security

Polar fitness tracker might be a bigger national security risk

Polar fitness tracker might be a bigger national security risk

Fitness trackers have become so common that people strap them on with no worry or concern. After all, they’re not like smartphones or even smartwatches with tons of features and apps that could be harvesting your data. Unfortunately, fitness trackers themselves and their official apps can actually be gold mines of information. Worse, they can actually pose security risks not just for individuals but for countries as well as services like Polar expose secret places and the people that go to and fro those bases.

Continue Reading

Stylish extension pulled after tracking users’ full web browsing habits

Stylish extension pulled after tracking users’ full web browsing habits

A popular extension downloaded more than two million times has been pulled from browser app stores after a major security issue was discovered. The app, called Stylish, was used to modify the design of websites, such as altering images, turning bright backgrounds dark, and altering unwanted elements. Unfortunately, the browser extension was also extensively tracking users' browsing habits and uploading the data to a remote server.

Continue Reading

Is my phone recording me? Watching me?

Is my phone recording me? Watching me?

A study was published this week that surveyed the potential for unwanted multimedia recordings in phones by Android apps. Having worked with 17,260 apps in all, this study group's results might at first seem exceedingly thorough. In reality, though, given the number of apps the average person uses regularly (very few, that is), the results of this research show something disturbing, but not particularly common.

Continue Reading

China Mobile ban in US likely with national security fears cited

China Mobile ban in US likely with national security fears cited

Back in 2011, China Mobile took the first legal step to make its entrance in the US market, one that would allow it to offer wireless phone service to individuals within the nation. The Section 214 license application has been with the FCC for years, the agency having been tasked to seek info from the Executive Branch over whether authorizing the carrier would be "in the public interest of the US." That answer is officially no.

Continue Reading

Facebook federal probe tipped to include FBI, SEC, FTC and DOJ

Facebook federal probe tipped to include FBI, SEC, FTC and DOJ

A federal probe into Facebook's handling of user data is said to have grown, adding another three government agencies alongside the Department of Justice. According to sources that have surfaced, the FBI, FTC, and SEC have joined a probe into Facebook's Cambridge Analytica controversy, marking an expansion of the government's focus on the company.

Continue Reading

Amazon’s one-day Arlo Pro 2 deal is a security must-have

Amazon’s one-day Arlo Pro 2 deal is a security must-have

Amazon is running a one day home security sale, and if you've been meaning to install security cameras or a smart doorbell, now might be the time to jump on a deal. The promo includes Netgear's well-esteemed Arlo Pro 2 wireless camera system, one of the easier security webcam setups to install since each of the cameras are battery powered.

Continue Reading

Gentoo’s GitHub was hacked: What you need to know

Gentoo’s GitHub was hacked: What you need to know

Popular Linux distribution Gentoo has been hacked, with the company warning that its GitHub repository should be "considered compromised." Unknown hackers took control of the GitHub account earlier this week, on June 28, and modified both pages and the OS data there.

Continue Reading

Twitter adds USB security key as a login verification method

Twitter adds USB security key as a login verification method

If you're worried that existing Twitter security measures aren't adequate enough, good news: the company has added support for security keys. The new option is available as of today, enabling security key owners to setup their account so that they can only log in if they have the right USB key. This method joins third-party app verifications.

Continue Reading

Wi-Fi WPA3 security is here, along with Easy Connect for IoT

Wi-Fi WPA3 security is here, along with Easy Connect for IoT

Wi-Fi is pretty much the wireless technology that binds us all to the Internet. Given the prevalence of laptops and mobile devices and the costs of cellular data like LTE, Wi-Fi is still the preferred way to connect to the Internet both at home and outside. So much so that when the KRACK vulnerability was discovered, there was an even bigger panic than with Meltdown and Spectre. While those holes have mostly been patched up, the Wi-Fi Alliance, the caretakers of the technology, quickly moved to finalize WPA3, the first Wi-Fi security update since 2003.

Continue Reading

iOS jailbreaking is nearly dead and Apple wants it to stay that way

iOS jailbreaking is nearly dead and Apple wants it to stay that way

iOS, particularly on iPhones, may be one of if not the most popular mobile OS in the market, but that doesn’t mean all of its fans are completely satisfied with how things are. Some advanced users still feel stifled by Apple’s control but not enough to switch sides. For them, jailbreaking their iPhone is the only option but that has become even more difficult year after year. Now Apple is formally letting its opinion on the matter known and is giving jailbreakers less and less room to breathe.

Continue Reading

iPhone brute force passcode hack discovered, Apple says “nope”

iPhone brute force passcode hack discovered, Apple says “nope”

Apple’s hard stance on protecting its customers’ privacy through security and encryption is a double-edged sword. On the one hand, it paints a reassuring picture for users. But on the other hand, it practically challenges hackers, state-sponsored or otherwise, to break through. As such, Apple’s device, particularly iPhones, have become a prime target of hacking attempts. One security researcher initially claimed he found a way to brute force passcode guessing despite iOS’ hard limits. It turns out, however, that it might not be the case after all.

Continue Reading

Google Play Store adds ‘security metadata’ DRM to all Android apps

Google Play Store adds ‘security metadata’ DRM to all Android apps

A small but significant change was made to the Play Store this week, and it affects all Android apps. Google is now adding a "small" string of security metadata to all Android APKs, which is designed to ensure the apps are authentic and have come from the Play Store or other approved source. In other words, it's DRM (digital rights management), but Google's intent is to improve the security of the Android platform by making it harder for fraudulent apps or those with malicious code to be installed.

Continue Reading

Prev 1 2 3 4 5 6 7 8 9 Next