Gmail Encryption For All Messages

Google will now encrypt every single message you send through Gmail

By on March 20, 2014 at 1:54 PM.

Google will now encrypt every single message you send through Gmail

Google is starting to get serious about making sure your Gmail messages are secure. The company announced on Thursday that it is making all Gmail messages go through an encrypted HTTPS connection that will prevent anyone else from reading them but their intended recipient. Google has made HTTPS its default setting for users since 2010 but it’s apparently decided to make it the only option in the wake of the massive NSA spying scandal revealed by leaker Edward Snowden last year. More →

No Comments
EA Games Hack Apple IDs

Hackers turn EA server into phishing site for Apple IDs

By on March 19, 2014 at 2:15 PM.

Hackers turn EA server into phishing site for Apple IDs

Some ingenious hackers decided to put an Apple ID phishing site where users would expect to find it least: on a trusted website such as EA.com, Internet security firm Netcraft has discovered. As a result of the breach, unsuspecting EA customers were redirected to the fake Apple site – which looks just like the real thing, by the way – and lured into giving away their Apple ID credentials.  More →

No Comments
NSA's MYSTIC Phone Calls Spying Program

NSA can record a nation’s ‘every single’ phone call and keep them for a month

By on March 18, 2014 at 7:00 PM.

NSA can record a nation’s ‘every single’ phone call and keep them for a month

The National Security Agency is able to collect a nation’s “every single” phone call and store the voice recordings for a month, according to a new Edward Snowden leak that reveals further details on the NSA’s bulk data collection practices for intelligence operations. The Washington Post has learned that the NSA’s MYSTIC voice interception program began in 2009, with the agency developing a RETRO tool that can access any voice calls from the targeted nation for a period of 30 days. More →

No Comments
WhatsApp Facebook Merger Data Privacy

WhatsApp cofounder: Facebook won’t turn us into Soviet-style spy tool

By on March 18, 2014 at 12:30 AM.

WhatsApp cofounder: Facebook won’t turn us into Soviet-style spy tool

We’re starting to get the feeling that WhatsApp really is getting some serious blowback from its user base after getting acquired by Facebook because its cofounder has come out with a lengthy statement once again reiterating that nothing will change in terms of user privacy once it’s under Facebook’s control. More →

No Comments
iOS 7 Security Features

Huge iOS 7 security flaw exposed

By on March 17, 2014 at 11:46 AM.

Huge iOS 7 security flaw exposed

Azimuth Security researcher Tarjei Mandt revealed at the CanSecWest conference last week that hackers can easily exploit a purported iOS 7 security flaw that’s derived from Apple’s intention of actually patching a potential security issue in iOS 6 concerning kernel encryption. “Kernel is the most basic level of an operating system that controls things like security, file management, and resource allocation,” CNET writes, with Mandt saying that “in terms of security, [iOS 7 is] much worse than iOS 6.” More →

No Comments
When Windows XP Support Ends 1.5 Million ATMs

1.5 million ATMs will still run Windows XP when support ends in April

By on March 14, 2014 at 10:00 PM.

1.5 million ATMs will still run Windows XP when support ends in April

Well this should be fun. Reuters reports that ATM maker NCR claims that two-thirds of all the ATMs running Windows XP in the world — or just under 1.5 million ATMs total — will not be upgraded to a newer system by the time Microsoft ends support for XP in April. More →

No Comments
NSA Malware Denial

NSA denies report that it has infected millions of computers with malware

By on March 14, 2014 at 4:00 PM.

NSA denies report that it has infected millions of computers with malware

News broke earlier this week alleging that the National Security Agency “has infected millions of computers around the world with malware.” The report cited newly available documents leaked by Edward Snowden that had previously been classified, and it also claimed the NSA “is impersonating US social media or other websites” to spy on people. The NSA has since issued a statement refuting the report, however, claiming that the allegations within are unfounded and untrue. More →

No Comments
Samsung Galaxy Backdoor Security Issue

Some Samsung Galaxy phones come with bonus backdoor feature

By on March 13, 2014 at 2:15 PM.

Some Samsung Galaxy phones come with bonus backdoor feature

A new security issue that may affect the privacy of Android device owners who purchased certain Samsung Galaxy models has been found, and apparently patched, by Replicant developers who are working on their own Android OS custom ROM. The modem chip which runs proprietary Samsung code has a backdoor in it that would allow third parties to perform several tasks on the handset, without the consent of unsuspecting users. More →

No Comments
Target Data Hack How It Happened

It turns out Target could have easily prevented its massive security breach

By on March 13, 2014 at 2:00 PM.

It turns out Target could have easily prevented its massive security breach

The massive breach that occurred around Thanksgiving last year could have been prevented by Target’s existing security personnel and advanced security software, an extensive investigative report from Bloomberg Businessweek reveals. But instead, Target did nothing, allowing hackers to steal over 40 million credit cards, as well as personal data for over 70 million customers. More →

No Comments
NSA Hacking Expansion Snowden

NSA’s plan to inject malware into ‘millions’ of computers revealed

By on March 12, 2014 at 8:30 PM.

NSA’s plan to inject malware into ‘millions’ of computers revealed

Even if you make use of Snowden’s tips for remaining anonymous online, there might not be much you can do to escape the NSA’s latest expansion. Ryan Gallagher and Glenn Greenwald of The Intercept report that classified files reveal “new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware ‘implants.’” More →

No Comments
How To Stay Anonymous Online

3 tips for keeping everything you do online a secret

By on March 11, 2014 at 11:35 AM.

3 tips for keeping everything you do online a secret

For the past several months, infamous NSA leaker Edward Snowden has confounded the United States government’s attempts to track him online and stop him from releasing further damaging damaging information about its intelligence gathering activities. How has he been able to do this ? The Wall Street Journal reports that Snowden this week gave three simple tips to help make sure that no one can track your online activity: Encrypt your entire hard drive, use Tor to keep yourself completely anonymous online, and enable browser extensions that block third parties’ ability to track you. More →

No Comments
Android Malware Google Play

Why Android users shouldn’t worry (too much) about malware

By on March 5, 2014 at 6:45 PM.

Why Android users shouldn’t worry (too much) about malware

So we know that malware developers absolutely love targeting Android since it’s not only the most widely used mobile operating system in the world but it’s also the least tightly controlled of all the other major mobile platforms. The Next Web points us to the latest study from F-Secure showing that, unsurprisingly, 97% of mobile malware found last year targeted Android phones. However, there’s some potentially good news here for Android users: As long as they’re smart, the chances of them ever encountering such malware are pretty slim. More →

No Comments