Tuesday, June 3rd, 2014
Comcast Corp. the nation's largest Internet provider by number of homes and businesses served, Tuesday said it would begin scrambling customers' email to protect it from prying eyes.
The move came just hours after Google called out email providers, including Comcast, for not using encryption. Google Tuesday publicized for the first time the ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, June 3rd, 2014
Home computers and point-of-sale (POS) devices are both being targeted by a recently identified piece of malware that has already compromised thousands of payment cards – the majority of which were issued in the United States.
On May 23, Arbor Networks researchers discovered Soraya, a piece of malware that combines memory scraping techniques ...
Posted in Internet, Privacy, Security | No Comments
Monday, June 2nd, 2014
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.
The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has ...
Posted in Internet, Privacy | No Comments
Monday, June 2nd, 2014
We highlighted in our quarterly threat roundup how various ransomware variants and other similar threats like CryptoLocker that now perform additional routines such as using different languages in their warning and stealing funds from cryptocurrency wallets. The addition of mobile ransomware highlights how these threats are continuously improved over time.
We recently encountered another variant that used the Windows ...
Posted in Internet, Privacy, Security | No Comments
Friday, May 30th, 2014
Like a crowbar, security software tools can be used for good and evil.
Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
This month, the security companies Trend Micro and ...
Posted in Internet, Networking, Privacy, Security | No Comments