An alleged car thief in Seattle was caught by police after being remotely locked in a stolen BMW. The Seattle Police Department and BMW worked together to keep the suspect from getting away. After the owner noticed his car was stolen, he contacted the car company.
These user data stories are always interesting because half of us don’t care if one app shares our data with another, especially one that owns them. The other half of us get all riled up and hit the comments with fire in our hearts and venom on our tongues (or is it fingers?). But as app users we’re in the business of giving away our information and even when we’re angry we typically continue using the services that we feel have slighted us.
Facebook-owned WhatsApp made much fanfare of the service's end-to-end encryption, which rolled out in a service-wide update back in April. As has been demonstrated, even with end-to-end encryption, IM services like WhatsApp are still vulnerable to having their chats spied upon. Even so, WhatsApp is continuing its attempts to make the platform as secure as possible, and very soon, the app could include a passcode lock feature.
Samsung is one of the largest electronics brands in the world, and it spends aconsiderable amount of capital every year for research and development. The company was the first to introduce 14nm-based chipset for smartphones, and it is already developing 10nm-based Exynos chipsets. Now, reports indicate that a senior official from Samsung was trying to sell its confidential information to Chinese competitors.
Are you a Linux Journal reader or use software such as Tor and Tails Linux? If so, you've probably been flagged as an "extremist" by the NSA. Leaked documents related to the XKeyscore snooping program reveal that the agency is targeting anyone who is interested in online privacy, specifically those who use the aforementioned software and visit the Linux user community website.
The word ransomware conjures images of kidnappers and ransom notes. But that doesn't quite capture the reality of PC ransomware. In fact, "it’s not always obvious when ransomware is the problem," says Mike Cobb, director of engineering at data recovery and digital forensics firm DriveSavers.
A newly discovered set of wireless keyboard vulnerabilities can let hachers take over your keyboard and secretly record what you type. It’s called KeySniffer, and it spells death for millions of wireless, radio-based keyboards.
As we all know that a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. So, meet the world’s most interesting and dangerous child hackers.
Just because BlackBerry has become an also-ran in the smartphone industry doesn't mean that the company isn't continuing to make strides in its other businesses. This morning, the company announced that it signed a 1-year pact with a non-military company that provides security for the Pentagon. The deal, made with the Pentagon Force Protection Agency, covers internal and external alerts, messaging, and emergency notifications.
A team of researchers from Microsoft and the University of Michigan claim to have developed attacks on Samsung's smart home platform that use phishing and malware to take control of cloud-connected door locks and fire alarms.
Viber is adding end-to-end encryption for its users globally over the next two weeks. Not wanting to be left behind in the pursuit of enhanced user security, Viber is adding end-to-end encryption (E2EE) following WhatsApp’s E2EE roll out earlier in April. Viber announced on Tuesday that E2EE would roll out to its users globally over the next two weeks. The new encryption will cover text, voice, and group chats, and will work across mobile and PC versions of Viber.
The Federal Communication Commission (FCC) has put forward a proposal that aims to protect Internet user's privacy. The proposal [pdf] will regulate the amount of customers’ online data the Internet Service Providers (ISPs) are able to collect and sell to the advertising companies. Currently, there is no particular rule by law covering broadband providers and customer privacy, and if adopted, this would be the first privacy rule for ISPs. The FCC already governs how phone companies can use and resell customer data, and the Chairman Tom Wheeler believes similar rules should be applied to ISPs. Is Your ISP Tracking Your Web Surfing and Selling Data to Advertisers?
If you have reason to be suspicious of a partner or employer, or they have reason (good or bad) to be suspicious of you, and you fear they might be filming you with a hidden surveillance camera, what can you do about it, other than use some futuristic, James Bond-style camera detection device
Google's business platform already had the ability to scan documents, but it can now match keywords or certain text strings to an admin-approved blacklist. It's designed to stop someone from sending something by mistake, but it can also potentially identify when an employee is purposely trying to share company secrets.
IoT is going mainstream this year, and in the rush to roll out IoT projects, IT leaders will be focused on security and delivering big data analytics services this year, suggests new research from Strategy Analytics, a Newton, Mass.-based consulting and analyst firm.
Want a better Wi-Fi connection on your MacBook? First you’ll want to teach yourself how wireless networks function, and then start optimizing them. OS X comes with tools that can help.We’ve talked about optimizing your home’s Wi-Fi reception, and explained the wireless networking terms that everyone should know, but if you really want to improve things you need an accurate way of gauging your connection.
Imagine a world where you can literally store the entirety of the world’s history in your jeans pocket. Forever. Well, that world is here and that time is now. Researchers have not only already discovered – but have now improved upon – a way to store huge amounts of data on tiny slivers of quartz, not much larger than a quarter. The lifespan for these micro hard drives? If you’d had one at the Big Bang it would still be going strong.
That’s right, Samsung has patented a smartwatch-based vein-scanning technology that would be used as a contactless alternative to fingerprint scanners for biometric security on wearables. We haven’t even seen an iris scanner implemented in a commercial mobile device yet, but Samsung is already looking to the future for its next-gen biometric security inspiration.
Ubuntu is thwarting Microsoft’s efforts to keep PCs safe. Modern Windows PCs are required to ship with Secure Boot enabled, a safety measure that limits access to Microsoft-approved operating systems. To make life easier for Linux users, Microsoft provides Linux distribution bootloaders with a Microsoft signing key. But Ubuntu’s signed bootloader will happily boot unsigned code, breaking the whole chain of trust. Thankfully, this is set to change with the upcomingUbuntu 16.04 LTS.
Dashlane last week unveiled a cross-platform redesign and support for five new languages with a redesign of its password management tool.The revamp follows less than two weeks after LastPass refreshed its rival cloud-based password management software for the first time after its controversial purchase by LogMeIn back in October. Dashlane 4.0 offers translated and localised native language functionality in five new languages: Spanish, Portuguese, German, Italian and Japanese. English and French were already supported.
The barrier between you and your cash may be reduced drastically in the future: Citibank is currently testing a new ATM prototype that would let customers use it with just their eyes (and their cell phones, of course
Smart TVs are often written off as lacking in security, but Samsung is looking to change this. Today the company announced that a new security solution it has dubbed GAIA will be included in its entire 2016 lineup of Tizen-based smart TVs.
Bottom line – it’s not. You can check out our Windows section for a collection of articles that will walk you through all the cool new features that XP users are missing out on – but in this piece we will focus on some of the security aspects.
If there’s unanimity among security professionals in anything, it’s in their loathing of Adobe’s Flash Player. There’s yet to be an APT or exploit kit that hasn’t welcomed vulnerabilities in the development platform with open arms. And for all that misery tallied up in lost intellectual property and industrial secrets, and stolen passwords and credit card numbers, there’s been an equally passionate call for the tech industry to dump Flash on its backside.“
Microsoft SmartScreen technology which is integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads for years now.
Back in my day, schools used to recommend bringing a watch into tests so you’d keep track of the time. But now, the rise of smartwatches could lead to a flat-out ban of all timepieces for test-takers, if the latest rule at a major university in Japan is any indication
Monu Adaa asked for advice on staying safe in today’s crime-filled cyberworld. For today’s criminals, the Internet’s where the action is. Compared to traditional muggers and burglars, cybercrooks make more money with less risk. And that means that us honest folk have to be extra cautious. Protecting yourself in cyberspace is more complex than locking your door or keeping a hand on your bag. I’m concentrating here with protecting your Windows PC.
Users of Ammyy Admin may have been unwittingly downloading malware along with their remote desktop software. A group called the Buhtrap gang is using the malware to spy on and control its victims’ computers as part of a series of targeted attacks, net security firm ESET warn. The tactics in play show that fraudsters are increasingly picking up the ideas and techniques of the more advanced cyberspies.