Verizon Supercookie Opt Out

You can finally stop Verizon’s supercookies from tracking you – here’s how

By on April 1, 2015 at 1:00 PM.

You can finally stop Verizon’s supercookies from tracking you – here’s how

By now you’ve undoubtedly heard of Verizon’s “supercookies,” the unstoppable tracking cookies that Verizon uses to track every single unencrypted website you visit on your mobile device, whether you like it or not. After taking a tremendous amount of heat from users and even consumer rights organizations such as the Electronic Frontier Foundation, Verizon said back in January that it would create a means for users to opt out of its supercookie tracking.

Now, Verizon has finally created three ways for users to opt out of this invasive tracking technique — here’s everything you need to know. More →

No Comments
Uber Account Hack

Warning: Your Uber account might be up for sale on the black market

By on March 31, 2015 at 12:41 PM.

Warning: Your Uber account might be up for sale on the black market

Hackers may have hit Uber and stolen user account details including log-in credentials, full names, the last four digits of credit card numbers and telephone numbers, Threatpost reveals, although the next-generation taxi service is denying the report. The scariest part is that an Uber account can seemingly be bought for as little as $1 on underground forums. More →

No Comments
Password Strength Security

Why your password isn’t as safe or secure as you think

By on March 27, 2015 at 3:51 PM.

Why your password isn’t as safe or secure as you think

Because people are generally unable to come up with rock-solid passwords on their own, many websites that require user-generated passwords employ “password strength meters” which inform users how secure their chosen password is.

If you choose “Puppy” as a password, you’re liable to be told your password is weak and encouraged, if not downright forced, to pick a new one. On the other hand, picking something like “24DoYz@93mU” will likely see you pass with a “strong password” blessing.

Now, new research has discovered that the reliability of many password strength meters themselves may not be all its cracked up to be.

More →

No Comments
Secure Home Wi-Fi Router

Do this now: Secure your home Wi-Fi network with just one click

By on March 27, 2015 at 3:06 PM.

Do this now: Secure your home Wi-Fi network with just one click

Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting users to fake websites that masquerade as genuine trusted sites. From there, they send the users more ads than they’d usually see while online, potentially steal their personal information, and perform other malicious tasks. To help users discover whether their home routers have been taken over by skilled attackers, F-Secure has come up with a simple online tool called Router Checker that lets anyone secure their home network with just one click. More →

No Comments
Facebook Data vs. NSA Spying

EU: Don’t use Facebook if you’re worried about NSA snooping

By on March 25, 2015 at 9:00 PM.

EU: Don’t use Facebook if you’re worried about NSA snooping

The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the NSA and the GCHQ, have revealed that various U.S. tech companies might also be involved, whether willingly or unwillingly, in some NSA programs. The implications of the leaks detailing the Prism data collection program – that says the NSA has access to personal customer data from various U.S. companies including Apple, Facebook, Skype, Microsoft and Yahoo – might be far greater than initially believed, as they could affect the U.S.-EU Safe Harbor Framework for transatlantic data transfer and connected trade deals. More →

No Comments
Pwn2Own web browser

No one is safe: All 4 major web browsers hacked at Pwn2Own

By on March 23, 2015 at 8:55 AM.

No one is safe: All 4 major web browsers hacked at Pwn2Own

Given the myriad of security mechanisms and technologies tech companies have developed, it’s easy to fall into a sense of complacency and think that what you’re doing is safe from prying eyes.

Truth be told, if skilled attackers really want to see what you’re up to online, there’s not really much you can do to stop them.

Case in point: Last week at the annual Pwn2Own hacking competition, all 4 major browsers were exploited.Safari, Firefox, IE, Google Chrome — none of these browsers can provide safe refuge from hackers.

More →

No Comments
NSA Vs. Cisco

How Cisco customers avoid NSA tampering

By on March 20, 2015 at 9:00 PM.

How Cisco customers avoid NSA tampering

While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more straightforward and simpler spycraft methods when it comes to keeping an eye on enemies of the state.

More →

No Comments
Police StingRay Phone Spy Tool

Cops are investing in an expensive new spy tool that they’re forbidden from talking about in public

By on March 16, 2015 at 7:15 PM.

Cops are investing in an expensive new spy tool that they’re forbidden from talking about in public

A new spy tool that’s being referred to as StingRay or KingFish is a sophisticated cell phone spying and tracking tool that’s so secret that it requires law enforcement agencies to sign non-disclosure agreements before buying one. Equally disturbing is its price: The New York Times reports that one device costs $502,000, followed by $42,000 in yearly charges. All this money and police aren’t even allowed to explain to taxpayers why they need to spend so much on technology that can potentially infringe upon their privacy even when used for legitimate purposes. More →

No Comments
Siri Recording Voice Conversations

Busted: Apple’s license agreement confirms that Siri can share your information with third parties

By on March 13, 2015 at 2:14 PM.

Busted: Apple’s license agreement confirms that Siri can share your information with third parties

We all know that our data is only as safe as the devices we store it on, but we also like to think that the companies that build and sell those devices have a vested interest in our well-being. It’s a pipe dream, but one many of us hold on to, which is why the “revelation” that Apple is selling the voice data collected by Siri to third parties has angered the Internet. More →

No Comments
iPhone Hacking

CIA has been trying to hack the iPhone for nearly 10 years

By on March 10, 2015 at 2:51 PM.

CIA has been trying to hack the iPhone for nearly 10 years

A new report from The Intercept claims that both the CIA and British intelligence have, for years, been working hard to skirt around the “layers of encryption” that Apple has implemented on the iPhone.

The revelations, sourced from Edward Snowden, detail for the first time just how laser focused the CIA has been in not only cracking encryption on the iPhone, but on the Mac as well. More →

No Comments
Freak: Android and Mac Security

Beware of the ‘Freak’ inside every Android and Mac

By on March 4, 2015 at 6:50 AM.

Beware of the ‘Freak’ inside every Android and Mac

More and more security threats are discovered on a regular basis, and now it’s turn for a “Freak” vulnerability — that’s actually its name — for Android and Mac to come out of hiding. According to Re/code, both Google and Apple are aware of the situation, and have developed fixes to patch the Freak. More →

No Comments
Android Malware

Warning: How to avoid the scary new malware infecting thousands of phones

By on March 3, 2015 at 10:41 AM.

Warning: How to avoid the scary new malware infecting thousands of phones

The dangers of mobile malware are very real, and we’re now reminded yet again how quickly these malicious programs can spread thanks to a new outbreak. Dubbed “Gazon,” this new malware has been called “one of the single largest messaging-initiated mobile malware outbreaks” by the experts who discovered it.

Luckily, Gazon is fairly easy to avoid if you know what you’re looking for, and we’ll tell you everything you need to know to protect yourself right here in this post. More →

No Comments