Data Security

Documents reveal FBI probe details on celebrity pics leak

Documents reveal FBI probe details on celebrity pics leak

In 2014, there was a big leak involving celebrity pictures that had been garnered from the victims' hacked iCloud accounts. This spurred an investigation, which has been ongoing despite news of the incident quieting down. Now details on what the investigation turned up have been revealed via a federal search warrant that has been unsealed, as well as an affidavit. According to the documents, FBI agents identified a home in southern Chicago as being one of the locations where hacking attempts (which may have been successful) took place, as well as an apartment also in Chicago.

Continue Reading

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

While you don't hear the words "trampoline" and "malware" in the same sentence very often, today it's entirely warranted. Moscow-based Kaspersky Lab, a research organization that concentrates on hackers and hacking activity, have discovered a second state-sponsored group of hackers that've created malware derived from Stuxnet. A second, that is, after the USA and Isreali group discovered in 2012, creators of the Stuxnet malware used for hacking international groups, the same malware this new group used to create their own sophisticated worm.

Continue Reading

US government to have all its websites begin using HTTPS

US government to have all its websites begin using HTTPS

As part of a new initiative to maintain security and privacy on its websites, both for users and itself, the U.S. government has announced a plan to make HTTPS a standard for all its public federal sites. The goal is to have all sites using HTTPS encryption by December 31, 2016. The White House is even sharing its proposed and final versions of the policy, posting both on Github, allowing the public to compare for themselves.

Continue Reading

Plex now streams securely over HTTPS

Plex now streams securely over HTTPS

Plex, the media server software that streams your content to different devices in your home, has just announced a big change in the name of security and encryption. Now all streams are to be delivered over an encrypted connection with HTTPS, and even better is that the change is automatic. The company says it has partnered with DigiCert to provide free SSL security certificates to users with media servers, with each one being unique. Users just need to make sure they turned on the "secure communications" option while installing Plex.

Continue Reading

NSA expanded warrantless internet surveillance in attempt to stop hackers

NSA expanded warrantless internet surveillance in attempt to stop hackers

New documents from Edward Snowden have revealed that since 2012, the US's National Security Agency has had an expanded ability to spy on Americans' internet data and communications, with no need to get a warrant. The documents were published in a New York Times article this week, and reveal that the NSA's goal is to find and stop hackers attempting cyberattacks from outside the country. Until now, this program was never disclosed to the public.

Continue Reading

Lycos aims for a comeback with password storing ring and fitness band

Lycos aims for a comeback with password storing ring and fitness band

Lycos, one of the many search engines that didn't make it past the early boom years of the Internet is coming out with some wearable tech devices. The company's current embodiment isn't the same as when it rivaled other mid-1990's search engines like Alta Vista. It was bought by Ybrant Digital in 2010. Lycos' new, wearable Lycos Life devices The Band and The Ring want to be your "personal security manager," storing passwords and personal data in lackluster packaging.

Continue Reading

Macs older than 1 year may be vulnerable to security exploit

Macs older than 1 year may be vulnerable to security exploit

A security researcher has just, reportedly, found a way to gain control of Macs using OS X. The exploits allow attackers to remotely overwrite firmware responsible for booting up the device. Once attackers isolate the flaw in a targeted machine, they could control the computer as soon as it boots up. The specific exploit discovered by Pedro Vilaca is explained in detail in an article on his blog. This attack can give a user continuous, low-level control of a Mac without any initial physical access; therefore, hackers from the other side of the globe can exploit your system.

Continue Reading

Google debuts Smart Lock password manager for automatic logins

Google debuts Smart Lock password manager for automatic logins

While Goggle's keynote at I/O 2015 yesterday was practically bursting at the seams with new information about Android M, the latest version of the mobile OS, there have also been a number of smaller, less high-profile announcements made. One such case is a new cross-device password manager they're calling Smart Lock for Passwords. At first it might sound like a basic "remember username/password" request in a browser, but it actually goes beyond that and works within Android apps too.

Continue Reading

Hola VPN is selling users’ bandwidth as botnet

Hola VPN is selling users’ bandwidth as botnet

Free virtual private network (VPN) service Hola, available as a popular Chrome extension, is well-known among users who frequently like to watch videos and TV shows from other countries that location blocked. Sadly, it has just been discovered that owners of the service have actually been selling users' bandwidth as botnet, or bulk traffic that can be purchased and used in a denial-of-service attack on a website. Hola claims this has always been clear in their terms of service, but users say they have never been made aware of this bandwidth usage.

Continue Reading

Prev 1 2 3 4 5 6 Next