Saturday, May 23rd, 2015
In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder.
Tor (The Onion Router) is the most popular anonymity network that is intended to allow a user to browse ...
Posted in Internet, Privacy | No Comments
Friday, May 22nd, 2015
If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android gets stolen, how sure are you that your anti-theft solution will do a good job wiping it and/or locking the device?
Consumers ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Thursday, May 21st, 2015
You've been hit by ransomware and you don't know what to do?
Jada Cyrus has assembled a helpful "Ransomware Removal Kit" which contains decryption tools for CryptoLocker, CoinVault, TeslaCrypt and FBIRansomWare, along with instructions on how to use them.
"You should never pay the ransom. This will only reinforce this type of ...
Posted in Internet, Privacy, Security, Windows | No Comments
Wednesday, May 20th, 2015
Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them.
The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet. The ...
Posted in Hardware, Internet, Networking, Security | No Comments
Tuesday, May 19th, 2015
Google has patched a high-risk vulnerability in its Chrome browser that allows an attacker to escape the Chrome sandbox.
That vulnerability is one of 37 bugs fixed in version 43 of Chrome. Six of those flaws are rated as high risks and Google paid out more than $38,000 in rewards to ...
Posted in Internet, Security | No Comments