security

Google lists all of your devices, location included

Google lists all of your devices, location included

This week Google is doubling down on security, making it easy for you to get an idea of how many devices you've used with Google services, showing you these devices in one simple list. For a user like myself, this list is massive. Even just going back to the tail end of 2013, Google lists 43 devices I've logged in on. Not just devices I've ever logged in on, but devices I'm STILL logged in on. This means I really, truly need to be better at remembering to log out.

Continue Reading

Google unveils tools that track and secure your online life

Google unveils tools that track and secure your online life

Used to be identity theft only revolved around cards and social security numbers, but these days our virtual identities are just as important and even more vulnerable. With the enermous power that it wields over our Internet lives, Google is in the prime position to help mitigate the effects or sometimes even prevent incidents from happening in the first place. That is why it is releasing two new security tools that will let users check up on their online activity and, if necessary, batten down the hatches.

Continue Reading

Craigslist taken offline by hacker

Craigslist taken offline by hacker

Craigslist is a site where people run ads for all sorts of items they want to sell, jobs, and a plethora of other strange listings and personals. Millions of folks use the site each month and if you frequent Craigslist and were unable to get on the site yesterday, it wasn't just you. Craigslist was hacked and the hacker was able to take the site down for many users.

Continue Reading

Symantec discovers highly sophisticated Regin spyware

Symantec discovers highly sophisticated Regin spyware

Malware, even the spying kind, isn't uncommon, but it is quite rare to come across something as complex, modular, sophisticated, and long-lasting as the Backdoor.Regin that Symantec uncovered. This particular Trojan has managed to evade detection and forensic tools and in fact might still have some form out there. And it has been going around since circa 2008. This makes it a very dangerous tool in the hands of the very wrong people, and a bit of speculation suggests that it might indeed be the work of a nation state.

Continue Reading

BitTorrent Bleep gets basic offline messaging

BitTorrent Bleep gets basic offline messaging

BitTorrent's secure work-in-progress messaging service Bleep has taken its first step toward offline messaging, the company has announced. Formerly known as BitTorrent Chat, Bleep is a peer-to-peer messaging app that promises to keep one's messages safe from prying eyes, something that in itself made offering offline messaging problematic. Though that issue hasn't been fully resolved, BitTorrent has taken a "basic" step toward offering it by allowing users to send offline messages...with one catch.

Continue Reading

Detekt tool hunts down government spyware on your PC

Detekt tool hunts down government spyware on your PC

Government surveillance is a hot topic, and as news about the extent of such monitoring keeps coming, many individuals have wondered at one point or another whether any of their own data is under some agency's watchful eye. To help (potentially) ease your paranoia is a new open-source malware tool called Detekt, which its maker Claudio Guarnieri -- with support from the Electronic Frontier Foundation -- says will help you determine whether your computer is infected. The malware detector is available for Windows users.

Continue Reading

BitTorrent Sync Beta Review: we’re ready for 2.0

BitTorrent Sync Beta Review: we’re ready for 2.0

The basic premise for BitTorrent Sync is sound: send a folder to a friend or colleague from your device to theirs in as simple a fashion as possible. You can keep that connection open indefinitely, or your can close it after a short period of time. It doesn't rely on cloud servers to do the work, it relies on your computer and the computer you're sharing with. Next year, BitTorrent will be releasing Sync 2.0 and a Pro edition for those users that wish to roll with premium features.

Continue Reading

Researchers claim 81% of Tor users can be identified by router information

Researchers claim 81% of Tor users can be identified by router information

Internet users who don’t want to be tracked have many tools at their disposal. One of the most commonly used tools is Tor. Tor is a free software platform and open network that is designed to allow users to defend against traffic analysis as they surf the web. Users of Tor want to keep their business activities, relationships, and privacy secret. It appears that Tor may have a significant flaw.

Continue Reading

1 2 3 4 5 Next