security

Secret Service loses encrypted laptop with possible access to classified data

Secret Service loses encrypted laptop with possible access to classified data

An encrypted Secret Service agency laptop was stolen from an agent’s vehicle recently, it has been revealed, potentially giving the thief access to classified data located on agency servers. According to one source speaking about the theft, this laptop contains Trump Tower floor plans and ‘national security information,’ though the Secret Service stresses that its laptop has ‘multiple layers of security.'

Continue Reading

Wishbone app data breach affects huge number of users

Wishbone app data breach affects huge number of users

Wishbone, an app popular among teenagers, has suffered a data breach, it has been revealed. The company informed its users of the intrusion in a notification recently, saying it became aware of the data swipe on March 14. The notification says that unknown individuals “may have had access” to the company’s API and used it to nab data on the service’s users. The info may contain more than 2 million email addresses, among other things.

Continue Reading

Signal launches encrypted video calling for everyone

Signal launches encrypted video calling for everyone

Open Whisper Systems has announced that its previously launched encrypted video calling feature in Signal has been taken out of beta and is now available for all users to enjoy. The feature first arrived as a beta that users had to opt-in to use; now it is available to anyone using the most recent version of the iOS or Android app, making it easy to make end-to-end encrypted video calls.

Continue Reading

Viber launches secret chats to go beyond encryption

Viber launches secret chats to go beyond encryption

We've seen a lot of chat services rolling out end-to-end encryption lately (or, in Facebook Messenger's backwards world, optional end-to-end encryption), but now Viber wants to take that one step further. Viber already launched end-to-end encryption for all conversations held over its service a few months back, but starting today, you can host "secret chats" for a little extra security.

Continue Reading

Google no longer needs CAPTCHA to tell humans and bots apart

Google no longer needs CAPTCHA to tell humans and bots apart

Anyone who's used the internet in the last decade should be immediately familiar with the reCAPTCHA system (Completely Automated Public Turing test to tell Computers and Humans Apart), the little box on websites that has users type in distorted words or click on a checkbox to prove they're human. Well, this could soon all be a thing of the past, as Google has revealed it's developed a way to make the reCAPTCHA system completely invisible, with no need for human input.

Continue Reading

WikiLeaks’ Vault7 CIA dump prompts Apple reaction and more

WikiLeaks’ Vault7 CIA dump prompts Apple reaction and more

Apple, Microsoft, and others in the tech industry have responded to Wikileaks' claims of CIA hacking abilities, pushing back on fears of federal agents turning smartphones and TVs into spies. The leak-focussed group, which has prompted controversy in recent months for the role it played in the US presidential election, released a cache of data earlier this week that it claimed proved the US Central Intelligence Agency could routinely eavesdrop through many of the connected devices people have in their homes or pockets. Dubbed "Vault7", the nearly 9,000-strong document drop has prompted chaos among many, uncertain whether their devices are in fact working against them.

Continue Reading

Wikileaks releases trove of CIA documents codenamed ‘Vault7’

Wikileaks releases trove of CIA documents codenamed ‘Vault7’

Today Wikileaks released a cache of data codenamed ‘Vault7,’ claiming this is the single largest drop of confidential CIA documents ever. There are a total of 8,761 documents and files within this trove, and they detail a hidden world within the agency, one that operates with a fleet of hackers who work to help turn everyday gadgets like smartphones and smart TVs into covert surveillance devices.

Continue Reading

Nest two-factor authentication boosts IoT security

Nest two-factor authentication boosts IoT security

Nest is adding two-factor authentication to its smart home products, aiming to prevent third-parties or hackers getting remote access to your cameras or smart thermostat. The new feature follows increasing concern over the security of the so-called Internet of Things, a topic only likely to become more prevalent as connected devices proliferate. Nest will make two-factor authentication optional, though it's probably something you should turn on.

Continue Reading

Amazon home security camera, possibly with Alexa, leaks on retailer’s site

Amazon home security camera, possibly with Alexa, leaks on retailer’s site

It looks like Amazon’s getting into the home security camera market, at least if a new image pulled from the retailer’s website is any indication. According to a recent report, an automated script stumbled upon the image; in it we see a tall oval-shaped camera with Amazon branding on the top and a glowing blue ring, possibly indicating Alexa is present, on the bottom.

Continue Reading

Cobalt’s autonomous security robot is more serious than it looks

Cobalt’s autonomous security robot is more serious than it looks

Robots make the best and the worst security guards. On the one hand, they’re efficient, precise, and unswayed by emotions. On the other hand, they’re also cold, impersonal, and unyielding. They are best used for security-related tasks that require more attention to detail but not so much human interaction. That’s what Cobalt Robotics is attempting with its autonomous mobile robot that can navigate around the area, recognize people, read IDs, and report any suspicious activities, potential security issues, and possible hazards. All without looking like a Terminator set to kill.

Continue Reading

Twitter’s latest security update: More muting options, follow-ups for reports

Twitter’s latest security update: More muting options, follow-ups for reports

Twitter's approach to combating abuse on its platform has been multi-layered so far, and today even more security features are being added to the pile. This week, Twitter users will find that they have more control over what they mute and how long that content stays muted, while Twitter itself is doing a lot more behind the scenes to bolster its anti-abuse measures.

Continue Reading

CloudPets connected toy data leak makes personal voice messages public

CloudPets connected toy data leak makes personal voice messages public

Connected toys are becoming increasingly popular, and one such toy is CloudPets’ stuffed animals. With these and a related app, parents and kids can record messages for each other that are shuttled between the toy and app via the company’s cloud service. That cloud service, it turns out, is quite insecure and has allowed voice messages recorded by parents and kids to be leaked online for anyone with the skills to grab them.

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next