Digital Security

By Wesley Fryer | Wesley Fryer created a magazine on Flipboard. “Digital Security on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Wesley Fryer”.

A VPN can stop internet companies from selling your data — but it’s not a magic bullet

‘We shouldn't have to buy trust as an add-on service’<p>Earlier this week, the Senate voted to repeal privacy measures that would stop internet service providers from sharing their users’ internet activity with third parties. Those rules were passed in October, but not only does this vote undo them, …

Net Neutrality

​Microsoft yanks Docs.com search after complaints of exposed sensitive files

Security experts pointed to numerous sensitive and personal files found on Microsoft's document sharing site, which lets users share documents …

Microsoft

How to protect your iCloud account, as some hacked credentials confirmed valid

While the available evidence suggests that hackers have not gained <i>direct</i> access to more than 600 million iCloud accounts, some of the sample login credentials supplied by the group have been found to be valid. <i>ZDNet</i>, for example, used Apple’s password reset function to test 54 logins supplied by the …

Security

GoDaddy Acquires Sucuri To Step Up Advanced Security For Its Customers

GoDaddy Inc (NYSE: GDDY) is known for hosting domain names for millions of websites around the world. It has more than 14.5 million customers …

GoDaddy

Digital Privacy at the U.S. Border: Protecting the Data On Your Devices and In the Cloud

by Sophia Cope, Amul Kalia, Seth Schoen, and Adam Schwartz<p>Download the report as a PDF.<p>EXECUTIVE SUMMARY<p>The U.S. government reported a five-fold …

Big Brother

iPhone Spam? 3 Great Apps for Blocking Spammers and Robocalls

There’s been a bit of a spam call epidemic going on recently, How to Stop Annoying Telemarketers & Robocalls From Calling You How to Stop Annoying …

Android’s Huge Security Problem Is Getting Less Huge

First, the good news: Half of all Android devices have gotten fairly recent security updates, patching the hackable flaws that leave users vulnerable …

Google

Windows 10: DoubleAgent zero-day hijacks Microsoft tool to turn antivirus into malware

Microsoft's Application Verifier tool can be used by attackers to grab control of antivirus software, researchers say.<p><i>Cybellum says DoubleAgent is a</i> …

Malware

This American Surveillance Tool Helped Russians Spy On Androids And iPhones

As the infamous tourism tagline for Nevada’s gambling paradise goes, what happens in Vegas stays in Vegas. For Joshua Alner, a resident of Sin City, the opposite is true.<p>Alner is the chief of a small malware merchant, Killer Mobile, whose Tracer surveillance tool for Android and iPhone has spread …

Russia

Bypassing encryption: “Lawful hacking” is the next frontier of law enforcement technology

Intelligence agencies are going to find new ways to get access to information stored online<p>This article was originally published on The Conversation.<p>The discussion about how law enforcement or government intelligence agencies might rapidly decode information someone else wants to keep secret is – …

Encryption

Here are the top 6 ways websites get hacked, according to Google

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.<p>In 2016, the number of hacked websites …

Google

Employee passwords are behind massive security breaches

SPONSORED:<p><i>Presented by Dashlane</i><p>Yahoo, MySpace, Tumblr, and LinkedIn made headlines in the last 12 months for their enormous data breaches. Hackers released the data for 1.5 billion Yahoo accounts, 167 million LinkedIn users, 360 million user records on Myspace, and over 65 million Tumblr …

Data Breach

LastPass hit by password stealing and code execution vulnerabilities

Google cyber-sleuth Tavis Ormandy has returned to examining LastPass, and a new lot of vulnerabilities have been discovered.<p>LastPass has closed a …

Information Security

Google, Jigsaw seek to stop election hacks

While the US government investigates how Russians hacked the 2016 presidential race, Alphabet's Jigsaw and Google want to make sure it won't happen again.<p>Elections worldwide need stronger cybersecurity, and Google says it has a solution.<p>Jigsaw, a tech incubator owned by Google parent company …

Google

In New York, data breaches shot up 60% last year

On Tuesday, the office of New York State Attorney General Eric T. Schneiderman released a summary of the year 2016 in data breaches. Collecting any breach that affected New York state residents, the Attorney General’s office saw those numbers swell by 60 percent overall last year. While hacking …

Data Breach

Seven best practices for wireless cyber security

The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...<p>The System Integrator …

We have too many passwords. We only need one trusted, strong online identity.

Can you imagine carrying 295 driver’s licenses? Of course not — so why is it okay in the digital world?<p>How many passwords do you manage? I have 295 digital versions of me to access online assets from my bank to Facebook and everything in between. That’s a problem.<p>These credentials are all me. I’m …

Security

Crossing the Border? Here’s How to Safeguard Your Data From Searches

Travelers, beware: When you take your gadgets abroad, maintaining the security of the data on your devices is just as important as protecting yourself from muggers.<p>For whatever reason, foreign and domestic governments may have an interest in your personal data, including your social media …

Security

How to Pick a Secure Messaging App

Secure messaging apps are in the news these days, following a WikiLeaks dump of alleged CIA documents that showed how hackers might be able to …

Encryption

Why relying on antivirus signatures is simply not enough anymore

How is it possible that in an industry dominated by advanced performance metrics and benchmarking tests, cybercriminals still manage to release …

DOJ indicts Russian spies in massive Yahoo breach

The indictments are part of the largest hacking case the Justice Department has ever pursued.<p>Updated 03/15/17 02:21 PM EDT<p>In a landmark move, the Justice Department on Wednesday indicted four men, including two Russian spies, for hacking into Yahoo and stealing data on 500 million users.<p>The …

Cybercrime

New (but Old) Technique Hijacks User Sessions on All Windows Versions

A security researcher has detailed a way to log into any account on the same computer, even without knowing its password. The trick works on all …

Microsoft

Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching

Here’s an overview of some of last week’s most interesting news, podcasts and articles:<p><b>Vulnerability in WhatsApp and Telegram allowed complete</b> …

Cybersecurity

Saks Fifth Avenue Exposed Personal Info On Tens Of Thousands Of Customers

Email addresses, phone numbers and product codes were made available on publicly accessible pages.<p>The personal information of tens of thousands of customers of Saks Fifth Avenue has been publicly available in plain text online, BuzzFeed News has learned.<p>The online shopping site for the brand is …

Data Breach

Are Free VPN Apps Worth the Risk? Experts Say 'No'

The Google Play app store holds about 250 Android apps that provide access to virtual private network (VPN) services.<p>The bad news? Many of these VPN …

Security

Don’t believe the story about hackers locking guests in their rooms at a luxury hotel

The hotel’s computers were hacked and held ransom, but there was no computerized hostage-taking<p>A story that’s been circulating over the past week — “Hotel ransomed by hackers as guests locked in rooms” — should be taken with a little more than just a pinch of salt.<p>According to a report (since …

Hotels

How Hackers Can Break Into Your Accounts Without Your Password

And how to make sure it doesn't happen to you.<p>In the wee hours of Wednesday morning, a host of prominent Twitter accounts were compromised. So yeah: Now's a good time to check your own accounts and make sure you close the backdoor that let this happen to other people.<p>These professional and verified …

Feature or flaw? How to hijack a Windows account in less than a minute

By the researcher's own admission, he's not sure if it's a newly-discovered security flaw — or a feature.<p>A security researcher has published a way to …

Microsoft

Ransomware Attack Locks Democratic State Senators Out Of Their Computers

The hackers are demanding money from the Pennsylvania lawmakers.<p>WASHINGTON ― A ransomware attack has frozen Democrats in the Pennsylvania state Senate out of their computers, data, email and website.<p>The attack, believed to be the first such on a state legislative party organization, was discovered …

Ransomware