Stopping the black-hat hackers of the world is a tough proposition, but that’s Google’s newest aim. Project Zero, which was announced this morning by Google Security Engineer Chris Evans, aims to stop zero-day exploits by creating an open source platform. This new project also has no bounds, and won’t be limited to Google products.
Boeing and other companies were the subject of a hacking effort by suspect Su Bin, who is said to have worked with two unnamed Chinese hackers in an effort to nab data on military projects. Details on the hacking surfaced Friday following a criminal complaint filed in Los Angles that was unsealed this past Thursday.
Many of us update to new smartphones fairly frequently, and many elect to sell their old phone on eBay or elsewhere, doing a quick factory reset beforehand. To demonstrate that such a method isn't adequate enough to protect your privacy, security company Avast bought 20 used phones and set out to see how much data it could harvest from them.
At Google I/O 2014, Android and Chrome boss Sundar Pichai went right up front with Android Security upgrades. Google’s next step in Android security in Android L is to push security patches through Google Play instead of Android updates - making the whole process more secure and reliable.
Remote Control System malware has been identified by the folks at Kaspersky Lab this week as affecting both iOS (iPhone) and Android devices across the planet. This system is said to be controlled by an international infrastructure which allows this "legal" spyware to take hold of devices at the hands of the company known as HackingTeam.
In April of this year a security hole called Heartbleed was revealed as one of the largest of its kind in history. The vast majority of websites on the internet were left open to this bug, only being patched after many, many years of being left open for any hacker to take advantage of. Now - even two months after its discovery, well over 300,000 web servers are still unpatched.
Cloud storage services like Dropbox have made it simple to store and share files with family, friends, and coworkers. Unsurprisingly, unscrupulous individuals have also managed to pervert those features to spread malware, in particular, the kind that holds your files hostage until you pay a sweet fee, as narrated by anti-phishing company PhishMe.
Allegations that the Chinese government is using smartphones to spy on other nations have been around for a while - back in October 2012, for example, US lawmakers expressed concern over potential espionage. Despite the White House having found no evidence to support the concern, many have still proceeded carefully with the use of Chinese handsets, and now one has been spotted with pre-loaded spyware.
Our devices have a lot of information about us, and we give them more and more every day. The information stored within our smartphones and tablets also links to a bigger entity, stored in some mysterious cloud somewhere. When you give up a device, either selling it or via trade-in, do you clear all the data? Here’s why you should -- and how.
Recently, Comcast made news by opening up home WiFi routers for use publicly. By partitioning your WiFi signal, the company hopes to blanket an area with a signal. This has become a polarizing issue, but shouldn’t be for the reason of coverage alone. WiFi everywhere isn’t a new concept — in fact, it was the original concept for the phone you might be reading this on.
There has been a lot of news today about DDoS; Feedly went down, and at the time we publish this article, still is. Those types of attacks happen often, and can cause some major headaches. What are they, though? Are you at risk if it happens? We explain DDoS in layman's terms to help you understand a bit about what’s going on.