No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
TechNewsWorld.com
New Open Source Tools Test for VPN Leaks
December 13, 2017
ExpressVPN on Tuesday launched a suite of open source tools that let users test for vulnerabilities that can compromise privacy and security in virtual private networks. Released under an open source MIT License, they are the first-ever public tools to allow automated testing for leaks on VPNs, the company said. The tools are written primarily in Python, and available for download on Github.
Oops... Some HP Laptops Shipped With Hidden Keylogger
December 12, 2017
Some HP laptops users came with a preinstalled program to capture the keystrokes of users, a security researcher recently discovered. The researcher, Michael Myng aka "ZwClose," discovered the keylogger software while trying to solve a keyboard problem for a friend. The software is turned off by default. After Myng contacted HP about the program, it quickly released a patch to get rid of it.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
November 28, 2017
A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk. The technique offered by a number of service providers uses scripts to capture the activity of a visitor on a Web page, store it on the provider's servers, and play it back on demand for a website's operators.
BlackBerry: The Most Important Mobile Company of the Future?
November 20, 2017
If you are like many, when you saw this headline you likely were surprised BlackBerry was still around. As BlackBerry phones left the market, the company fell out of sight. However, behind the scenes it has been moving into industries like automotive. Also, it remains the leading vendor providing mobile security to our politicians, military personnel and major corporations.
Eavesdropper Vulnerability Exposes Hundreds of Mobile Apps
November 10, 2017
Appthority has warned that up to 700 apps in the enterprise mobile environment, including more than 170 that were live in official app stores, could be at risk to due to the Eavesdropper vulnerability. Affected Android apps already may have been downloaded up to 180 million times, the firm said. The vulnerability has resulted in large-scale data exposure.
Amazon Cloud Cam Joins Burgeoning Smart-Home Ecosystem
November 9, 2017
Amazon has begun shipping its latest smart home product, a security camera that works with its Alexa personal assistant and Echo speakers. The Amazon Cloud Cam allows customers to live-stream activity inside their home 24/7. It features 1080p full HD resolution, two-way audio for communicating with family members or pets, night vision technology, and sophisticated identification algorithms.
Sony's Aibo Resurrected From Robot Pet Cemetery
November 2, 2017
Sony has revived its robot dog, Aibo, which it put down, so to speak, in 2006. The autonomous entertainment robot brings fun and joy to the entire family, Sony claimed. It can bond emotionally, give people love and affection, and let them experience the joy of nurturing and raising a companion. Aibo has ultra-impact 1- and 2-axis actuators that let it move smoothly and naturally along 22 axes.
Amazon to Let Delivery Drivers Open Your Front Door
October 26, 2017
Amazon has announced a new service that will allow Prime members to receive in-home delivery of packages with the help of high-tech smart locks that allow drivers to open their front doors. Amazon Key will launch officially on Nov. 8 in 37 U.S. cities and surrounding communities, with additional locations to be added over time. The service will be available at no extra cost to Prime members.
E-Commerce Firms: Get Ready for New Privacy Laws
October 24, 2017
The Federal Trade Commission regulates privacy in the United States, and under the FTC rules, a website need not have a privacy policy at all. However, a website must comply with and not violate its policy if it has one. ifeLock learned that lesson the hard way when " target="_blank">the FTC sued it for failing to abide by its privacy policy. How do other countries' privacy laws apply to U.S. businesses?
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
Anticipating the Smart World of 2027: A Billion Cameras and AI, Oh My...
October 2, 2017
Nvidia went to China last week and made a series of interesting announcements having to do with smart cities and autonomous cars. IBM made an announcement on advancements in tying the Weather Channel to its Watson artificial intelligence engine, and improvements in targeted marketing. We also found out about Oculus' Fall in Love VR project which is kind of like the The Bachelor.
FTC Confirms Probe Into Equifax Data Breach
September 15, 2017
In a rare move, the U.S. Federal Trade Commission on Thursday confirmed that it has opened an investigation into the data breach at Equifax that compromised the sensitive personal information of 143 million U.S. consumers. The FTC announcement came less than a week after Equifax revealed that an unknown party had gained access to names, addresses, Social Security Numbers and other data belonging to nearly half the U.S. population.
How Many Ways Might iPhone X's Face ID Go Wrong?
September 14, 2017
When Apple unveiled its iPhone X on Tuesday, officials highlighted the device's advanced functionality, including what truly could be a game changing feature, its facial recognition technology. The new handset allows users to unlock it simply by looking at it. The 10th anniversary edition of Apple's flagship mobile device is the first Apple handset to utilize Face ID.
Credit Agency Equifax Cracked, 143 Million Consumers Exposed
September 8, 2017
Consumer credit reporting agency Equifax suffered a major criminal data breach that exposed personal information of as many as 143 million consumers in the U.S. between mid-May and July of this year. The attack exposed a range of sensitive personal data, including names, addresses, Social Security Numbers, dates of birth, and in some cases driver's license numbers, Equifax said.
Vivaldi CEO Claims Google Retaliated for Privacy Criticism
September 6, 2017
Vivaldi CEO Jon von Tetzchner, the brains behind both the new Vivaldi browser and the early Opera browser, has accused Google of retaliating against his company after he questioned its customer privacy practices. Vivaldi's Google Adwords campaigns mysteriously were suspended just two days after von Tetzchner's criticisms of Google's handling of customer data were published this spring, he said.
Cyberthieves Train Their Sights on US Mobile Phone Customers
August 29, 2017
A relatively new form of cybercrime recently has been plaguing American consumers. Thieves have been hijacking mobile phone account numbers and then transferring services to a different device. Further, hackers have begun using mobile numbers to raid digital wallets and similar accounts. This type of theft has been successful even against the most sophisticated of consumers.
Google Connects Mobile Searchers to Depression Assessment Tool
August 25, 2017
The National Alliance on Mental Illness on Wednesday announced that Google on mobile now provides people who search for the term "clinical depression" with a direct link to the PHQ-9 questionnaire used by medical professionals in the United States to evaluate patients for the disorder. People can conduct a self-assessment by filling in the questionnaire online.
The Smart Home Appliance and You
August 22, 2017
The recent rumor that iRobot had engaged in talks with Apple, Amazon and Google parent Alphabet to sell the data its Roomba vacuum cleaner gathers caused widespread privacy concerns. Roomba maps homes -- the spatial dimensions of rooms and distances between furniture and other objects -- and the data it collects would be valuable to any of the major players battling to control the smart home.
Comcast, Google Can Publish Users' Email Contents
August 2, 2017
Comcast's Terms of Service for its Xfinity Internet service gives it, its agents, suppliers and affiliates the right to "reproduce, publish, distribute and display" the content worldwide. It also lets third parties copy, republish or distribute material posted or transmitted using Xfinity Internet. This would include confidential information sent by a company employee or an independent contractor.
Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
July 21, 2017
Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras. Senrio found the flaw in a security camera developed by Axis Communications, one of the world's biggest manufacturers of the devices. The Model 3004 security camera is used for security at the Los Angeles International Airport, according to Senrio.
V2V's Place in an Increasingly Connected World
July 21, 2017
You're probably tired of reading that the Internet of Things is the hottest thing going, and that IoT is a boon to technology and, simultaneously, a potential disaster for security and privacy. However, over the past few years, another IoT-related technology has been growing: vehicle to vehicle. V2V is a way for automobiles to communicate directly with other vehicles on the road.
Vendor Exposes Millions of Verizon Customers on Amazon Cloud
July 17, 2017
Verizon, the largest wireless carrier in the U.S., has confirmed that data belonging to about six million of its wireless customers was exposed after the information mistakenly was allowed to remain unprotected on an Amazon cloud server. The disclosure follows reports that an engineer at Nice Systems allowed the data of 14 million Verizon customers to reside on an Amazon Web Services S3 bucket.
Google Gives Up Scanning Personal Gmail
June 30, 2017
Google recently announced the end of its policy of scanning user emails for targeted advertising purposes -- a controversial practice that riled privacy advocates and spurred legal challenges. Gmail is the world's most widely used email provider, with more than 1.2 billion users. Google attributed its decision to gains it has made in the enterprise.
OTA Report: Consumer Services Sites More Trustworthy Than .Gov Sites
June 22, 2017
The Online Trust Alliance on Tuesday released its 2017 Online Trust Audit & Honor Roll. Among its findings: Consumer services sites have the best combined security and privacy practices. FDIC 100 banks and U.S. government sites are the least trustworthy, according to the audit. The number of websites that qualified for the honor roll is at a nine-year high.
Deep Root Analytics Downplays Giant Voter Data 'Oops'
June 20, 2017
A data contractor working on behalf of the Republican National Committee earlier this month allowed the personal data of 198 million voters to be exposed online, marking the largest ever leak of voter data in history. Deep Root Analytics exposed 1.1 terabytes of sensitive information -- including names, home addresses, dates of birth, phone numbers and voter registration information.
Securing Your Linux System Bit by Bit
June 13, 2017
As daunting as securing your Linux system might seem, one thing to remember is that every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. Fortunately, there are a few basic techniques that greatly benefit users at all levels, and knowing how to securely wipe your hard drive in Linux is one of them.
BitKey Unlocks Mysteries of the Bitcoin Universe
June 1, 2017
BitKey is a Debian-based live distribution with specialist utilities for performing highly secure air-gapped bitcoin transactions. This distro is not for everyday computing needs, but if you are obsessed with the use of bitcoin or other cryptocurrencies, it might be just what you need. I am a high-tech sort of guy with a keen interest in diving through Linux distros both simple and complex.
Leaked Docs Spotlight Complexity of Moderating Facebook Content
May 23, 2017
The public got a rare view into how Facebook tries to keep offensive and dangerous content offline in a report published Sunday. Leaked confidential documents exposed the secret rules by which Facebook polices postings on issues such as violence, hate speech, terrorism, pornography, racism and self-harm, as well as such subjects as sports fixing and cannibalism.
Data Watchdog Cautions Google and UK Health Partner
May 19, 2017
A British data watchdog has raised questions about whether it was appropriate for a healthcare trust to share data on 1.6 million patients with DeepMind Health, an AI company owned by Google. The trust shared the data in connection with the test phase of Streams, an app designed to diagnose acute kidney injuries. However, the sharing reportedly was performed without an appropriate legal basis.
Intertwining Artificial Intelligence With Blockchain
May 18, 2017
Except for those folks living under rocks, everyone knows about or at least has heard of bitcoin. However, not everyone understands the technology of bitcoin, which extends well beyond Internet-based currency. For the rock people, bitcoin is an Internet-based currency that allows for transparency with respect to each transfer of the currency through the use of a distributed database.
See More Articles in Privacy Section >>
Facebook Twitter LinkedIn Google+ RSS
What is the most consequential impact of social media on society today?
It has opened up valuable new channels for civil discourse.
It has destroyed the meaning of "truth" and "fact."
It has made people stronger by facilitating grass roots activism.
It has deepened divisions among groups with opposing views.
It has made it easier for people to support and help each other.
It has made it easier for people to humiliate and hurt each other.