Public WiFi Safety Guide

How to use free public Wi-Fi without hackers stealing your data

By on April 23, 2015 at 12:25 PM.

How to use free public Wi-Fi without hackers stealing your data

Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong cellular signals, users can connect their phones, tablets and laptops to public Wi-Fi hotspots in order to conserve data on their mobile plans and steer clear of those pesky data caps.

Of course, there is one problem with public Wi-Fi networks, and it’s a big one: They’re completely open, which means any data you send or receive while connected to these networks is vulnerable and can easily be stolen by hackers. More →

No Comments
Samsung Galaxy S5 Fingerprint Scanner Hack

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

By on April 22, 2015 at 8:15 PM.

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

Well, let’s hope you never used the Galaxy S5’s fingerprint scanner. Forbes reports that researchers from security firm FireEye have found a scary flaw in the Galaxy S5’s fingerprint scanner that could let hackers copy your fingerprints and use them for nefarious purposes. More →

No Comments
iPhone Security Flaw

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

By on April 22, 2015 at 11:46 AM.

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

Wondering how difficult it is for attackers to cripple your iPhone? The answer isn’t going to make you happy — in a nutshell, all the have to do is create a Wi-Fi network. That’s right, thanks to a newly detailed security flaw in iOS, malicious hackers can send an iPhone into an endless reboot loop simply by creating a Wi-Fi network. And the worst part is that iPhones will connect to these networks automatically, and the only way to stop it is to disable Wi-Fi completely. More →

No Comments
OS X Yosemite Rootpipe Security Vulnerability

‘Rootpipe’ OS X Yosemite security vulnerability not as patched as initially believed

By on April 22, 2015 at 6:50 AM.

‘Rootpipe’ OS X Yosemite security vulnerability not as patched as initially believed

A “Rootpipe” backdoor in various Mac OS X versions, or a security flaw that could give hackers full access to a Mac without authentication, was supposedly patched by Apple in an OS X 10.10.3 update earlier that month. But it looks like the patch doesn’t quite fix the security flaw, The Hacker News reports, as Yosemite computers are still vulnerable to Rootpipe-based attacks. Furthermore, Macs running OS X 10.9 or later have not been patched, and it’s likely they won’t be. More →

No Comments
Snowden Password Tips: Pass-Phrases

Do this now: Set up all your passwords the Snowden way

By on April 21, 2015 at 1:12 PM.

Do this now: Set up all your passwords the Snowden way

A few weeks ago, Last Week Tonight’s John Oliver travelled all the way to Russia to interview Edward Snowden. Snowden, of course is responsible for numerous leaks that revealed the advanced surveillance operations intelligence agencies are capable of nowadays. The interview was particularly enjoyable thanks ti the fact that Oliver’s team was able to present serious matters in very entertaining ways. One of the gems in that episode is related to password security, PopularMechanics points out, with Snowden revealing one key tip that you absolutely should consider when setting up online passwords.

More →

No Comments
iPhone iOS App Encryption Security Issue

1,500 iPhone apps have a serious flaw that hackers can easily exploit

By on April 21, 2015 at 10:20 AM.

1,500 iPhone apps have a serious flaw that hackers can easily exploit

While security companies usually detail vulnerabilities in Android that hackers can use for malicious purposes, analytics service SourceDNA uncovered an encryption flaw that may affect as many as 1,500 applications, Ars Technica reports. Among them, you’ll find some popular titles, including Citrix OpenVoice Audio Conferencing, the Alibaba.com mobile app, Movies by Flixster with Rotten Tomatoes, KYBankAgent 3.0, and Revo Restaurant Point of Sale. More →

No Comments
iPhone Encryption Manhattan District Attorney

Manhattan DA makes the most over-the-top claim about iPhone encryption we’ve heard yet

By on April 20, 2015 at 6:40 PM.

Manhattan DA makes the most over-the-top claim about iPhone encryption we’ve heard yet

We’ve heard a lot of hysterical claims from law enforcement officials about all the awful things that will happen if Apple and Google encrypt their mobile operating systems, but this new piece of hyperbole from Manhattan’s district attorney may take the cake. More →

No Comments
In-Flight WiFi Cybersecurity Risk

Government watchdog says that in-flight WiFi could allow hackers to hijack planes

By on April 15, 2015 at 12:11 PM.

Government watchdog says that in-flight WiFi could allow hackers to hijack planes

In a report released earlier this week, U.S. government watchdog group GAO (Government Accountability Office) warned that the increasing connectivity of our aircraft, from flight tracking technologies to in-flight WiFi, could give hackers an access point to tap in and potentially hijack a flight. More →

No Comments
Facebook Chat Privacy and Scans

A CIA-backed company may be scanning all your Facebook chats

By on April 14, 2015 at 8:30 PM.

A CIA-backed company may be scanning all your Facebook chats

If you thought your Facebook chats are safe from prying eyes, you’re apparently wrong. Bosnadev says that Facebook’s chats are being scanned by a CIA-funded company, a discovery Bosnadev made after looking into some unusual activity on a website triggered by a link present in a Facebook chat. More →

No Comments
Ransomware Removal Software

There’s finally a tool to free you from the ransomware holding your PC hostage

By on April 14, 2015 at 1:35 PM.

There’s finally a tool to free you from the ransomware holding your PC hostage

Of all the malicious software out there that we have to be afraid of, ransomware may very well be the most sinister. As its name might suggest, ransomware is malicious software that hackers use to hold your computer hostage, blocking access to all of your files unless you agree to pay a ransom. Only when the ransom is paid are your files finally freed, and failure to pay will likely result in the permanent loss of all data on your PC.

Now, however, there’s a new free tool to combat some of the most popular ransomware being used right now by hackers. More →

No Comments
John Oliver Edward Snowden Interview

John Oliver interviewed Edward Snowden on Last Week Tonight – watch it here

By on April 6, 2015 at 3:05 PM.

John Oliver interviewed Edward Snowden on Last Week Tonight – watch it here

Edward Snowden was behind one of the biggest leaks of classified information in modern history. The only problem is that most of the information that he leaked is extraordinarily difficult to parse for the average American. Do you really understand what PRISM does? Do you have any idea how Executive Order 12333 affects your life?

More →

No Comments
Google Android Security Report

Google is scanning your Android devices, but don’t worry – it’s for all the right reasons

By on April 2, 2015 at 11:00 PM.

Google is scanning your Android devices, but don’t worry – it’s for all the right reasons

This probably won’t come as much of a surprise, but Google is scanning every single app that finds its way on to your phone, whether you downloaded it from Google Play or a third-party source.

More →

No Comments