Latest articles tagged “security”

Latest articles tagged “security”

Showing: 181-195 of 260
The U.S. Govt. Can Now Legally Access Digital Data Stored Overseas
The U.S. Govt. Can Now Legally Access Digital Data Stored Overseas
by Dan Vlasic on 26 August 2014 · 2146 views
A New York judge ruled that US-issued search warrants applied to all digital content located on servers worldwide. ... Read more
Browser Hijacking Signs and How To Clean-up
Browser Hijacking Signs and How To Clean-up
by Dan Vlasic on 18 August 2014 · 48858 views
Your browser may get infected when you install new software. Sometimes, a completely legitimate program comes bundled with an obligatory installation of some third-party app, which results to be either ad-ware or spyware. ... Read more
Fitness and Health Tracking Fails to Secure Your Personal Information, Says Symantec
Fitness and Health Tracking Fails to Secure Your Personal Information, Says Symantec
by Dan Vlasic on 17 August 2014 · 10792 views
The gadget manufacturers and apps developers desperately lag behind their own inventions security-wise. Let us take a brief look at Symantec findings. ... Read more
Hackers Break Into Credit/Debit Card Networks of Albertsons and SuperValu Stores
Hackers Break Into Credit/Debit Card Networks of Albertsons and SuperValu Stores
by Chris Thomas on 17 August 2014 · 2087 views
Friday morning two of the nation's largest supermarket chains - Albertson's and SuperValue - announced that hackers had compromised their security networks to access the credit/debit card information of an untold number of consumers. ... Read more
Google Glass Can Be Used To Steal Your Passcodes
Google Glass Can Be Used To Steal Your Passcodes
by Dan Vlasic on 15 August 2014 · 2185 views
Google Glass's capability to surreptitiously record everything around it makes it possible to steal anyone's passcode, even if Glass does not record the device's screen with the numbers. ... Read more
Spyware Report Finds iOS To Be Most Secure Mobile OS
Spyware Report Finds iOS To Be Most Secure Mobile OS
by Pete Daniel on 13 August 2014 · 1725 views
A malware inspection report thought to be from the Gamma Group has leaked over the Internet and been commented on by the esteemed Washington Post, found that iOS is by far the most secure mobile OS on the market. ... Read more
Internet Explorer 8 and Earlier No Longer Supported from January 12 2016
Internet Explorer 8 and Earlier No Longer Supported from January 12 2016
by Pete Daniel on 12 August 2014 · 2565 views
Microsoft are trying to encourage users to update to newer versions of their Internet Explorer browser currently at version 11. Existing users are slow to upgrade though with as many as 20% of users still stuck back using Internet Explorer 8.0. ... Read more
Wireless Routers that Use WPS Have a Built-in Flaw that Causes Them to Practically “Give Away” Passwords
Wireless Routers that Use WPS Have a Built-in Flaw that Causes Them to Practically “Give Away” Passwords
by Chris Thomas on 11 August 2014 · 2176 views
Wi-Fi routers that utilize Wi-Fi Protected Setup (WPS) technology aren't so “protected” after all. Ironically, these types of routers may be the easiest to hack into, as was recently demonstrated at the PasswordsCon conference in Las Vegas. ... Read more
The 10 scariest presentations in this year's Black Hat and DefCon
The 10 scariest presentations in this year's Black Hat and DefCon
by Gary Oldwood on 10 August 2014 · 3505 views
Every year, the world’s craziest and most inspired security professionals and hackers all over the world gather in an annual event that takes place in Las Vegas. ... Read more
Smart Credit Card Point of Sale Terminals Can Be Hacked
Smart Credit Card Point of Sale Terminals Can Be Hacked
by Chris Thomas on 10 August 2014 · 2737 views
Researchers at MWR Labs have now demonstrated that “smart” card point-of-sale (POS) terminals can indeed be hacked. ... Read more
Russian hackers grab 4.5 billion records
Russian hackers grab 4.5 billion records
by Gary Oldwood on 7 August 2014 · 2075 views
4.5 billion records were stolen by a Russian group dubbed “CyberVor”. The company who identified the large data theft, Hold Security, had been researching for more than seven months before it actually confirmed the possession of those stolen reco ... Read more
A 4-Year Old Android Vulnerability Responsible for ID Thefts Remains Unpatched in Android L Preview
A 4-Year Old Android Vulnerability Responsible for ID Thefts Remains Unpatched in Android L Preview
by Dan Vlasic on 6 August 2014 · 1699 views
As a result, the OS grants malware elite access permissions without taking the trouble to verify whether the app's ID is valid, or not. Once the user taps 'install' for such a malicious app, Android welcomes the thief as a policeman. ... Read more
A Major Exploit in USB Firmware Is An Undetectable, Unpatchable Nightmare
A Major Exploit in USB Firmware Is An Undetectable, Unpatchable Nightmare
by Dan Vlasic on 4 August 2014 · 2713 views
Forget everything you know about USB security because re-formatting, antivirus, spyware, anti-keylogger suites are not functional against BadUSB, which taps into the USB firmware. ... Read more
Cyber Security Researchers Warn Consumers About the Inherent Dangers of USB Sharing
Cyber Security Researchers Warn Consumers About the Inherent Dangers of USB Sharing
by Chris Thomas on 3 August 2014 · 1784 views
According to cyber security researches, all USB storage drives have an inherent flaw built into them. Any device that connects to a computer via USB can theoretically trick the computer into thinking it is another device entirely. ... Read more
Cars Can Now Be Hacked – Latest Car Models Most Vulnerable to Attacks
Cars Can Now Be Hacked – Latest Car Models Most Vulnerable to Attacks
by Chris Thomas on 1 August 2014 · 2992 views
With automobiles becoming increasingly dependent on computer components, the most sophisticated hackers could hypothetically find a loophole that lets them control a vehicle remotely. ... Read more
Showing: 181-195 of 260
Featured Articles