Humani

39 Flips | 4 Magazines | 17 Likes | @Humani2014 | Keep up with Humani on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Humani”

Hacker Lexicon: What Is Phishing?

Your IT department has no doubt warned you not to click on suspicious links in e-mails, even when the missive promises a hilarious video or comes …

Phishing

NY Cops Used 'Stingray' Spy Tool 46 Times Without Warrant

The police department in Erie County, New York fought hard to prevent the New York Civil Liberties Union from obtaining records about its use of a …

Surveillance

Anonabox Recalls 350 'Privacy' Routers for Security Flaws

The project to build a tiny, anonymity-focused router known as Anonabox has overcome plenty of hurdles to get to market: critics who pointed to …

Routers

Account Suspended

Google and Apple's new laptops may sound bad now, but they are the future of computers

A few days ago, we learned Apple's new MacBook is about four years behind in terms of performance. It has a gorgeous new design and a sharp display, but costs more and isn't as powerful as the entry-level MacBook Air.<p>Google is following a similar trend. Its newest computer, an updated model of the …

Facebook launches new guide to understanding your security settings

If you don’t fully understand the privacy and security settings associated with your account, then you’re not alone — Facebook has tried many times …

Facebook

Cloud computing is safer than conventional data centres

Connventional IT wisdom says that you’re safer and more secure when you control your own on-premises data center. Yet if you think about every major …

Big Data Is Watching You (at Work)

<b>By Lambert Strether of Corrente.</b><p>There’s been some admiring coverage in the Wall Street Journal and elsewhere of UPS’s Orion system of algorithmic …

Global WiFi Will Cover Earth In Radiation And Destroy Ozone Layer

Could big data determine who wins the General Election?

Political science is, at last, becoming a 'proper' science. Data analysis techniques are spreading throughout the political class as big data is used …

Hackers Target Users with 'Yahoo Account Confirmation' Phishing Email

<b>Yahoo users receiving another Phishing Scam — The Yahoo Account Confirmation Email is fake!</b><p>A new email titled <b>Yahoo</b> Account Confirmation has surfaced …

Arduino Support for the ESP8266 Serial WIFI Wireless Transceiver Module

The ESP8266 Serial WIFI Wireless Transceiver Module is popular (we have been giving them away in some contests). It packs a lot of features in a …

GHOST Secure, Anonymous Calling Service

Today we have several companies that provide online communication services such as skype, viber, whatsapp and more. The problem with all these …

Password Protect Your Folders With On-the-fly Encryption

Introduction: Password Protect Your Folders With On-the-fly Encryption<p>There are a variety of ways to protect your folders with a password. Generally, …

TrueCrypt code security audit complete; software free of back doors

A crowdfunded third-party security audit of popular (and shuttered) personal encryption tool TrueCrypt has concluded. The effort, led by …

How To Make A Secret Phone Call

To show how hard phone privacy can be, one artist examined the CIA, consulted hackers, and went far off the map (with a stop at Rite Aid).<p>There’s a lot you can find in the depths of the dark web, but in 2013, photographer and artist Curtis Wallen managed to buy the ingredients of a new identity. …

How Hackers Could Use A Nest Thermostat As An Entry Point Into Your Home

Security researcher TrapX Security is showing off how hacking an internet-connected thermostat made by Google-owned Nest can be the jumping off point to gaining control of other devices in your home.<p>The research is an example of the possible vulnerabilities we’re exposing ourselves to as internet …

The #1 Thing Employees Do That Compromises Their Own Company's Cyber Security

<i>Cyber security is a top concern in the IT industry today. In this series, we will look at various threats to cyber security – and what steps businesses can take to meet those threats head on.</i><p>As a white hat hacker whose job it is to look for loopholes in cyber security, I love to check out cars and …

Self-deleting malware targets home routers to gather information

The malware purports to be an Adobe Flash update, and was detected by Trend Micro as TROJ_VICEPASS.A, or VICEPASS.

A deeper dive into vulnerability management

Welcome to our annual rundown of vulnerability management tools. This is an interesting category as much for its stability as its evolution. …

The #1 Cyber Security Threat To Information Systems Today

<i>Cyber security is a top concern in the IT industry today. In this series, we will look at various threats to cyber security – and what steps businesses can take to meet those security threats to information systems head on.</i><p>Hacking today is big business. Hackers put in long, hard hours for payoffs …

Malware Snoops Through Your Home Network

<i>Analysis by Kenney Lu</i>In recent years, we have seen a lot of reports about home routers being vulnerable to attacks. Our research as early as 2008 …

Here Are the Places Where You're Most Likely to Get Your Identity Stolen

Watch out in Florida.<p>Fraud can happen anywhere, but certain places seem to have it worse than others. The Federal Trade Commission recently published …

The new MacBook's single port comes with a major security risk

After years of development, USB Type-C is making a very big debut. Last week, Apple announced its new MacBook would come with just a single Type-C plug for both power and data, a move that allowed for the slimmest MacBook ever. A few days later, Google unveiled the new version of its flagship …

Most Of The Web Is Invisible To Google. Here's What It Contains

A roadmap of the Internet's darkest alleys<p>You thought you knew the Internet. But sites such as Facebook, Amazon, and Instagram are just the surface. There’s a whole other world out there: the Deep Web.<p>It’s a place where online information is password protected, trapped behind paywalls, or requires …

Penguin Random House

The Pirate Bay's new network is making ISP blocks useless

Despite global efforts to put the kibosh on infamous torrent site The Pirate Bay (TPB), the lair of internet swashbucklers is proving almost impossible to sack. Swedish police succeeded in taking the site down late last year, only for it to reappear the following month. And stronger than ever it …

Net Neutrality

Your Favorite Browser Just Got Hacked, But Don’t Panic

How can I know what your “favorite browser” is? It doesn’t matter, really; if it’s any one of the four most popular browsers — Chrome, Internet Explorer, Firefox, or Safari — it’s just been successfully exploited.<p>This past week marked the 8th annual Pwn2Own, where security researchers come from …

This string of characters will probably crash your Chrome tab on OS X

A string of 13 characters is all it takes to bring down any tab in Chrome for OS X. As reported by <i>VentureBeat</i> and <i>Gizmodo</i>, the text has no impact if you're on Windows, Android, or iOS. But open any page or tab with the string on a Mac, and Chrome will crumble — or at least your current tab will. A …