Tuesday, May 19th, 2015
Whenever you use anonymity or privacy solutions to protect your Internet traffic from being snooped on or to bypass censorship and location-based restrictions, you need to make sure data about your actual location in the world or underlying system does not leak.
A basic recent example is WebRTC, a new technology ...
Posted in Internet, Privacy, Security | No Comments
Sunday, May 17th, 2015
The UK Government has been quietly changing the Anti-Hacking Laws quietly that exempt GCHQ, police, and other electronic intelligence agencies from criminal prosecution for hacking into computers and mobile phones and carrying out its controversial surveillance practices.
The details of the changes were disclosed at the Investigatory Powers Tribunal, which is ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 29th, 2015
Phishing pages are tricky by nature: they look like standard login pages, but are actually faux sites run by people looking to receive and steal passwords. Google is taking steps to thwart this common and dangerous trap with its Password Alert service.
Password Alert is an open-source Chrome extension that ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 7th, 2015
A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software.
Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 7th, 2015
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware.
It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...
Posted in Internet, Privacy, Security | No Comments