Search

Results 1-20 of 58 for Cameron Art .

Mobile Chrome Hoax Could Target Android Users

A new method for hiding the true location of a website from users of the mobile Chrome Web browser has come to light. Phishers can trick users into revealing their credentials for a legitimate website to operators of a malicious one, security researcher James Fisher reported. Scammers can exploit mo...

Boffins Demo Remote Control of Siri, Google Now

Siri and other smartphone digital assistants may do your bidding -- but they may do a hijacker's as well. That's what two researchers discovered when they began to tinker with the effects of radio waves on smartphones. They could use the waves to issue commands to any Android or iOS phone running Go...

SPOTLIGHT ON SECURITY

Black Hats Offer Million-Dollar iOS 9 Bug Bounty

Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell...

Government Spies Steal SIM Card Cryptokeys

The United States' National Security Agency and British spy agency GCHQ have hacked into the internal computer network of Gemalto, the world's largest maker of SIM cards, and stolen the cards' encryption keys, according to information in files leaked by whistle-blower Edward Snowden. Gemalto makes a...

SPOTLIGHT ON SECURITY

Is the FTC Jumping the Gun on IoT Security?

The security community has been waving a red flag about how the Internet of Things could become a cybercriminal's paradise. Last week, those admonitions were given some credence when the Federal Trade Commission recommended that the makers of IoT gadgets adopt some "best practices" to protect consum...

SPOTLIGHT ON SECURITY

Businesses Waste Big Bucks Fighting Phantom Cyberattacks

Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent ...

Cameron Takes Hard Line on Encrypted Communications

UK Prime Minister David Cameron, who is standing for re-election, has vowed to ban personal encrypted communications apps such as WhatsApp if he is voted in. He also will allow UK government security agencies to monitor communications, with warrants signed by the Home Secretary. "The first duty of a...

Find My iPhone? Find Me! Lost Phone Feature Helps Rescuers Locate Crashed Car

A woman whose car rolled 500 feet down an embankment near San Jose, California, was located through the Find My iPhone feature on her smartphone after spending 19 hours in the ravine where her Chevy Cruze ended up. The OnStar feature in her car triggered two calls to police, at 2 p.m. and 4 p.m. Mon...

SPOTLIGHT ON SECURITY

Is Open Source an Open Invitation to Hack Webmail Encryption?

In a move influenced by Edward Snowden's revelations about the NSA's email snooping, Yahoo and Google last week announced that they were cooperating on end-to-end encrypting their webmail products. "We will release source code this fall so that the open source community can help us refine the experi...

TECH TREK

NSA Lifts Middle Finger to Middle Kingdom

Oh, there have been some good National Security Agency revelations. Like the one about the NSA tapping German Chancellor Angela Merkel's phone. Or the one about the NSA planting agents inside World of Warcraft, or impersonating Facebook in a global quest to spread malware. Delicious as all those sto...

TECH TREK

Departures, Arrivals, Surveillance: Canada Used Airport WiFi Snooparound

Canadian authorities used information culled from a free Internet service at a major national airport to track the wireless devices of scores of travelers. The Communications Security Establishment Canada, or CESC, received information from the unnamed airport's free WiFi system and then used that d...

TECH TREK

Chinese Man Heads to US Prison for Microchip Smuggling Attempt

A Chinese citizen was sentenced to three years in U.S. prison for trying to smuggle American-made microchips to China. The man, Philip Chaohui He, was targeted in a 2011 sting at a Los Angeles-area port. He was nabbed while approaching a Chinese freighter, toting with him 200 radiation-hardened micr...

TECH TREK

Hundreds of Counterfeit Sites Seized in Cybersting

Nearly 700 websites pushing counterfeit products were seized by American and European authorities, according to Europol. U.S. Immigration and Customs Enforcement teamed with European law enforcement agencies to execute the holiday cybersting. It is surely no coincidence that the seizures coincided w...

TECH TREK

Global Cyberheist Reels In $45M

Six people have been arrested for their involvement in a worldwide ATM heist that resulted in the theft of $45 million from two Middle East banks. Five men and one woman, all from the suburbs of New York City, were charged with being members of a cybercrime outfit that lifted debit card information ...

UK Gets Google, Microsoft to Step Up Online Child Porn Fight

Google and Microsoft have ramped up their efforts to fight online child porn following months of pressure by the office of UK Prime Minister James Cameron. Among other things, the two have created a blacklist of search terms for which results will be blocked. When Cameron asked Google and Microsoft ...

Facebook: Decapitation Vids Are OK if You Oppose Decapitation

Facebook has reversed a ban that it implemented earlier this year forbidding the posting of graphic and gruesome content such as videos of decapitations and other atrocities. The social media company apparently made this about-face some time ago, but it only became widely noticed when the BBC report...

TECH TREK

German Hackers Claim They Cracked iPhone Fingerprint Scanner

The Chaos Computing Club, a group of German hackers, claimed to have cracked Apple's new iPhone fingerprint scanner. The scanner is one of the distinguishing features of Apple's new iPhone 5S. It was not immediately clear whether CCC's claims were true, but two prominent iPhone security experts repo...

TECH TREK

Brazil Proposes Laws to Outlaw Foreign Data Storage

Brazil has proposed new laws that would force e-businesses selling to Brazil-based consumers to store personal data about said customers on local servers. Google and Facebook have raised objections to the plan, saying that such requirements would, in the words of Facebook Brazil, "entail huge costs ...

TECH TREK

Library’s Web Filter Decides Hamlet Access Not to Be

A British man was unable to access Shakespeare's classic Hamlet at a public library because the library's WiFi network detected "violent content." The snafu was caused by a new Web filter that weeds out smut and violence, the British Library said, adding that it is "tweaking" the service. Hamlet, vi...

TECH TREK

Australia May Tweak Copyright Laws to Knock Down IT Prices

Australia has recommended changes to copyright law that would allow Aussie citizens cheaper access to IT hardware, software and digital downloads after a parliamentary inquiry found no good reason for prices to be so high Down Under. The inquiry sought to unearth why IT prices were so much higher in...

Technewsworld Channels