Skip to main content

Home/ Digit_al Society/ Group items tagged Security

Rss Feed Group items tagged

dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

India Will Ask the U.S. Government for Help Spying on Its Citizens - 0 views

  • While governments in many countries, including India, have reacted with anger to this year’s revelations from former National Security Agency contractor Edward Snowden that the United States spied on foreign officials, several have also been increasing Internet surveillance at home
    • dr tech
       
      S+E Issue is Surveliiance - related to Gloablisation
  •  
    "India has started using a system that allows security agencies and income tax officials to directly intercept phone calls and emails without any court or legislative oversight, Reuters reported this summer."
dr tech

The US fears back-door routes into the net because it's building them too | Technology ... - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - B... - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
dr tech

Antivirus software is dead, says security expert at Symantec | Technology | theguardian... - 0 views

  •  
    "Dye told the Wall Street Journal that hackers increasingly use novel methods and bugs in the software of computers to perform attacks, resulting in about 55% cyberattacks going unnoticed by commercial antivirus software."
dr tech

Shellshock: The 'Bash Bug' That Could Be Worse Than Heartbleed - 0 views

  •  
    "Security researchers have discovered a vulnerability in the system software used in millions of computers, opening the possibility that attackers could execute arbitrary commands on web servers, other Linux-based machines and even Mac computers."
dr tech

Tomorrow's Surveillance: Four Technologies The NSA Will Use to Spy on You - Soon - 0 views

  •  
    "The NSA's plans don't end with collecting your phone records. Here are just a few of the ways the National Security Agency (NSA) will be keeping tabs on you in the world of tomorrow. Prepare to be shocked, amazed, and a little freaked out."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
dr tech

Man buys $27 of bitcoin, forgets about them, finds they're now worth $886k | Technology... - 0 views

  •  
    "Kristoffer Koch invested 150 kroner ($26.60) in 5,000 bitcoins in 2009, after discovering them during the course of writing a thesis on encryption. He promptly forgot about them until widespread media coverage of the anonymous, decentralised, peer-to-peer digital currency in April 2013 jogged his memory. Bitcoins are stored in encrypted wallets secured with a private key, something Koch had forgotten."
dr tech

Your baby monitor is an Internet-connected spycam vulnerable to voyeurs and crooks - Bo... - 0 views

  •  
    "Many of these cameras have no easy, networked means of getting a firmware update, either, making their zeroday bugs into foreverday bugs. Some of these bugs were simple programmer error, but Philips, ah, Philips: they shipped an Internet-connected home spycam whose default root login was admin and /ADMIN/. Security. "
amenosolja

An Android Porn App Takes Your Photo and Holds It to Ransom - 0 views

  •  
    "The Register reports that security firm Zscaler was first to spot the app, which presents itself as a normal video playing app, albeit for playing videos of an adult nature. Apparently once it has silently snapped photos of its victim it will display a message on screen demanding that they pay $500 . Otherwise, well... do you want people knowing you've used the app?"
longspagetti

Drones operated by criminal gangs used to deliver drugs, mobile phones and potentially ... - 0 views

  •  
    Small commercial drones are being used to lift packages containing illicit goods from mobile phones to synthetic drugs into jails, where they threaten security by increasing the availability of intoxicants which can provoke disorder in prisons.
jamandham

AVG can sell your browsing and search history to advertisers (Wired UK) - 0 views

  •  
    The free antivirus software AVG is selling your online information for profit and you have no control over your privacy and security.
jamandham

UN: 'urgent action' needed on cyber violence against women (Wired UK) - 0 views

  •  
    An article that focuses on cyber violence against women that shows the issues that can arise from the internet as it involves security and how people can abuse technology for their benefits.
Mcdoogleh CDKEY

BBC News - Anti-censorship program Haystack withdrawn - 0 views

  •  
    Software developed to bypass Iranian Internet censorship has been scrapped, due to various reasons.
  •  
    Software created to help Iranians escape government control of the web has been withdrawn over security fears.
dr tech

Is aviation security mostly for show? - CNN.com - 0 views

  •  
    Great article from Brucie...
Max van Mesdag

German government warns against using MS Explorer - 0 views

  •  
    People in Germany are being warned about the risks of security when using Internet Explorer. Apparently anyone using versions six through eight are at risk, and are being advised to use another browser.
dr tech

The most embarrassing data losses of all time | Geek with Laptop - 0 views

  •  
    Woweee - look at these and you realise the economics and problems with security of data...
« First ‹ Previous 81 - 100 of 748 Next › Last »
Showing 20 items per page