Security

  • Mass Surveillance Threatens Digital Security And Human Rights, Says European Report

    Mass Surveillance Threatens Digital Security And Human Rights, Says European Report

    A 32-page report into mass surveillance by a top European rights body has warned that digital dragnets set up by U.S. government intelligence agencies, and some of the U.S.’ allies in Europe and elsewhere, are endangering fundamental human rights — such as the right to privacy, to freedom of information and expression, to freedom of religion and the right to a fair trial. Read More

  • Canary Home Security | Fly or Die

    Fly Or Die: Canary Home Monitoring System

    The home security market is quickly heating up. As IoT continues to be a dominating trend, security systems that use smaller, faster technology will become the central hub of the home for a fraction of the cost of traditional home monitoring systems. Canary is one of the most affordable and attractive options on the market, offering a single system that offers monitoring of everything from… Read More

  • Security For Startups

    Security For Startups

    In the past two years, cyberspace has clearly changed in ways that threaten every online business, big or small. Startups now use the cloud infrastructure that mature companies do, and quickly aggregate large, juicy caches of private user data and payment credentials. As malware infestations scale to scour the “long tail” of targets, they don’t discriminate between the Fortune… Read More

  • Scientists Make Energy-Generating Keyboard That Knows Who’s Typing On It

    Scientists Make Energy-Generating Keyboard That Knows Who’s Typing On It

    Passwords continue to be a glaring weakness in digital security. And while biometric alternatives, such as fingerprint readers, are finding their way onto more consumer electronics devices, they are not without their limitations either. So what about tightening the security screw further by applying a continuous biometric? Read More

  • Piper Announces New Piper NV Home Monitoring System With Night Vision For $269

    Piper Announces New Piper NV Home Monitoring System With Night Vision For $269

    The home security industry once dominated by complicated, expensive systems is in for a rude awakening. Piper, Canary and Scout are all offering affordable options to keep an eye on your home’s safety, and Piper just announced a new system equipped with night-vision called the Piper NV. The Piper NV comes with all the standard features you’d find on the original Piper, which is… Read More

  • LastPass Launches A Native Password Manager For Mac Offering Quick Search, Security Checks And Offline Access

    LastPass Launches A Native Password Manager For Mac Offering Quick Search, Security Checks And Offline Access

    Longtime password management software company LastPass is rolling out a new, native Mac application this morning, which will offer users more native integration on OS X, while also introducing a number of new features, including instant logins, the ability to run security checks on your online accounts, and a fast search function. With data breaches becoming par for the course, it seems… Read More

  • This List Of 2014’s Worst Passwords, Including ‘123456,’ Is Embarrassing

    This List Of 2014’s Worst Passwords, Including ‘123456,’ Is Embarrassing

    The year 2014, in many respects, was all about digital security. It wasn’t just tech pundits or early adopters who were victimized – Snapchat, Target, and Sony Entertainment all showed us that no one is immune. And don’t get me started on the NSA. It’s our responsibility as internet explorers to protect ourselves. But according to SplashData’s yearly list of the… Read More

  • U.S. Hacked North Korea Before North Korea Hacked U.S.

    U.S. Hacked North Korea Before North Korea Hacked U.S.

    Ever wonder why President Obama so quickly and sure-footedly accused North Korea of hacking into Sony servers? Turns out, the United States had actually hacked into North Korean computer networks back in 2010, giving the government more confidence in their determination of the situation. The NYT reports that the NSA used Chinese networks to route themselves into North Korean computer… Read More

  • U.K. Knots Closer Cyber Security Ties In Washington

    U.K. Knots Closer Cyber Security Ties In Washington

    The U.K. Prime Minister David Cameron is in Washington DC this week, lobbying the U.S. President on the need for circumventing the strong encryption of Internet services. So why is he now banging on about closer “cyber security” co-operation? Read More

  • U.K. PM To Take His Anti-Encryption Drum-Banging To Obama’s Doorstep

    U.K. PM To Take His Anti-Encryption Drum-Banging To Obama’s Doorstep

    U.K. Prime Minister David Cameron is evidently not done banging the anti-encryption drum in public yet — despite being slammed by Internet security experts, startup investors and others earlier this week for appearing to suggest he wants to outlaw strong encryption. Read More

  • U.K. PM Backpedals On ‘Encryption Ban’, Sort Of

    U.K. PM Backpedals On ‘Encryption Ban’, Sort Of

    U.K. Prime Minister David Cameron has been weathering a Twitter storm of mockery for comments he made yesterday in which he appeared to suggest it would be the intention of a future Conservative government to ban strong encryption. Read More

  • Here’s What Happened On Twitter After The U.K. PM Said He Wants To Ban Encryption

    Here’s What Happened On Twitter After The U.K. PM Said He Wants To Ban Encryption

    Yesterday U.K. Prime Minister David Cameron was dubbing a Fox News commenter who had made ludicrous claims on a topic on which he was entirely mis-informed “clearly an idiot”. Today Cameron has been branded a dunce of similar proportions after making a speech calling for encryption to be banned on national security grounds. Read More

  • ISIS “Cyber Caliphate” Hacks U.S. Military Command Accounts

    ISIS “Cyber Caliphate” Hacks U.S. Military Command Accounts

    The Cyber Caliphate, a hacker group claiming association with terrorist group ISIS, today seized control of the @CENTCOM Twitter and YouTube accounts that represents U.S. central military command. The hackers tweeted a Pastebin message titled “Pentagon networks hacked. AMERICAN SOLDIERS WE ARE COMING, WATCH YOUR BACK. ISIS. #CyberCaliphate”. The message includes links to… Read More

  • The Four Horsemen Of The Cyber Apocalypse

    The Four Horsemen Of The Cyber Apocalypse

    If 2014 did anything good for cybersecurity, it showed us just how exposed major corporations, governments and militaries are to cyber attacks. From vulnerabilities in our power grids to our cash registers, cyber attacks have become the $400 billion problem. And while the attacks differ in motive and method, there are four consistent perpetrators charging at us at full speed – and we need… Read More

  • 2014 Hack Retrospective, Or Why Security Ecosystems Matter

    2014 Hack Retrospective, Or Why Security Ecosystems Matter

    The “Year of the Hack” will probably be one way that 2014 will be remembered. But it actually began in 2013 with a phishing email. There are clues to how hacks that began in 2013 (some even earlier) continue to reverberate, even as we begin into a New Year. Read More

  • The FTC Warns Internet Of Things Businesses To Bake In Privacy And Security

    The FTC Warns Internet Of Things Businesses To Bake In Privacy And Security

    The FTC has raised concerns about the complexity and privacy risks posed by the rise of an Internet of Things, with some 25 billion connected objects predicted to be online in 2015, and so-called smart home devices predicted to number around 25 million this year. Read More

  • Surely, Cybersecurity Must Have Your Attention Now

    Surely, Cybersecurity Must Have Your Attention Now

    As if we needed a case study to show us, we saw, with vivid clarity, what can happen when hackers run amok inside servers and start sharing confidential business content with the world — and we learned it gets ugly in a hurry. We’re less than a week into the new year and already we’ve seen a major Bitcoin attack. You know that it’s only a matter of time before we… Read More

  • The Real Cybercrime Geography

    The Real Cybercrime Geography

    When Sony Pictures was the target of a recent cyber attack, computer experts were quick to speculate that North Korea was behind the digital infiltration. Things happen quickly in the digital world, and now many experts are doubting the original idea that North Korea walked around inside Sony servers in reprisal for “The Interview.” Read More

  • The Cybersecurity Tipping Point

    The Cybersecurity Tipping Point

    As we bear witness to the aftermath of major attacks this year against the likes of Target, Home Depot, Neiman Marcus and most recently, Sony, it becomes clear that we are entering an entirely new “war” against cyber crime. Those who do not change their approach will lose. Read More

  • Offshoring Data Won’t Protect It From The NSA

    Offshoring Data Won’t Protect It From The NSA

    The natural reaction of many citizens, companies and governments is to try to get their data out of the United States and out of the hands of American companies.  The idea is a seductive one, even for Americans.  Offshoring money has been a popular strategy for tax avoidance.  Why not offshore data to a foreign company? This offshoring of data to avoid surveillance is not just an idle… Read More

  1. 1
  2. 2
  3. ...