privacy

Feds still want Apple to unlock iPhone even after guilty plea

Feds still want Apple to unlock iPhone even after guilty plea

It seems that Apple won't be able to take a breather even after a case it has been dragged into has practically been closed. In a drug-related case in Brooklyn, federal Judge James Orenstein formally asked Apple's input regarding the Department of Justice's request to order Apple to unlock the defendant's iPhone. Apple naturally argued against it. The whole matter would have been moot since the defendant plead guilty to the charges, but the DOJ hasn't retracted its application and the judge himself is puzzled by it.

Continue Reading

Tor’s new Messenger app promises privacy over familiar networks

Tor’s new Messenger app promises privacy over familiar networks

Tor, whose name amusingly once stood for The Onion Network, has become the software of choice when keeping your identity on the Internet anonymous and protected. As such, it has also become the bane of those, like some government agencies, who would prefer to have everyone's private comings and goings within their grasp. Adding to the project's arsenal of tools, which already includes a web browser, is Tor Messenger, an instant messaging software that tries to offer both convenience and privacy over an established network protocol like XMPP.

Continue Reading

Keep your BlackBerry PRIV, I’ll stick with Nexus 6P

Keep your BlackBerry PRIV, I’ll stick with Nexus 6P

I want to root for the underdog - I want BlackBerry to return to prominence, I really do. But if I'm trying to be objective about the BlackBerry PRIV and its chances in the market amongst some of the other top-guns that it'll be released alongside, I can't imagine most modern consumers really wanting a device from the business-oriented smartphone maker. It might be great for a BlackBerry user from way back - even someone that's been forced to use touchscreens for several years even though they prefer hardware keyboards. But for any iPhone or Android device consumer, the appeal may be lacking.

Continue Reading

Senate approves controversial CISA bill in 74-21 vote

Senate approves controversial CISA bill in 74-21 vote

In an overwhelming number of votes, the US Senate has given the thumbs up to the Cybersecurity Information Sharing Act, more popularly known as CISA, though it definitely has less flattering nicknames. While the bill will still have to go through a joint committee of House and Senate, the show of majority support is already quite telling. Naturally, privacy interest groups are raising their voices high in continued opposition, calling the bill a huge step backwards in the fight for privacy rights and an ineffective weapon against cybercrimes.

Continue Reading

15-year-old arrested in connection with TalkTalk hack

15-year-old arrested in connection with TalkTalk hack

Last week, the UK telecom TalkTalk was hit with a cyberattack, and a short while later it revealed that a ransom had been made by an individual claiming to be behind the hack. The cyberattack was described as being “significant and sustained,” though later on it stated the attack wasn’t as bad as previously feared. Now a teenager has been arrested by law enforcement in Northern Ireland in connection to the cyberattack.

Continue Reading

FCC to turn the tables, publish telemarketers’ numbers

FCC to turn the tables, publish telemarketers’ numbers

Telemarketers and robocallers aren't as big of a problem as they used to be, but they're still around, and they're still managing to call just as you sit down for dinner. The FCC has served on the front lines in the battle against them, and now it is planning to turn the tables, so to speak, and put telemarketers on the defense. The Commission has revealed plans to publish such spammers' phone numbers, making it easy to blacklist them.

Continue Reading

Apple: technically impossible to unlock newer iOS devices

Apple: technically impossible to unlock newer iOS devices

Apple might have just scored some points with users but might have also further cemented the government's stance against encrypted devices. Responding to a Brooklyn federal judge's request for input, Apple revealed that it is impossible for it to unlock an iPhone or an iPad running iOS 8 or later due to stronger encryption methods. That said, it does admit that it can technically unlock devices running an older version, including the one involved in a current court proceeding, but advises the judge not to open that can of worms.

Continue Reading

256 App Store apps found using ad SDK collecting private data

256 App Store apps found using ad SDK collecting private data

Apple is known, even notorious, for its tight grip on which apps get into its App Store. While sometimes viewed to be a rather heavy handed or authoritarian approach, it has also been praised for curbing the amount of low quality apps and malware. Lately, however, some seem to have slipped through the cracks. This latest App Store violation even numbers in the hundreds. Code analytics service SourceDNA discovers more than 200 iOS apps accepted on the App Store using an advertising SDK that collect users' private data.

Continue Reading

Now Facebook will warn if you’re under state-sponsored attack

Now Facebook will warn if you’re under state-sponsored attack

It's a sign of the times that, just as Facebook warns which of your friends and family will see your posts, now it'll flag potential state intrusion too. The new alert will appear if the social network believes an individual's account is being "targeted or compromised by an attacker suspected of working on behalf of a nation-state," Alex Stamos, chief security officer at Facebook, said today.

Continue Reading

Report: Dow Jones suffered second, more serious hack

Report: Dow Jones suffered second, more serious hack

On October 9, Dow Jones revealed that it had been hacked and data belonging to about 3500 customers had been compromised as a result. According to a new report, a Russian hacking collective has breached Dow Jones in what appears to be a separate attack; the information comes from unnamed sources “familiar with the matter.” The hackers’ intent was to steal data for trading purposes, according to the sources. Three federal agencies are reportedly investigating the matter.

Continue Reading

JPEG images may one day have DRM copy protection

JPEG images may one day have DRM copy protection

It's not time to panic just yet, but there could one day be a fundamental change to the JPEG image format that would have a significant impact on the way we view and use images on the web. The committee behind the format, the Joint Photographic Experts Group (JPEG), is now holding discussions on the topic of privacy and security, and considering the idea of bringing digital rights management (DRM) to the popular image type.

Continue Reading

HP, 3M team up for laptops with built-in privacy screens

HP, 3M team up for laptops with built-in privacy screens

HP and 3M have partnered to produce business laptops with built-in privacy screens, the same sort of screens used at banks, hotels and other businesses to keep the contents on a monitor away from nosy people. These screens are available to purchase as independent items, but must be cut to fit an existing laptop’s display (or, perhaps, taped if you’re not concerned about style).

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next