Monday, June 2nd, 2014
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.
The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has ...
Posted in Internet, Privacy | No Comments
Monday, June 2nd, 2014
We highlighted in our quarterly threat roundup how various ransomware variants and other similar threats like CryptoLocker that now perform additional routines such as using different languages in their warning and stealing funds from cryptocurrency wallets. The addition of mobile ransomware highlights how these threats are continuously improved over time.
We recently encountered another variant that used the Windows ...
Posted in Internet, Privacy, Security | No Comments
Friday, May 30th, 2014
Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according to Panda Security.
Trojans are still the most abundant type of new malware, accounting for 71.85% of new samples created during Q1. ...
Posted in Internet, Security | No Comments
Friday, May 30th, 2014
Like a crowbar, security software tools can be used for good and evil.
Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
This month, the security companies Trend Micro and ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, May 28th, 2014
One of the official webpages for the widely used TrueCrypt encryption program says that development has abruptly ended and warns users of the decade-old tool that it isn't safe to use.
"WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues," text in red at the top of ...
Posted in Coding, Internet, Linux, Privacy, Security, Software, Windows | No Comments