website statistics

Archive for the ‘Security’ Category

Congress Members Repeatedly Refused Access To Info About NSA

Congress Members Repeatedly Refused Access To Info About NSA

When Edward Snowden blowed the whistle on the massive surveillance programs being run by NSA, it created quite an uproar. However, the U.S. government and NSA responded by stating that the Congress has long been aware of these measures. But that’s not true since many Congress members have been refused access to information about NSA.

By On August 5, 2013 1 Response
Add To Bookmark Add To Readlist  
FBI Can Remotely Activate Your Android Smartphone Microphone

FBI Can Remotely Activate Your Android Smartphone Microphone

In the recent past, it has been realized that intelligence agencies are usually equipped with the latest exploits, which let them break into any devices and machines they want to. It has now been revealed that FBI can remotely activate your Android smartphone’s microphone, thus listening in on your real-life conversations.

By On August 5, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Can Use Your Smart TV To Watch You

Hackers Can Use Your Smart TV To Watch You

Smart TVs have been around for a while and most of them equipped with a whole plethora of apps as well as in-built internet connectivity, to let you stream any content of your liking. However, a few exploits were recently discovered in certain Samsung Smart TV models, which would let hackers ‘watch’ you through the built-in cameras.

By On August 4, 2013 Respond
Add To Bookmark Add To Readlist  
Russia’s Top Social Network Offers Edward Snowden A Job

Russia’s Top Social Network Offers Edward Snowden A Job

Russia has stirred quite a controversy after it decided to extend temporary asylum to Edward Snowden. As if this was not enough to stir the U.S. government into condemning the incident, now the top Russian social network has offered Snowden a job as a programmer.

By On August 2, 2013 Respond
Add To Bookmark Add To Readlist  
Mobile Devices At Risk From Tech Companies, Developers And Advertisers

Mobile Devices At Risk From Tech Companies, Developers And Advertisers

Malware and similar other nefarious software are usually considered the key problem that plagues the mobile devices. However, in doing so, we often overlook the fact that an even more critical aspect of mobile security are the apps that Apple and Google publish on their marketplaces and which are used to gather our personal information.

By On August 1, 2013 Respond
Add To Bookmark Add To Readlist  
U.S. Gives Russia Reassurances About Snowden

U.S. Gives Russia Reassurances About Snowden

Ever since Edward Snowden’s identity as the man behind PRISM leaks was revealed, the U.S. government has been trying to nab him. In a bid to do so, the Obama administration even force-landed the plane of a Latin American President. Now, responding to Russia’s reservations, U.S. has reassured that Snowden won’t face any death penalty if extradited.

By On July 27, 2013 Respond
Add To Bookmark Add To Readlist  
Apple Confirms Its Developer Center Has Been Breached By Hackers, Still Down

Apple Confirms Its Developer Center Has Been Breached By Hackers, Still Down

For the last two days, Apple’s developer site has been down. At first Apple mentioned that the site was down due to “maintenance” purpose and will be “back soon.” But now Apple has confirmed that its developer center has been hacked and still the site is down.

By On July 22, 2013 Respond
Add To Bookmark Add To Readlist  
FISA Court Renews Government’s Request To Continue Telephonic Surveillance

FISA Court Renews Government’s Request To Continue Telephonic Surveillance

We have extensively covered the PRISM leaks that were divulged by Edward Snowden, revealing how NSA has been part of an extensive surveillance program, bordering on the illegal. Despite the melee these leaks caused, a FISA court has now approved government’s request to continue such telephonic surveillance.

By On July 21, 2013 Respond
Add To Bookmark Add To Readlist  
To Defy Government Surveillance, Google Tests Encryption Of Drive Files

To Defy Government Surveillance, Google Tests Encryption Of Drive Files

The recent PRISM leaks show that the U.S. government has been working closely with certain companies in order to get its hands on users’ data. Google categorically denied any such collaboration with the authorities and the company is now testing the encryption of Google Drive files in order to thwart any government surveillance attempts.

By On July 18, 2013 Respond
Add To Bookmark Add To Readlist  
Microsoft Criticizes NSA Secrecy In Letter To Attorney General

Microsoft Criticizes NSA Secrecy In Letter To Attorney General

We recently reported how Microsoft closely collaborated with NSA on a number of products and services, allowing the agency to have access to user data. Microsoft has apparently felt the heat from the users now and the company has sent a letter to the Attorney General, complaining that the Constitution is ‘suffering’ over NSA secrecy.

By On July 18, 2013 1 Response
Add To Bookmark Add To Readlist  
8-Character Passwords Are Not Secure Any More

8-Character Passwords Are Not Secure Any More

There was a time when security experts confidently claimed that an 8-character password, with a mix of symbols and numbers, is adequately secure. However, that is no longer the case. By combining an accurate estimate of human psychology with the power of latest technology, any 8-character password can be cracked in no time.

By On July 15, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Sell Digital Flaws, Client List Include Governments Too

Hackers Sell Digital Flaws, Client List Include Governments Too

Computer flaws are common and every time a new version of any software comes out, it usually contains some bugs. Conventionally, hackers would find them and report them to the respective maker of the software, who’d pay in return. But increasingly, nations are outbidding these amounts to lay their hands on zero-day exploits first.

By On July 15, 2013 Respond
Add To Bookmark Add To Readlist  
To Avoid Security Leaks, Kremlin Resorts To Typewriters

To Avoid Security Leaks, Kremlin Resorts To Typewriters

In recent times, we have seen a number of whisteblowers reveal the details of unconstitutional measures by different governments in spying on domestic and foreign grounds. In view of such risks, the Russian government has decided to make use of typewriters so that the risk of any potential digital leaks could be mitigated.

By On July 15, 2013 Respond
Add To Bookmark Add To Readlist  
Feds Were Asked By Hackers, Not To Attend Their Conference This Year

Feds Were Asked By Hackers, Not To Attend Their Conference This Year

Every year, DEFCON is the place where thousands of hackers from around the globe come together and discuss a number of security-related issues. Interestingly, feds are usually a part of the audience and even deliver presentations at times. But this year, feds have been asked to take a ‘time out’ and not attend the convention.

By On July 14, 2013 Respond
Add To Bookmark Add To Readlist  
Microsoft Handed Over Skype Calls, Outlook Data To NSA

Microsoft Handed Over Skype Calls, Outlook Data To NSA

Guardian has continued spilling the secrets of NSA’s PRISM program. According to the latest reports by the paper, Microsoft has been actively collaborating with the spy agency, handing it access to Outlook.com as well as the bulk of conversations on Skype.

By On July 12, 2013 1 Response
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook