Saturday, November 23rd, 2013
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead.
The company has implemented "perfect forward secrecy" on its Web and mobile platforms, it said Friday. The ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, November 20th, 2013
We’ve asked the companies in our Who Has Your Back Program what they are doing to bolster encryption in light of the NSA’s unlawful surveillance of your communications. We’re pleased to see that four companies—Dropbox, Google, SpiderOak and Sonic.net—are implementing five out of five of our best practices for encryption. In addition, we appreciate ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 14th, 2013
Sending data in plain text just doesn't cut it in an age of abundant hack attacks and mass metadata collection. Some of the biggest names on the Web--Facebook, Google, Twitter, etc.--have already embraced default encryption to safeguard your precious data, and the next-gen version of the crucial HTTP protocol will only work ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, November 13th, 2013
In May of this year, sophisticated attackers breached a large Internet hosting provider and gained access to internal administrative systems. The attackers appear to have been after customer record information such as usernames, emails, and passwords. While these internal administrative systems had access to customer records, discovery of the attack ...
Posted in Internet, Linux, Security | No Comments
Tuesday, September 17th, 2013
A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level.
As proof of the effectiveness of the approach, ...
Posted in Hardware, Privacy, Security | No Comments