Skip to main content

Home/ Digit_al Society/ Group items matching "security,HTTPS" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Lee Rigby murder: Facebook could have picked up killer's message - report | UK news | T... - 0 views

  •  
    "Facebook had not spotted Adebowale's message containing "graphic" threats, so the security services were not told. The report by the parliamentary intelligence and security committee (ISC) said if the message had been passed to MI5 it could have prevented the murder of the soldier."
1More

Probing the whole Internet - in under an hour - for major security flaws - 0 views

  •  
    "Durumeric leads a team of researchers at the University of Michigan that has developed scanning software called ZMap. This tool can probe the whole public Internet in under an hour, revealing information about the roughly four billion devices online. The scan results can show which sites are vulnerable to particular security flaws. In the case of FREAK, a scan was used to measure the scale of the threat before the bug was publicly announced."
1More

Quantum computing: Game changer or security threat? - BBC News - 0 views

  •  
    "Quantum computing may offer potential benefits to the financial services industry, but it also poses risks. Banks rely on encryption to keep their transactions and customer data secure. This involves scrambling and unscrambling data using keys made of very large numbers - tens, if not hundreds, of digits long."
1More

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong wit... - 0 views

  •  
    ""We have only examined a tiny fraction of this code base and found a critical, election-stealing issue," said Lewis, who is currently executive director of the Open Privacy Research Society, a Canadian nonprofit that develops secure and privacy-enhancing software for marginalized communities. "Even if this [backdoor] is closed its mere existence raises serious questions about the integrity of the rest of the code.""
1More

Forget Passwords: How Playing Games Can Make Computers More Secure - Scientific American - 0 views

  •  
    Sounds a bit extreme just to make sure no one can log on to your laptop or smartphone, but a team of researchers from Stanford and Northwestern universities as well as SRI International is nonetheless experimenting at the computer-, cognitive- and neuroscience intersection to combat identity theft and shore up cyber security-by taking advantage of the human brain's innate abilities to learn and recognize patterns.
1More

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to c... - 0 views

  •  
    "In a collaboration between CyberNews Sr. Information Security Researcher Mantas Sasnauskas and researchers James Clee and Roni Carta, suspicious backdoors have been discovered in a Chinese-made Jetstream router, sold exclusively at Walmart as their new line of "affordable" wifi routers. This backdoor would allow an attacker the ability to remotely control not only the routers, but also any devices connected to that network. "
1More

Serious Security: Phishing without links - when phishers bring along their own web page... - 0 views

  •  
    "As explained above, filling in the forms in the fake HTML pages above will send off your password to websites controlled by the criminals. Of course, email passwords are amongst the most valuable credentials for crooks to acquire, simply because many people use their email account for password resets on a multitude of other accounts."
4More

TikTok unveils European data security plan amid calls for US ban | TikTok | The Guardian - 0 views

    • dr tech
       
      To what extent will a policy ensure the security of data for social media, in a globalised economy?
  • “The Chinese government have never asked us for data,
  • TikTok’s data controls and transfer of data outside of the continent will be monitored by a third-party European cybersecurity firm,
  • ...1 more annotation...
  • Oracle will also monitor TikTok’s algorithms and source code
1More

Are Fingerprints a Secure Way to Pay? | Singularity Hub - 0 views

  •  
    "Sounds lovely. But a few (mostly worried) thoughts come instantly to mind. First, our fingerprints are unique whether or not they're attached to our hand. That sounds like a dangerous incentive to chop off a few fingers, no?"
1More

UK gathering secret intelligence via covert NSA operation | Technology | guardian.co.uk - 0 views

  •  
    "UK's electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world's biggest internet companies through a covertly run operation set up by America's top spy agency, documents obtained by the Guardian reveal."
1More

Security alert: notes from the frontline of the war in cyberspace | Technology | The Gu... - 0 views

  •  
    The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
1More

Major cyber attack disrupts internet service across Europe and US | Technology | The Gu... - 0 views

  •  
    "DDoS attacks are also becoming more common. Brian Krebs, an independent security researcher, observed earlier this month that the "source code" to the Mirai botnet had been released by a hacker group, "virtually guaranteeing that the internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices""
1More

How the Internet of Things Is Dangerous For Your Kids - 0 views

  •  
    "It happened when Hello Kitty's fan site, SanrioTown.com, had its database accessed in late 2015. Here's the catch - it wasn't hacked. According to security researcher Chris Vickery of Kromtech, no hack was necessary. Vickery stated that pretty much anyone could access, "…first and last names, birthday…, gender, country of origin, email addresses, unsalted SHA-1 password hashes, password hint questions, their corresponding answers…," and more."
1More

China launches quantum satellite for 'hack-proof' communications | World news | The Gua... - 0 views

  •  
    ""The satellite's two-year mission will be to develop 'hack-proof' quantum communications, allowing users to send messages securely and at speeds faster than light," Xinhua reported."
1More

​Chrome: Stop future computers from cracking current encryption - CNET - 0 views

  •  
    "Google released a beta test version of its Chrome browser that attempts to keep your data secure even if today's uncrackable encryption becomes tomorrow's code-breaking cakewalk. The Chrome 54 beta gets the ability to encipher data sent to and from websites with a technology called CECPQ1. It "protects against future attacks using large quantum computers," Google said in a blog post Thursday."
1More

Why the internet of things is the new magic ingredient for cyber criminals | John Naugh... - 0 views

  •  
    "The significance of the attack on Krebs is that it looks as though many of the attacks on him came from large numbers of enslaved devices - routers, cameras, networked TVs and the like. "Someone has a botnet with capabilities we haven't seen before," says Martin McKeay, Akamai's senior security expert. The DDoS arms race has just moved up a gear."
1More

MarsJoke ransomware threatens to permanently encrypt files if a ransom is not paid - 0 views

  •  
    "A new strain of ransomware has been targeting government agencies and educational institutions in the United States, through scam emails that pretend to be something important. The malware, dubbed as 'MarsJoke' by Proofpoint security researchers, reportedly began a large-scale email campaign which distributed the cryptomalware last week. The developers are sending out emails which seems to be masked as a message from an airline company."
1More

Biometric recognition at airport border ​​raises privacy concerns, says exper... - 0 views

  •  
    "Michael said recent threats to the security of government-held data such as the census failure should raise real concerns about the storage of biometric data en masse. "I am worried about theft, I don't buy the story that your data is safe. I think we've become almost complacent 'oh there's been another data breach. Oh they hacked in and stole the data'," she said. "Is the next phase of rollout going to be 'oh my e-health records were taken', 'oh my biometrics at border control were taken'?""
« First ‹ Previous 41 - 60 of 734 Next › Last »
Showing 20 items per page