long the malware was on the system, and how many locations were affected. Hyatt has come forward today to answer those questions.

Continue Reading

Trend Micro’s Password Manager exposes your passwords to hackers

Trend Micro’s Password Manager exposes your passwords to hackers

Last month we brought you the news that a bug in the popular AVG antivirus ended up exposing the private data of 9 million users. While we see this sort of thing all too regularly from companies, it's especially upsetting when it comes from a program that's specifically designed to keep your data safe. Unfortunately, only a couple of weeks later, we've got word that another popular antivirus suite left peoples' information wide open.

Continue Reading

Apple patents fingerprint uploads and cloud storage

Apple patents fingerprint uploads and cloud storage

Apple patent shows methods for iPhone to save fingerprint information, upload to the cloud, and download on another iPhone. Filed in August of 2015, this patent appears to have been a "continuation in part" of a patent application from July of 2013, a patent which has now been "abandoned" in favor of this new listing. This new patent application suggests that Apple devices with fingerprint sensors would first collect fingerprint information, as they do today, but that they would also be capable of uploading that information to the cloud for storage.

Continue Reading

Google to offer $1 million in security grants next year

Google to offer $1 million in security grants next year

When you upload files to the cloud, you expect them to be safe from prying eyes. Unfortunately, there are people out there that spend their time trying to break into servers just to access whatever is being stored inside. Google understands this, and that's why they're dedicating a huge chunk of money to people who want to keep their servers safe.

Continue Reading

BlackBerry exits Pakistan amid demands for backdoor access

BlackBerry exits Pakistan amid demands for backdoor access

The folks at BlackBerry have announced that they're leaving Pakistan as soon as possible. Apparently the government in said country isn't too keen about BlackBerry keeping their cellular information to themselves, and want full, unfettered access to the information about and within BlackBerry's BES e-mail and BES BBM messaging systems - all BlackBerry Enterprise Service traffic. BlackBerry will be doing nothing of the sort. They won't hand over access to the systems to the Pakistani government, so they'll be leaving the country very, very soon.

Continue Reading

UK police arrest 5th teen connected to TalkTalk hacking

UK police arrest 5th teen connected to TalkTalk hacking

It's been a few weeks since we've heard from UK officials investigating the hacking of telecom company TalkTalk. The cyberattack, and subsequent ransom demand, occurred in late October, with police making the first arrest several days later. The Metropolitan Police have now revealed they've made a fifth arrest, with the suspected hacker being yet another teenager. With a search warrant in hand, officers visited the 18 year old boy's home in Wales, arresting him on suspicion of blackmail.

Continue Reading

Hilton probe finds some hotel payment systems were breached

Hilton probe finds some hotel payment systems were breached

In late September, a report surfaced claiming that some Hilton properties had been hit with a data breach, leaving customers’ payment cards vulnerable. Hilton had responded with the promise of an investigation, saying it took the matter “very seriously.” In a statement released to customers today, Hilton Worldwide announced that the report was true, and that some of its point-of-sale systems were hacked.

Continue Reading

What you need to know about Dell’s self-signed certificate blunder

What you need to know about Dell’s self-signed certificate blunder

Whoops, said Dell, effectively, we're going to have to go ahead and remove this bit of software from your computer before it becomes a problem. This week Dell was discovered to have installed a piece of code by the name of "eDellRoot" on a number of Dell computers. This code is a "certificate" inserted by Dell that would allow them to access a Dell computer when it needed to be serviced - when you call tech support, for example. Unfortunate for them, this certificate also left a hole in the security of the computers in which it was installed.

Continue Reading

1 2 3 4 5 Next