Andreas Dahlqvist

50 Flips | 3 Magazines | 2 Following | 7 Followers | @andreas_ | Keep up with Andreas Dahlqvist on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Andreas Dahlqvist”

The World's Biggest Data Breaches, Visualized

It sometimes feels like there's a big data breach in the news every week—but some are far worse than others. This data visulization shows the world's …

Trends

Botcoin

An increasing number of malware samples in the wild are using host systems to secretly mine <b>bitcoins</b>. In this post, I’ll look at an affiliate program …

Microsoft: Your Privacy Is Our Priority. No, Seriously. Stop Laughing!

Microsoft’s cooperation with the National Security Agency isn’t quite as extensive as the latest in the Guardian’s series of reports on U.S. …

2018 Innovations and Future Tech

April 12, 2018 | Article<p>Tesla is blaming last month's fatal Tesla Model X car crash largely on the driver, not the car itself, according to a …

2018 Innovations and Future Tech

May 16, 2018 | Article<p>If bitcoin energy trends continue, mining bitcoin could soon stop being profitable, an economist found. <br>Read More<p>May 14, 2018 | …

Nations Boost Cyber Defense Spending to Protect Critical Infrastructure

<b>As concerns mount about the possibility of a cyber-attack against critical infrastructure, countries are focusing on boosting their security spending</b> …

Preventing Identity Theft for Your Children

There’s always plenty in the media warning us about the dangers of identity theft to ourselves. But one area where identity theft rarely seems to …

Anatomy of a hack: even your 'complicated' password is easy to crack

In March, readers followed along as Nate Anderson, Ars Technica deputy editor and a self-admitted newbie to password cracking, downloaded a list of …

It’s not just the US—most countries are spying more on their citizens these days

The revelation that the US National Security Agency seems to be collecting the phone records of millions of Verizon customers is shocking, but it’s actually part of a growing trend in which governments worldwide are relying on widespread, unrestricted surveillance in the name of national security.<p>A …

When Your Data Is Currency, What Does Your Privacy Cost?

There was considerable mouth-dropping from publications such as <i>The New York Times</i> at initial reports this week that NSA programs are gathering both telephone records and information gleaned from large tech companies like Google and Microsoft. But as those reports have settled in, reactions have …

LinkedIn suffers site outage due to 'DNS issue'

LinkedIn is battling a DNS issue that took the business social networking site offline for an hour Wednesday night.<p>The outage, which appears to be over for most of LinkedIn's members, began when the site's homepage was replaced by a domain sales page. (See The Next Web for screenshot.) An …

DNS

Ubisoft security breach exposes user data, account holders urged to update passwords

If you've ever signed up for a Uplay account, your information could now be in the hands of criminals. Ubisoft's confirmed that a security breach at one of its sites, now closed, has granted hackers access to sensitive user data (i.e., usernames, emails and passwords). Critically, no actual …

Cryptographic bug in Android lets hackers create malicious system apps

Security researchers have found a bug in Android which allows them to create malicious Android apps which appear to be genuine with the correct digital signatures. In computing, digital signatures allow any piece of data, including an app, to be checked to see that it is genuine and actually comes …

Apps

Facebook security bug exposed 6 million users' personal information (update)

Today, Facebook announced a security bug that compromised the personal account information of six million users. In a post on the Facebook Security page, the site's White Hat team explained that some of the information the site uses to deliver friend recommendations was "inadvertently stored with …

Three Steps You Can Take to Protect Yourself From Online Spying

The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe …

Privacy

Hackers turn into cyber-mercenaries as nations battle a virtual war

A British intelligence report said on Wednesday that other nations are hiring hackers to launch attacks against their enemies, a trend it described …

How America Is Fighting Back Against Chinese Hackers

This week, United States and Chinese leaders sat down for a special cybersecurity working group, a rare but increasingly necessary opportunity to …

Cybersecurity

EU cookie law 'is a disaster', claims HP data privacy officer

The EU cookie Law "is a disaster" according to HP's privacy officer EMEA, Daniel Pradelles. The law is part of the EU Directive on Privacy and …

Online Privacy

Root SSH Key Compromised in Emergency Alerting Systems

<b>Digital Alert Systems From Monroe Electronics Contain a Known SSH Private Key and are</b> <b>Vulnerable to Remote Attack</b><p>File this one among the stories that …

Cyberattack on South Korea was part of 4-year spying campaign

South Korea has been under a concerted cyberattack for the last four years, according to a comprehensive new report (PDF) released Monday by security firm McAfee. That means the hack that crippled three TV broadcasters and two banks in March was possibly just the tip of the iceberg.<p>What has been …

South Korea

Here's A Tool To See What Your Email Metadata Reveals About You

Earlier this week, Mike Masnick of Techdirt complained that anyone who dismisses the NSA’s collection of metadata around people’s phone calls and emails (as revealed in the Snowden Leaks) “because it’s ‘just metadata’ doesn’t know what metadata is.” The argument is that you can learn a lot about …

Cyber Attacks Targeted Key Components of Natural Gas Pipeline Systems

<b>Attackers Used Brute Force Attacks Against Internet-Facing Controls Systems at Gas Compressor Stations</b><p>In its latest monthly report designed to …

Who’s Behind The Styx

Earlier this week I wrote about the Styx Pack, an extremely sophisticated and increasingly popular crimeware kit that is being sold to help …

Data Security 101: Avoiding the List (INFOGRAPH)

<b>EXECUTIVE SUMMARY:</b><p><i>Thanks to the rampant digitization of healthcare data, breaches have become commonplace in an industry that lacks advanced security</i> …

Hard drive-wiping malware that hit South Korea tied to military espionage

"Dark Seoul" attack that wreaked havoc is part of spy campaign operating since 2009.<p>The hackers responsible for a malware attack in March that …

Club Nintendo Attacked by Hackers; 24,000 Accounts Compromised

<b>Nintendo reported that their fan site has been hacked compromising 24,000 accounts which contain user’s real names, addresses, and contact …

14 Infamous Computer Virus Snippets That Trace a History of Havoc

Computer viruses are almost as old as personal computers themselves, and their evolution was only hastened by the birth of Internet. And within each …

SQL Servers