security

Karma Go gets passphrase support with new ‘Premium Features’

Karma Go gets passphrase support with new ‘Premium Features’

Karma Go users can finally setup a private network if they so wish, but it’ll cost extra. The feature arrives with Karma’s newly announced ‘Premium Features,’ a pay addition to one’s monthly data subscription that enables support for a passphrase. Once added, the hotspot will only be accessible to those who have the password (just like any other WiFi network), allowing you to limit who is able to get on it. This a big change for the shareable data hotspots, but gives subscribers one of their most requested features.

Continue Reading

Android root – the lowdown and pitfalls of the super user

Android root – the lowdown and pitfalls of the super user

Our smartphones and tablets today have become powerful computers, almost matching the cheapest "netbook" grade laptops. We feel they can almost do anything and everything. In theory, they can. In reality, however, they are limited by the boundaries that platform makers like Google and Apple impose on them. Some of those limitations are inherent in the platform itself or the hardware it runs on. Others, however, can be unlocked by the process now known as rooting (for Android) or jailbreaking (for iOS). In the past, rooting was not only something for power users to play with but somewhat even recommended for more adventurous ones to squeeze out the best functionality from their smartphones. But does rooting still have that sway today? What do we gain and what do we lose when we set our smartphones free? Read on the find out.

Continue Reading

Chrome bug aids in pirating Netflix, Amazon videos

Chrome bug aids in pirating Netflix, Amazon videos

DRM, or Digital Rights Management (some call it Digital Restrictions Management), is a class of technologies and software aimed to protect copyrighted material from unauthorized access, a.k.a. piracy. But what if that DRM itself is guilty of helping pirates do exactly that? That is somewhat the position Google is finding itself in when the DRM technology it uses in its Chrome browser has been found to have a bug that actually makes it easier to lift encrypted videos streamed from the likes of Netflix or Amazon Prime and spread them around illegally.

Continue Reading

Google CEO Sundar Pichai gets hacked by OurMine

Google CEO Sundar Pichai gets hacked by OurMine

Google CEO Sundar Pichai has had his Quora account hacked by OurMine, the same hacker group that gained access to Mark Zuckerberg's twitter and Pinterest accounts earlier in June. Since Pichai's Quora account was tied to his twitter account, the messages the hacker group sent out also went out to the 508,000 followers of the Google CEO on twitter.

Continue Reading

US Customs wants to check social media accounts of foreign visitors

US Customs wants to check social media accounts of foreign visitors

In addition to providing documents on their identification and travel permissions, foreign visitors entering the US may soon be asked to give their Twitter and Instagram accounts to Customs and Border Protection. The Department of Homeland Security has submitted a new proposal to the Federal Register that would update the required entry forms with a question asking for travelers' accounts names on social media.

Continue Reading

“GODLESS” Android malware threatens 90% of devices

“GODLESS” Android malware threatens 90% of devices

Malware isn't something new to smartphone operating systems, especially Android. Sometimes, it's even a point of criticism for Google's platform. There are, however, few exploits, like Stagefright and Heartbleed, that has users, developers, and security researchers scrambling. The new "GODLESS" family of malware, reported by software security firm Trend Micro, seems to be bent on becoming one of those, secretly rooting infected devices and opening them up to further compromise, which is practically any device running Android 5.1 Lollipop or older.

Continue Reading

Apple iOS 10 kernel is unencrypted for performance says Apple

Apple iOS 10 kernel is unencrypted for performance says Apple

Apple recently showed off a preview version of iOS 10 at a developers conference and as developers are wont to do they immediately hacked into the code to see what they could find inside. Many of them were very surprised to find that Apple had left the kernel of the OS unencrypted. Some were surprised enough that they assumed Apple had made a mistake.

Continue Reading

Mark Zuckerberg takes his MacBook security seriously

Mark Zuckerberg takes his MacBook security seriously

A few weeks back we learned that Mark Zuckerberg had his twitter and pinterest accounts hacked. At the time, the hacker group that hacked the accounts claimed that his password was a very simple word "dadada" leading some to assume that the Zuck wasn’t that security conscious. Now an image has turned up that Zuckerberg sent out to celebrate the 500 million active monthly users that Instagram boasts and it appears that Zuckerberg does take some security seriously.

Continue Reading

It’s not paranoia to cover your laptop’s webcam

It’s not paranoia to cover your laptop’s webcam

Mark Zuckerberg may cover his laptop's webcam and microphone with sticky tape, but you don't have to be the billionaire founder of a massively-popular social network to be sensibly cautious about privacy. A photo shared by the Facebook founder this week - celebrating 500 million Instagram users - piqued the attention of eagle-eyed privacy advocates, who spotted a low-tech solution to helping secure Zuckerberg's laptop.

Continue Reading

Google makes two-step verification easier with new prompt

Google makes two-step verification easier with new prompt

Google has made two-step verification easier with a new prompt that simply requires a tap — tap “Deny” to block an attempted sign-in, or tap “Yes, allow sign-in” to approve it. This is optional -- if you really prefer codes, you can still receive them instead. By enabling it, though, getting into your own account, or keeping someone out, is faster than it has ever been.

Continue Reading

Acer hack may have exposed 34,500 customers

Acer hack may have exposed 34,500 customers

Late last week, a letter surfaced detailing a data breach with Acer’s website which left customers’ credit and debit card details vulnerable, among other things. Though the time frame for the breach was stated — May 12 of last year through April 28 of this year — how many people may have been affected wasn’t detailed. Acer has revealed the number this week, though, and it’s substantial: as many as 34,500 customers may have had their banking details stolen.

Continue Reading

The Pentagon expands program for hackers to test its security

The Pentagon expands program for hackers to test its security

Back in March, the US's Department of Defense launched a "Hack the Pentagon" campaign to get hackers to test their websites and security networks for vulnerabilities, without the threat of jail time. The project was so successful that the government agency has announced it's being expanded, including more DoD websites and networks, with further cash incentives for hackers. Think of it like the bug bounty programs that Google, Facebook, and other tech companies offer, except hackers get to put the government's most secure facilities to the test.

Continue Reading

1 2 3 4 5 Next