Skip to main content

Home/ ITGSonline/ Group items matching "security privacy password" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boing Boing - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid Privacy blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default Privacy change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known Privacy vulnerabilities, whether it has parental controls and more."
dr tech

The Celebrity Photo Hack Goes Far Beyond iCloud - 0 views

  •  
    "iTunes phishing scams Compromised phones or computers Celebrity passwords/emails as part of a larger password dump (such as the Adobe hack) Mobile-phone or computer-repair individuals abusing access password reset questions guess Brute force"
dr tech

How the Internet of Things Is Dangerous For Your Kids - 0 views

  •  
    "It happened when Hello Kitty's fan site, SanrioTown.com, had its database accessed in late 2015. Here's the catch - it wasn't hacked. According to security researcher Chris Vickery of Kromtech, no hack was necessary. Vickery stated that pretty much anyone could access, "…first and last names, birthday…, gender, country of origin, email addresses, unsalted SHA-1 security hashes, security hint questions, their corresponding answers…," and more."
Max van Mesdag

How secure is your e-mail password? | Inpassword Complex - 0 views

  •  
    Your e-mail password may be easier to access than you may have thought.
dr tech

Security Expert Bruce Schneier On Securitys, Security and Trust - 0 views

  •  
    "They aren't limited by human notions of attention; they can watch everyone at the same time. So while it may be true that using encryption is something the NSA takes special note of, not using it doesn't mean you'll be noticed less. The best defense is to use secure services, even if it might be a red flag. Think of it this way: you're providing cover for those who need encryption to stay alive."
dr tech

Meltdown and Spectre: 'worst ever' CPU bugs affect virtually all computers | Technology | The Guardian - 0 views

  •  
    "Serious security flaws that could let attackers steal sensitive data, including securitys and banking information, have been found in processors designed by Intel, AMD and ARM. The flaws, named Meltdown and Spectre, were discovered by security researchers at Google's Project Zero in conjunction with academic and industry researchers from several countries. Combined they affect virtually every modern computer, including smartphones, tablets and PCs from all vendors and running almost any operating system."
dr tech

Facebook App's Password Data Breach Turns into Lawsuit - 0 views

  •  
    32 million passwords compromised - yikes...
dr tech

Schneier on Security: Over a Billion Securitys Stolen? - 0 views

  •  
    "This story is getting squrrelier and squrrelier. Yes, security companies love to hype the threat to sell their products and services. But this goes further: single-handedly trying to create a panic, and then profiting off that panic."
dr tech

PIN-punching $200 robot can brute force every Android numeric screen-password in 19 hours - Boing Boing - 0 views

  •  
    Justin Engler and Paul Vines will demo a robot called the Robotic Reconfigurable Button Basher (R2B2) at Defcon; it can work its way through every numeric screen-lock Android password in 19 hours.
dr tech

The Glass Room - 0 views

  •  
    "And if your password can be reverse-engineered to reveal something about you or others like you, how safe or unique is it really."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - Boing Boing - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- securitys, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

6 Reasons Why Biometrics Are NOT the Way of the Future - 0 views

  •  
    "While biometrics may not be the long term alternative to passwords, they are safer to use. Rather than seeing them as separate methods to identify that you are who you say you are, they should instead be viewed as complementary methods that can be used together to verify an individual."
dr tech

Leaked employee passwords open up Fortune 500 companies to hackers - 0 views

  •  
    "At 221 of the Fortune 500 companies, Fortune magazine's list of the the top 500 U.S. public corporations ranked by gross revenue, employees' credentials are posted publicly online for hackers to steal and reuse in cyberattacks, according to new research from the web intelligence firm Recorded Future. "
dr tech

The end of passwords: biometrics are coming but do risks outweigh benefits? | Technology | The Guardian - 0 views

  •  
    "She recounts the moment when her 13-year-old son Jacob - now 16 - was sent to isolation for refusing to register his fingerprint to use the school canteen. "I went to school and said that I didn't give my consent. As a parent I want to be clear that the decisions I make that affect my children are in their best interests."
dr tech

Report: someone is already selling user data from defunct Canadian retailer's auctioned-off servers / Boing Boing - 0 views

  •  
    "When Vancouver tech retailer NCIX went bankrupt, it stopped paying its bills, including the bills for the storage where its servers were being kept; that led to the servers being auctioned off without being wiped first, containing sensitive data -- addresses, phone numbers, credit card numbers, passwords, etc -- for thousands of customers. Also on the servers: tax and payroll information for the company's employees."
dr tech

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en masse / Boing Boing - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
1 - 20 of 20
Showing 20 items per page