Chinese Government Bans Apple Products

Apple has a brand-new reason to hate the NSA

By on August 6, 2014 at 12:20 PM.

Apple has a brand-new reason to hate the NSA

Because of security concerns, the Chinese government has banned Apple tablets and laptops from the list of devices its departments can purchase for their employees with public money. According to Bloomberg, government officials familiar with the matter say that ten Apple products, from the iPad and iPad mini to the MacBook Air and MacBook Pro, were not included in a government  procurement list sent out in July. More →

No Comments
Russian Hackers Internet Login Heist

Russian hackers have stolen an astonishing 1.2 billion login credentials

By on August 6, 2014 at 11:55 AM.

Russian hackers have stolen an astonishing 1.2 billion login credentials

Less than a dozen young  Russian hackers have “audited the Internet,” as one security researcher told The New York Times, and have stolen a massive amount of usernames and password combinations that are used for login purposes on hundreds of thousands of websites. Instead of selling them on the black market, the hackers are apparently using them to sell spamming services to interested parties. More →

No Comments
In-Flight Wi-Fi Hack

Gulp: Researcher finds that you can hack airplanes through in-flight Wi-Fi

By on August 4, 2014 at 10:30 PM.

Gulp: Researcher finds that you can hack airplanes through in-flight Wi-Fi

Everyone loves in-flight Wi-Fi… until it allows a hacker to infiltrate the plane’s satellite communications equipment. CBCNews brings us word that security researcher Ruben Santamarta of IOActive is going to present new findings at the Black Hat conference in Las Vegas this week showing how to use a plane’s Wi-Fi and even its in-flight entertainment system to hack into its satellite equipment. More →

No Comments
Smartphone Hack

Hackers can seize control of your phone using software preinstalled by your carrier

By on August 1, 2014 at 9:20 AM.

Hackers can seize control of your phone using software preinstalled by your carrier

With fears over hacking and NSA spying still mounting, the last thing we needed was yet another report of a serious vulnerability that leaves millions of people at risk — but that’s exactly what we got recently when news broke of a huge security vulnerability that impacts millions upon millions of Android phones, BlackBerry handsets and even some iPhones. More →

No Comments
BadUSB USB Stick Hack

The scariest USB hack of all-time is almost completely undetectable

By on July 31, 2014 at 3:24 PM.

The scariest USB hack of all-time is almost completely undetectable

When you plug a USB stick into your laptop, you probably aren’t too worried about it completely taking over your computer. However, Ars Technica reports that researchers at Security Research Labs in Berlin are scheduled to unveil a new exploit at the Black Hat conference in Las Vegas next week that will allow an infected USB stick to take over your computer and use it to execute malicious code. More →

No Comments
Android Fake ID Security Flaw

‘Fake ID’ security flaw could be the greatest threat to Android phones yet

By on July 29, 2014 at 11:40 AM.

‘Fake ID’ security flaw could be the greatest threat to Android phones yet

One Android feature that never made its way to iOS may be the cause of one of the most worrying security exploits ever on the mobile platform. AppleInsider reports that Bluebox Security has found an Android design flaw that could potentially allow malware apps to take over someone’s device without requiring users to manually give the app permission to access their phones. More →

No Comments
Apple's iPhone and iOS Security and Privacy

Security researcher: iOS security has been intentionally compromised by Apple

By on July 21, 2014 at 12:33 PM.

Security researcher: iOS security has been intentionally compromised by Apple

Apple’s placing a lot of emphasis on iOS security (especially when compared with that “toxic hellstew” Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out called “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,” in which he reveals Apple’s complex tools inside iOS that would allow Apple to share certain user data at the request of law enforcement without the user knowledge.

More importantly, with or without Apple’s help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently use these vulnerabilities to grab plenty of data from an iPhone, or to install applications for spying and other malicious purposes without the user’s knowledge. More →

No Comments
Best Password Tips Microsoft

Now they tell us: Microsoft says strong passwords are overrated

By on July 16, 2014 at 6:45 PM.

Now they tell us: Microsoft says strong passwords are overrated

You know all the time and trouble you put into making and memorizing unique strong passwords for every website you visit? Well, Microsoft says a lot of that was likely misspent energy. The Guardian informs us that new research from Microsoft (PDF) shows that we probably shouldn’t use strong passwords for all our websites and that having weak passwords will suffice in many circumstances. More →

No Comments
GCHQ Names for Spying Tools

These are the absurd names British intelligence spies have to remember to spy on you

By on July 15, 2014 at 9:45 PM.

These are the absurd names British intelligence spies have to remember to spy on you

In case you didn’t know it by now, spy agencies are really good – and hopefully effective – at spying on people, including both actual valid targets as well as unsuspecting citizens who aren’t plotting anything bigger than a trip to an exotic country. To further demonstrate the power of one such agency – NSA’s close buddy, the British GCHQ, in this case – The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. More →

No Comments
Apple Disables Outdated Flash Player

Here’s how Apple is protecting you from outdated versions of Flash Player

By on July 11, 2014 at 7:30 PM.

Here’s how Apple is protecting you from outdated versions of Flash Player

As if Apple hadn’t made a strong enough case against Flash already, Adobe announced this week that a security vulnerability had been discovered in the most recent version of Flash Player. Adobe quickly addressed the issue, but Apple took safety measures a step further by adding any version of Adobe Flash Player version below 14.0.0.145 (and 13.0.0.231 on older machines) to its plugin blacklist. More →

No Comments
iPhone Location Tracking

China says iPhone’s location-tracking could compromise state secrets

By on July 11, 2014 at 5:50 PM.

China says iPhone’s location-tracking could compromise state secrets

We saw plenty of complaints arise when it was first discovered that Apple’s iOS 7 software included a “frequent locations” function in the iPhone. The feature, which can be easily disabled, tracks users’ locations in order to determine the locations they visit most frequently. All sorts of privacy concerns arose, naturally, but none were quite as intense as the warnings issued on Friday morning by state broadcasters in China. More →

No Comments
Adobe Flash Critical Security Update

Update Adobe Flash on your system right now

By on July 9, 2014 at 6:50 AM.

Update Adobe Flash on your system right now

Adobe on Tuesday issued a critical security update to patch a vulnerability that could help hackers “take control” of computers after users visit various sites, CNET reports. Security blogger Michele Spagnuolo, who detailed the security exploit, says the Flash issue can be used by hackers to steal cookies that authenticate users on “thousands of websites.” More →

No Comments