Saturday, August 3rd, 2013
Do you carry your cell phone with you wherever you go? Of course you do. Indeed, a study even showed that 75% of people actually use their phone while in the bathroom! So is it any surprise that the best way to get information on suspected criminals would be to snoop ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Saturday, August 3rd, 2013
More major brand-name Wi-Fi router vulnerabilities continue to be discovered, and continue to go unpatched, a security researcher has revealed at Defcon 21.
Jake Holcomb, a security researcher at the Baltimore, Md.-based firm Independent Security Evaluators and the lead researcher into Wi-Fi router vulnerabilities, said that problem is worse than when ISE ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Saturday, August 3rd, 2013
Ethan Oberman has a problem with cloud computing. "A person should be able to use cloud technologies without relinquishing his or her privacy," explained Oberman, CEO of cloud storage service SpiderOak, in a phone interview.
Given Internet companies that rely on mining data about users for revenue, government agencies that have the ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Monday, July 29th, 2013
"Hello Mr Welch. Visa Card Services here." That was the line with which my nightmare started one Sunday morning, hungover, sitting on the sofa trying to piece together the night before. The landline rang. I was surprised because I’d only given the number to about three people.
The person on the ...
Posted in Internet, Privacy, Security | No Comments
Thursday, July 25th, 2013
The ferocious nature of modern malware is wreaking havoc on some organizations, forcing security professionals to reassess current security policies and consider spending on modernizing defenses to detect attacks, according to a new survey.
The study, released this week by Enterprise Strategy Group and commissioned by Malwarebytes, surveyed 315 security professionals ...
Posted in Internet, Privacy, Security, Software | No Comments