Mass Surveillance vs. Human Rights

In a new report, Europe says mass surveillance threatens human rights

By on January 27, 2015 at 10:15 PM.

In a new report, Europe says mass surveillance threatens human rights

The parliamentary assembly of the Council of Europe said in a lengthy report that mass surveillance practices, as thoroughly detailed in many reports following the extensive Edward Snowden leaks, are a fundamental threat to human rights. More →

No Comments
Police Radars

Crazy new tech lets police officers peer through the walls of your home undetected

By on January 21, 2015 at 2:18 PM.

Crazy new tech lets police officers peer through the walls of your home undetected

There has been plenty of negative press surrounding law enforcement in the United States over the last year, but it doesn’t look like 2015 is going to be any less controversial.

USA Today reports that at least 50 law enforcement agencies have secretly purchased advanced radars for their officers which could potentially allow them to see through the walls of our homes without first obtaining a search warrant. More →

No Comments
iPhone Spyware

Edward Snowden says secret Apple spyware is the reason he won’t use an iPhone

Edward Snowden says secret Apple spyware is the reason he won’t use an iPhone

By on January 20, 2015 at 10:46 AM.

Is Apple’s wildly popular iPhone series hiding spyware that can collect information about users without their knowledge. As thoroughly as developers have dug through Apple’s iOS code over the past seven and a half years, one would think functionality like that would have been unearthed by now. According to NSA whistleblower Edward Snowden, however, iPhones are capable of activating “special software” behind the scenes that collects information about users, who are completely oblivious to the fact that their phones are gathering this sensitive data. More →

No Comments
Worst Passwords 2014

These are the 25 best passwords you can use… if you want to be hacked

By on January 20, 2015 at 8:50 AM.

These are the 25 best passwords you can use… if you want to be hacked

Malicious hackers spend much of their time developing sophisticated attacks and complex new ways to steal people’s credit card numbers, bank account information and other private data. It’s getting more and more difficult to protect ourselves from these hacks, especially when just about anyone can go online and hire a hacker these days.

But for many people, all of the hard work these hackers put into ruining our lives is a waste of time, because they make things remarkably easy for hackers by using the worst passwords on the planet. More →

No Comments
Lizard Squad Customer Database Hacked

Universally hated hacker group suffers a humiliating hack of its own

By on January 19, 2015 at 9:00 AM.

Universally hated hacker group suffers a humiliating hack of its own

While groups such as Anonymous are very controversial, they aren’t universally despised and have a huge number of fans. The same can’t be said of the Lizard Squad hacker group, however, which took down both the PlayStation Network and Xbox Live late last year, and then subsequently created a tool that would let anyone in the world deliver a devastating DDoS attack to any website they wanted for $6 a pop. More →

No Comments
Gmail Security Settings

How to protect your data by making Gmail as secure as possible

By on January 16, 2015 at 1:50 PM.

How to protect your data by making Gmail as secure as possible

Millions upon millions of people around the world rely on Gmail for their email needs, and Google’s free service is indeed one of the most feature-rich out there. For obvious reasons, Google encourages users to keep anything and everything they receive in Gmail using its archive system; the more emails you save for Google to refer to and analyze, the better the company’s advertising profile will be for you.

With all of that data from years worth of emails sitting in your Gmail account, it stands to reason that you’d want to ensure that all of those emails are as secure as possible. But what’s the best way to make sure all of those messages are safe and sound? More →

No Comments
How To Hire A Hacker

How to hire a hacker

How to hire a hacker

By on January 16, 2015 at 10:29 AM.

Most Internet users are scared of hackers, and rightfully so. While the terms is sometimes used to describe any computer programmer, it typically has a negative connotation and is used to describe nefarious coders who make digital chaos their mission on the web.

Sometimes, hackers target large companies and steal customers’ credit card data. That data is then sold on the black market, potentially causing huge headaches for victims. And sometimes, hackers target companies or individuals just for fun — they cause as much chaos as possible just because they can.

There is no end in sight for the battle between security researchers and hackers, and now things have gotten even scarier thanks to a new service that makes it shockingly easy for anyone to hire a hacker. More →

No Comments
John McAfee Fox News Hack

Watch John McAfee hack a Fox News host’s phone live on air

By on January 14, 2015 at 1:55 PM.

Watch John McAfee hack a Fox News host’s phone live on air

Despite countless reports, investigations and press conferences over the past several weeks, there is still a shroud of mystery surrounding the Sony Pictures hack. We might never know all of the details, but one well-known, eccentric programmer thinks he knows exactly how the hack was initiated — and it’s much simpler than you might have imagined. More →

No Comments
Android 4.3 WebView Security Issues

Google won’t fix a security issue that affects 1 billion Android devices

By on January 14, 2015 at 7:45 AM.

Google won’t fix a security issue that affects 1 billion Android devices

Whenever asked about security and malware in Android, Google always explains how it keeps updating the security of its mobile operating system to make sure users are safe, while simultaneously minimizing the risks. Even so, millions of Android users are affected by malware, and security researchers have just discovered a serious issue that might affect as many as 1 billion devices — and Google isn’t willing to fix it. Or at least, not by itself. More →

No Comments
Featured
How To Set Up A VPN

How to set up a VPN – and why you should, if you care about privacy

How to set up a VPN – and why you should, if you care about privacy

By on January 13, 2015 at 8:00 PM.

If we learned anything in 2014, it’s the simple but painful truth that here in the digital age, we are not safe. Nefarious hackers are lurking around every virtual corner of the Internet, constantly developing new ways to attack us and steal our private data. Many times, these hackers target the large companies that store our data and as troubling as it is, there is simply nothing we can do to safeguard information that is held by third parties. Instead, we must rely on these companies to take the necessary measures to protect our data.

When it comes to our own data and our personal browsing habits, there are measures we all can and should take to protect ourselves. More →

No Comments
David Cameron Encryption Ban

The 4 funniest British responses to David Cameron’s boneheaded attack on encryption

By on January 13, 2015 at 2:10 PM.

The 4 funniest British responses to David Cameron’s boneheaded attack on encryption

If there’s one thing British writers do vastly better than we Americans, it’s using subtle but cutting wit to ridicule others’ complete stupidity. Now the United Kingdom’s own prime minister David Cameron has given them quite an opportunity to use their talents after he said he wanted to prevent mobile apps such as WhatsApp from using encryption that would potentially block intelligence agencies from being able to read everyone’s messages. Thankfully, our friends across the pond haven’t let us down — below we’ve found you the four funniest British responses to Cameron’s attack on encryption. More →

No Comments
New iCloud Hacking Tool

Hackers claim they’ve found a frighteningly easy way to hack your iCloud account

By on January 2, 2015 at 10:40 AM.

Hackers claim they’ve found a frighteningly easy way to hack your iCloud account

One of the most infamous Internet events of 2014 might be doomed to repeat itself. Business Insider reports that a hacker known as Pr0x13 has released a tool called iDict on GitHub that is capable of bypassing restrictions and authentication on any iCloud account, potentially giving hackers unfettered access to iOS devices. More →

No Comments