security

Google makes two-step verification easier with new prompt

Google makes two-step verification easier with new prompt

Google has made two-step verification easier with a new prompt that simply requires a tap — tap “Deny” to block an attempted sign-in, or tap “Yes, allow sign-in” to approve it. This is optional -- if you really prefer codes, you can still receive them instead. By enabling it, though, getting into your own account, or keeping someone out, is faster than it has ever been.

Continue Reading

Acer hack may have exposed 34,500 customers

Acer hack may have exposed 34,500 customers

Late last week, a letter surfaced detailing a data breach with Acer’s website which left customers’ credit and debit card details vulnerable, among other things. Though the time frame for the breach was stated — May 12 of last year through April 28 of this year — how many people may have been affected wasn’t detailed. Acer has revealed the number this week, though, and it’s substantial: as many as 34,500 customers may have had their banking details stolen.

Continue Reading

The Pentagon expands program for hackers to test its security

The Pentagon expands program for hackers to test its security

Back in March, the US's Department of Defense launched a "Hack the Pentagon" campaign to get hackers to test their websites and security networks for vulnerabilities, without the threat of jail time. The project was so successful that the government agency has announced it's being expanded, including more DoD websites and networks, with further cash incentives for hackers. Think of it like the bug bounty programs that Google, Facebook, and other tech companies offer, except hackers get to put the government's most secure facilities to the test.

Continue Reading

Acer data breach leaves customer credit cards exposed

Acer data breach leaves customer credit cards exposed

Acer has been hit with a data breach, and it is in the process of notifying potentially affected customers. The breach is said to have affected the company’s e-commerce website over a huge time span — May 12, 2015 through April 28, 2016. Anyone who submitted information through the website during that time may have had their data compromised, including things like credit card numbers, names, and addresses.

Continue Reading

Google paid $550,000 in Android bug bounties since last year

Google paid $550,000 in Android bug bounties since last year

How much is the security of your Android device worth? Well, Google spent around $550,000 in bug rewards since it launched the program for Android a year ago. Depending on how you view the platform, that might be more than enough or, in fact, too little. Regardless, Google is even increasing the bounty for "high quality" reports to ensure that Android's security doesn't descend into becoming a joke in the mobile industry. Though some might argue that is already the case anyway.

Continue Reading

Galaxy Note 7 iris scanner to come from Patron

Galaxy Note 7 iris scanner to come from Patron

That an upcoming Samsung flagship smartphone is rumored to have an iris scanner isn't exactly new. Those rumors have been circulating as far back as 2013, but never really came to pass in the 2015 models. Nth time's the charm right? That seems to be the case yet again for the Galaxy Note 7 (or Note 6 or Note 7 edge) but this time around, Korean media is giving a name to the manufacturer of said sensor. In this case, Korean camera module maker Patron is named as the source of the iris scanner that will grace the face of Samsung's next premium phablet.

Continue Reading

Safari will block Flash by default in macOS Sierra

Safari will block Flash by default in macOS Sierra

Another one of the final nails has been hammered into the coffin of Adobe Flash. The latest version of Apple's Safari browser that will be included in the release of macOS Sierra has been revealed to block plugins like Flash and Java while users navigate the internet. As the newest version of Apple's desktop OS, mac OS Sierra — revealed at WWDC this week — and Safari 10 will instead default to HTML5 whenever it's available.

Continue Reading

DNC’s research on Trump stolen by Russian hackers

DNC’s research on Trump stolen by Russian hackers

The Democratic National Committee’s data on Donald Trump was stolen by Russian hackers, according committee officials. The hackers were reportedly part of or working for the Russian government, and they managed to make off with a full database of opposition research. A big "cleanup campaign" led to the hackers being booted from the computer network, but some of them are said to have had access for about a year before that. This isn’t the first time Russian hackers have been accused of stealing data on U.S. political figures.

Continue Reading

What is Differential Privacy and why is Apple so excited about it?

What is Differential Privacy and why is Apple so excited about it?

The unexpected star of iOS 10 may well end up being a barely-known cryptography system to balance privacy and personalization, as Apple further positions itself as the bastion of user data protection. Differential privacy may not be as slick as Siri's increased skill set, or as timely in a cultural sense as new emojis and stickers, but it's arguably far more important than either.

Continue Reading

Nest rumored to be working on security camera for outdoors

Nest rumored to be working on security camera for outdoors

Nest has been dealing with a serious shakeup over the last week, with the Alphabet-owned company trading Tony Fadell for Marwan Fawaz as its CEO. This news prompted fears that the smart home device-maker might be up for sale, but Fawaz quickly affirmed that was not the case, and the company would stick to its "great roadmap" of upcoming products. One of these gadgets nearing release is said to be an outdoor version of the Next Cam, according to Tech Insider.

Continue Reading

US developing real-time camera-based behavior monitoring system

US developing real-time camera-based behavior monitoring system

In the not-so-distant-future, your every public action may be monitored by cameras that deliver video feeds to behavior tracking systems capable of analyzing your actions for suspicious elements in real-time. The system is called Deep Intermodal Video Analytics, DIVA for short, and it is currently a research project with the U.S. Office of the Director of National Intelligence’s Intelligence Advanced Research Projects Agency. As you may have guessed, it is being developed under the banner of fighting terrorism.

Continue Reading

32M Twitter login credentials reportedly leaked by hacker

32M Twitter login credentials reportedly leaked by hacker

LeakedSource has published a searchable database that has the credentials of millions of user accounts from different social networks on the web. The latest addition to the leaked database of user credentials is claimed to be a massive leak of Twitter user data.

Continue Reading

Prev 1 2 3 4 5 6 7 Next