Jeremy

28 Flips | 4 Magazines | 2 Followers | @jakrach | Keep up with Jeremy on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jeremy”

‘Shell Shock’ command line vulnerability present in OS X, could be bigger than Heartbleed

<b>Update:</b> Apple has issued a statement to iMore regarding this issue, stating that most Mac users are already protected unless they have configured “advanced UNIX services.” An update is in the works to protect those users.<p>A vulnerability in Bash, the software used to control the command shell in …

Google's new Nexus phone will reportedly be a super-sized Moto X

It looks like Motorola's in for a busy few months. The company's second-generation Moto X is now shipping, and recent leaks suggest the next smartphone in Verizon's Droid line is also on the way. But according to <i>9to5Google</i>, there's something even bigger in the works. Way bigger. Motorola is said to …

Apple Aware of iCloud Brute Force Vulnerability Six Months Before Celebrity Photo Hacks

A report by <i>The Daily Dot</i> claims Apple knew about a brute force security vulnerability in their iCloud service six month before it was used to hack …

Forget Google Analytics, FullStory lets you 'replay' any visitor's interaction with your website

Web developers can find it challenging to fix bugs that users report if they can’t recreate the problem themselves. But FullStory, a company started by a group of ex-Google employees, is building a product that can help with that.<p>FullStory, which is announcing today that it has raised a new $1.2 …

Verizon fought the NSA's metadata collection program but lost anyway

It looks like Verizon's concerns about government snooping go beyond publishing transparency reports -- but also haven't had much of a tangible effect. The <i>Washington Post</i> understands through both a declassified ruling and sources that Big Red quietly challenged the constitutionality of the NSA's …

LinkedIn warns company over “Hack In” tool that shows email addresses

Advertisement<p>3 Comments<p>LinkedIn(s lnkd) is urging people to stay away from Sell Hack, a sinister-sounding service that reveals the personal email …

NSA revelations 'changing how businesses store sensitive data'

The vast scale of online surveillance revealed by Edward Snowden is changing how businesses store commercially sensitive data, with potentially dramatic consequences for the future of the internet, according to a new study.<p>A survey of 1,000 business leaders from around the world has found that many …

NSA chief's legacy is shaped by big data, for better and worse

FT. MEADE, Md. — In nearly nine years as head of the nation's largest intelligence agency, Gen. Keith Alexander presided over a vast expansion of digital spying, acquiring information in a volume his predecessors would have found unimaginable.<p>In Iraq, for example, the<p>National Security Agencywent …

Surveillance

Report: 97% Of Mobile Malware Is On Android. This Is The Easy Way You Stay Safe

In 2013 Android grew to a very large number: 87%. This was its share of the global smartphone market. It also grew to an even larger one: 97%. This was Android’s share of global mobile malware.<p>Unless you’ve had your head under a rock you’ll have noticed the latter is fast becoming the weapon of …

Basecamp Faces DDoS Attack and Blackmail Attempt

Project management tool Basecamp has been struck by a distributed denial-of-service (DDoS) attack. The company says it’s been contacted by a party claiming responsibility, who are also demanding payment in exchange for a virtual ceasefire.<p>Basecamp said it “will not succumb to blackmail” and has …

Microsoft Releases Temporary Fix for Vulnerability in Word

Microsoft is investigating a new remote code execution vulnerability in Microsoft Word. The company has issued a security advisory after confirming reports that the flaw is being exploited as part of targeted attacks against Word 2010.<p>The company has found that the vulnerability affects all …

Tumblr Gets More Secure With Addition Of Two-Factor Authentication

Tumblr today added a very important security feature to its service, with the addition of two-factor authentication – an option available within the blogging service’s “Settings” section as of now. The move sees Tumblr at last joining the ranks of other top tech companies, including Facebook, …

Scalia Comes To Brooklyn, Drops Huge Hint About NSA Surveillance And The Supreme Court

The topic of the NSA's controversial surveillance of telephone metadata came up during a laughter-filled Q&A between Scalia and Judge Andrew Napolitano, a faculty member at Brooklyn Law School and a close personal friend of the justice he accidentally called "Nino."<p>While suggesting that the high …

Surveillance

Associated Press News

NSA can record and search through a whole country’s voice calls, but how remains a mystery

Advertisement<p>1 Comment<p>The NSA devised a system called RETRO that can search through all voice calls in a country over the preceding month, according …

Microsoft Is Doing Us All A Favor By Killing Windows XP

The end is nigh. No, really. Less than a month from now Microsoft will officially stop supporting the Windows XP operating system. Many security experts predict that it won’t be pretty for Windows XP users once the security patches stop rolling out, and some feel that pulling the plug on support is …

Who is winning the 'crypto-war'?

<b>In the war over encryption between the NSA and privacy activists, who is winning?</b><p>Ladar Levison sits exhausted, slumped on a sofa with his dog Princess on his lap. He is surrounded by boxes after he moved into a new house in the suburbs of Dallas, Texas, the previous day.<p>He describes his new home as …

Privacy

NATO Websites Hit In Cyber Attack Linked To Crimea Tension

The Western military alliance's spokeswoman, Oana Lungescu, said on social networking site Twitter that cyber attacks, which began on Saturday evening, continued on Sunday, although most services had now been restored.<p>"It doesn't impede our ability to command and control our forces. At no time was …

Target Warns Data Breach Could Be Worse Than Reported So Far

Target Corp. warned that last year's massive security breach could have been more extensive than reported so far.<p>"Our investigation of the matter is ongoing and it is possible that we will identify additional information that was accessed or stolen, which could materially worsen the losses and …

Security

The World's Richest Ex-Hackers

Long before he was the two-hundred-and-second richest person on the planet, Jan Koum was just another curious kid with a wardialer.<p>Koum, whose net worth suddenly jumped to $6.8 billion last month when his startup WhatsApp was acquired by Facebook, began his tech career as a teenage immigrant from …

Watching You Play: Can A Dystopian Video Game Help Us Better Appreciate The Value Of Privacy?

The biggest challenge for privacy advocates is getting people to appreciate why privacy matters even if you don’t have anything to hide. Those of us who feel strongly about the topic tend to lean on arguments Daniel Solove made in a seminal article back in 2011. But there’s other ways to explore …

Hole In WhatsApp For Android Lets Hackers Steal Your Conversations

As part of what is predominantly an Android security issue, a CTO and consultant has discovered a vulnerability in WhatsApp encryption that could allow another app to access and read all of a user’s chat conversations within it.<p>Bas Bosschert, the CTO at DoubleThink, has posted his own method for …

Report: NSA Has Plans To Infect “Millions” Of Computers With Malware

The National Security Agency reportedly has plans to control millions of computers by infecting them with malware, according to documents leaked to The Intercept by NSA whistleblower Edward Snowden.<p>“In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a …

Google announces Project Tango, a smartphone that can map the world around it

Google has built a prototype Android smartphone that can learn and map the world around it. The device comes from a new initiative called Project Tango, and it's ready to get the phone into developers' hands to see what the technology is capable of. Google says that the phone will learn the …

Google refuses to pay French privacy fine, forced to post admission of guilt (update)

France and Google are playing a delicate game of brinkmanship in the courts of Europe, and it still isn't clear who'll come off worse. France fined the search company €150,000 ($200,000) last month as a penalty for failing to tell French citizens exactly what happens to their personal data. Google</i> …

Twitter vows fight to disclose more government data requests

The site says it's considering legal options to defend its right to reveal more about the government's requests for user data.<p>The US government is giving tech companies more freedom to disclose government data requests. But for Twitter, it's not enough.<p>In a blog posted Thursday, Jeremy Kessel, …

Surveillance

Snapchat Vulnerability Can Lead to iPhone Denial-of-Service Attacks

A vulnerability in the <i>Snapchat</i> app opens the iPhone up to denial-of-service attacks that can cause the device to freeze and crash, according to cyber security researcher Jamie Sanchez [Google Translation] (via <i>The Los Angeles Times</i>).<p>A weakness in the app’s system can allow a hacker to send thousands …