security

Samsung Galaxy backdoor could pose data risk [Updated]

Samsung Galaxy backdoor could pose data risk [Updated]

Multiple models of Samsung Galaxy smartphones could contain a backdoor for remote data access, a developer team has alleged, potentially leaving personal files open to clandestine browsing. The security loophole stems from a proprietary app Samsung created to run on the modem's application processor, which can access and modify software running on the phones and, in at least nine cases, have unfettered access to personal data as well.

Continue Reading...

Web turns 25: Internet “Constitution” needed says inventor

Web turns 25: Internet “Constitution” needed says inventor

The inventor of the world wide web has used the 25th anniversary of his creation to call for an online "bill of rights" to protect the internet's independence, with Sir Tim Berners-Lee highlighting worrying surveillance and net-neutrality trends as the basis for his fears. Describing his vision of a "global constitution" or online "Magna Carta", Berners-Lee described the web as he envisaged it a quarter of a century ago as under attack from businesses and governments that would co-opt it for their own purposes.

Continue Reading...

NSA schemes mass internet infection and fake Facebooks

NSA schemes mass internet infection and fake Facebooks

An NSA project to install spying malware on "millions" of computers around the world, dubbed TURBINE, could allow the clandestine US agency unprecedented access to "industrial-scale exploitation" in the battle for internet dominance. The spyware, which is said to have already been installed on as many as 100,000 systems after first being deployed in mid-2010, is described as both smart and aggressive, automating much of what would have previously needed a trained operative.

Continue Reading...

Encryption makes you an NSA target expert warns

Encryption makes you an NSA target expert warns

Following Edward Snowden's call for internet users to encrypt everything as a matter of course is likely to make you an even bigger target for the NSA, activist journalist Glenn Greenwald has warned, arguing that the stance inside the spying agency is that those protecting their data are inherently suspicious. "If you want to hide what you're saying from them" Greenwald said during a video appearance at SXSW this week, "it must mean that what you're saying is a bad thing," the former Guardian writer said the National Security Agency's assumptions.

Continue Reading...

NSA phone record destruction halted by judge

NSA phone record destruction halted by judge

A U.S. District Judge has halted the NSA's plans to destroy collected phone records, something that has had many up in arms. The Electronic Frontier Foundation, more commonly known as the EFF, sought for the temporary stay on destruction, saying the phone records can serve as evidence in lawsuits that are going against the agency's surveillance practices.

Continue Reading...

Encrypt, evade and obscure: Edward Snowden warns public

Encrypt, evade and obscure: Edward Snowden warns public

NSA whistleblower Edward Snowden has defended his actions during a SXSW appearance, insisting that "I'd do it again" and throwing down the gauntlet to internet users to protect their privacy using encryption and other tools. The contractor-turned-activist described how he used hard-drive encryption, routing his online traffic through Tor, and installing browser plugins to avoid tracking from companies and other organizations, to evade surveillance.

Continue Reading...

Stun-gun drone demos 80,000 volt perp put-down potential

Stun-gun drone demos 80,000 volt perp put-down potential

Drones capable of taking out terrorist training camps aren't new, but now one company is talking about how our domestic skies could be filled with unmanned 'copters toting non-lethal weaponry. Handiwork of Chaotic Moon, Project C.U.P.I.D. - Chaotic Unmanned Personal Intercept Drone - was shown off at SXSW this weekend, a six-rotor remotely-controlled aircraft that carries an 80,000 volt stun gun with which it can bring down a crime suspect.

Continue Reading...

Prev 2 3 4 5 6 7 8 9 10 Next