Thursday, June 5th, 2014
Security vendor ESET claims to have discovered the first ever piece of file-encrypting Android ransomware, which has an associated C&C server hosted on a TOR domain to hide its location.The malware, detected by the vendor as 'Android/Simplocker', is most likely a work in progress as the implementation of the encryption ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Tuesday, June 3rd, 2014
Google today announced that it will soon release a Chrome plug-in that will enable end-to-end encryption for web-based email services. The plug-in is based on the OpenPGP email encryption standard.
Google’s plan here is to make encryption easy enough to use to become widespread among mainstream users. Right now, unless you are fairly technical and ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, June 3rd, 2014
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers identified on their networks.
Law enforcement agencies from several countries including the FBI ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, June 3rd, 2014
Comcast Corp. the nation's largest Internet provider by number of homes and businesses served, Tuesday said it would begin scrambling customers' email to protect it from prying eyes.
The move came just hours after Google called out email providers, including Comcast, for not using encryption. Google Tuesday publicized for the first time the ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, June 3rd, 2014
Home computers and point-of-sale (POS) devices are both being targeted by a recently identified piece of malware that has already compromised thousands of payment cards – the majority of which were issued in the United States.
On May 23, Arbor Networks researchers discovered Soraya, a piece of malware that combines memory scraping techniques ...
Posted in Internet, Privacy, Security | No Comments