Skip to main content

Home/ Digit_al Society/ Group items tagged Security

Rss Feed Group items tagged

Mcdoogleh CDKEY

BBC News - New iPhone worm can act like botnet say experts - 0 views

  •  
    Technology: iPhone Firms involved: Dutch Online Bank ING. SE issues: Privacy Policies & Standards Securities
dr tech

Beware of This Dangerously Convincing Google Docs Phishing Scam - 0 views

  •  
    ""The fake page is actually hosted on Google's servers and is served over SSL, making the page even more convincing," Symantec security expert Nick Johnston explained in a blog post. "The scammers have simply created a folder inside a Google Drive account, marked it as public, uploaded a file there, and then used Google Drive's preview feature to get a publicly accessible URL to include in their messages.""
dr tech

Edward Snowden interview: breaking law was only option, says whistleblower | World news... - 0 views

  •  
    "In his most extensive public comments to date Snowden sought to answer critics who have said his actions damaged US national security or that the threat from the secret government surveillance he revealed was overblown. Snowden was interviewed by the NBC News anchor Brian Williams, who travelled to Moscow for the meeting"
dr tech

Brute-force iPhone password guesser can bypass Apple's 10-guess lockout - Boing Boing - 0 views

  •  
    "The IP Box costs less than £200 and can guess all possible four-digit passwords in 111 hours. The device bypasses the secure wipe triggered by ten bad guesses by "aggressively cutting the power after each failed PIN attempt, but before the attempt has been synchronized to flash memory." "
dr tech

What we know about 'Regin,' the powerful malware that could be the work of NSA - 0 views

  •  
    "Regin is a tool capable of infecting and compromising entire networks, not just individual computers, as security companies Symantec and Kaspersky Labs detailed in their technical reports published on Sunday and Monday. It's not only a computer virus or malware, but also a toolkit or platform that can be used for different purposes, depending on the needs of the attackers. It can collect passwords, retrieve deleted files, and even take over entire networks and infrastructures, according to researchers. "
dr tech

Sixth-grader creates method for deriving highly secure, yet easily remembered passwords... - 0 views

  •  
    ""All passwords are Diceware generated and contain six words," Mira says on her website. "I write the passwords by hand and do not keep a copy of what I have sent to you. The passwords are sent by U.S. Postal Mail, which cannot be opened by the government without a search warrant." She also recommends you alter the pass phrase slightly after she sends it to you."
dr tech

Botnets running on CCTVs and NASs / Boing Boing - 0 views

  •  
    "Researchers at Incapsula have discovered a botnet that runs on compromised CCTV cameras. There are hundreds of millions, if not billions, of these in the field, and like many Internet of Things devices, their security is an afterthought and not fit for purpose. "
dr tech

A dangerous piece of PC ransomware is now impossible to crack - 0 views

  •  
    "TeslaCrypt ransomware with new features that are impossible to crack, according to Cisco's Talos security arm. That means user infected with the latest version (3.01) of the malware can no longer use white hat-engineered software to get their files back. Until someone finds a new solution -- and that seems unlikely -- victims will have to pay."
dr tech

Google is giving a big boost to Gmail security - 0 views

  •  
    "Google announced on its blog that it is expanding upon Safe Browsing to alert Gmail users about the possibility of suspicious government activity. Since 2012, Google has put a banner on top of users' Gmail pages that had a warning about state-sponsored attackers if Google believed they were in danger, but starting today people will get a full-page warning about it - very hard to miss."
dr tech

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
dr tech

The malware that's pwning the Internet of Things is terrifyingly amateurish / Boing Boing - 0 views

  •  
    "If mediocre malware can power some of the largest DDoS attacks ever, and considering the sad state of security of the Internet of Things in general, we should probably brace for more cyberattacks powered by our easy-to-hack "smart" Internet of Things, as many, including ourselves, had predicted months ago."
dr tech

Wisconsin Company To Implant Microchips In Employees | KSTP.com - 0 views

  •  
    "Each chip costs $300 and the company is picking up the tab. They're implanted between a person's thumb and forefinger. Westby added the data is both encrypted and secure. "There's no GPS tracking at all," he said. No one who works at Three Square Market is required to get the chip implant." HOW scary is this!
dr tech

SpaceX stops all employees from using Zoom - 0 views

  •  
    "As Reuters reports, on March 28 SpaceX sent out an email to all of its 6,000+ employees telling them access to the Zoom video chat service had been disabled. The email stated, "We understand that many of us were using this tool for conferences and meeting support ... Please use email, text or phone as alternate means of communication." The stated reason given for disabling access to the service is, "significant privacy and security concerns.""
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

NHS services in England and Scotland hit by global cyber-attack | Society | The Guardian - 0 views

  •  
    "Computer security experts suggested that the crisis could reflect weaknesses in the NHS's cybersecurity. Ross Anderson, of Cambridge University, said the attack appeared to exploit a weakness in Microsoft's software that was fixed by a "critical" software patch earlier this year but which may not have been installed across NHS computers."
dr tech

Backdoor access to WhatsApp? Rudd's call suggests a hazy grasp of encryption | Technolo... - 0 views

  •  
    "That's the crux of the problem. While you can legislate to only give state agencies access to terrorists' communications, and with proper oversight and authorisation, you cannot actually build encryption that works like that. If you put a backdoor in, it's there not just for security services to exploit, but for cyber-criminals, oppressive regimes and anyone else."
« First ‹ Previous 101 - 120 of 748 Next › Last »
Showing 20 items per page