Data Security

Iranian hackers breached global companies, say researchers

Iranian hackers breached global companies, say researchers

Cylance, a US-based cyber security firm, has reported that Iranian hackers have breached "top" companies across the globe, including aerospace firms, energy companies, universities, and more. Affected companies are located in the US, France, Germany, China, England, Saudi Arabia, India, and Israel, according to the researchers, and were targeted under an effort that has been ongoing for the past couple years. Though no specific companies have been specified, the infiltration could let the hackers cause physical damage in due time.

Continue Reading

Sony Pictures movies leaked online following network hack

Sony Pictures movies leaked online following network hack

Following the news last week of the hacking of Sony Pictures' network by a group calling themselves "#GOP," or Guardians of Peace, DVD screener copies of several of the studio's movies have been leaked online. As was previously reported, the hackers threatened Sony with a list of unspecified demands, saying sensitive data would be released if the movie studio didn't cooperate. It appears that this could be the first of such leaks.

Continue Reading

Google unveils tools that track and secure your online life

Google unveils tools that track and secure your online life

Used to be identity theft only revolved around cards and social security numbers, but these days our virtual identities are just as important and even more vulnerable. With the enermous power that it wields over our Internet lives, Google is in the prime position to help mitigate the effects or sometimes even prevent incidents from happening in the first place. That is why it is releasing two new security tools that will let users check up on their online activity and, if necessary, batten down the hatches.

Continue Reading

Symantec discovers highly sophisticated Regin spyware

Symantec discovers highly sophisticated Regin spyware

Malware, even the spying kind, isn't uncommon, but it is quite rare to come across something as complex, modular, sophisticated, and long-lasting as the Backdoor.Regin that Symantec uncovered. This particular Trojan has managed to evade detection and forensic tools and in fact might still have some form out there. And it has been going around since circa 2008. This makes it a very dangerous tool in the hands of the very wrong people, and a bit of speculation suggests that it might indeed be the work of a nation state.

Continue Reading

Detekt tool hunts down government spyware on your PC

Detekt tool hunts down government spyware on your PC

Government surveillance is a hot topic, and as news about the extent of such monitoring keeps coming, many individuals have wondered at one point or another whether any of their own data is under some agency's watchful eye. To help (potentially) ease your paranoia is a new open-source malware tool called Detekt, which its maker Claudio Guarnieri -- with support from the Electronic Frontier Foundation -- says will help you determine whether your computer is infected. The malware detector is available for Windows users.

Continue Reading

BitTorrent Sync Beta Review: we’re ready for 2.0

BitTorrent Sync Beta Review: we’re ready for 2.0

The basic premise for BitTorrent Sync is sound: send a folder to a friend or colleague from your device to theirs in as simple a fashion as possible. You can keep that connection open indefinitely, or your can close it after a short period of time. It doesn't rely on cloud servers to do the work, it relies on your computer and the computer you're sharing with. Next year, BitTorrent will be releasing Sync 2.0 and a Pro edition for those users that wish to roll with premium features.

Continue Reading

Snapchat is asking users to stop using third-party apps

Snapchat is asking users to stop using third-party apps

The knock on Snapchat of late is that it’s not secure. That’s a largely fair complaint about the service, which has given up plenty of data to hackers, even though it’s meant as a ephemeral service that keeps nothing. Snapchat blamed third-party apps for the vulnerability, and today have taken the first steps toward securing their platform. Or at least educating users on the difference between Snapchat and a third-party app. In a bold move, Snapchat is actively asking users to stop using those off-brand apps.

Continue Reading

US DOJ accused of stealing cellphone data via “dirtyboxes”

US DOJ accused of stealing cellphone data via “dirtyboxes”

A troubling new report suggest the Department of Justice has been engaging in a practice that gave them data from your smartphone, but it’s not what you might think. Rather than wiretaps and hacking, the DOJ is instead accused of flying overhead with a device that spoofed a signal tower your carrier would have. In fooling your phone into thinking it was simply searching for a signal, the DOJ was pinching the data from it. The reason given? The never-ending hunt for criminals.

Continue Reading

Apple questioned by FTC over HealthKit data

Apple questioned by FTC over HealthKit data

Apple’s HealthKit may be ahead of the curve when it comes to platforms and data gathering from multiple sources, and the FTC wants to know how Apple will handle the data we give up. According to Reuters, Apple has been approached by the FTC in a fact-finding mission to discover how our health-related data will be used. More importantly, the FTC wants to know the data is secure, and won’t be sold to any third-parties along the way.

Continue Reading

Samsung, Blackberry double-team enterprise data security

Samsung, Blackberry double-team enterprise data security

Is the most secure of both worlds? It sure sounds that way. Samsung and Blackberry have come together, but it won’t be for a weird new phone. This time, both companies are taking their respective security platforms, and combining them into a single effort. Blackberry’s BES12 and Samsung’s KNOX will partner for an end-to-end security solution, which will be made available on all Galaxy phones that currently have KNOX. Their target market? You guessed it — the coveted enterprise space.

Continue Reading