It seems like every week there’s a major new vulnerability found in Android. What makes this even worse for users is that it will likely take them forever to get desperately needed patches thanks to Android’s fragmented and decentralized software upgrade system. All the same, there is something that you can do right now to improve the security of your Android phone’s data: You can enable encryption on your device. More →
While encryption and secured messaging has long been a topic of interest in tech circles, the issue became a mainstream and hot-button issue in 2013 following a series of Edward Snowden leaks detailing the NSA’s extensive efforts to bolster their electronic snooping capabilities.
In the back and forth battle over consumer privacy, one tends to think of government cryptographers looking to outwit engineers at companies like Google and Apple who help churn out some of the most widely used software across the globe.
But playing an instrumental role in this cat and mouse game is a man you might not ordinarily expect to see in such a discussion.
Inventive researchers at Tel Aviv University have come up with a new way of spying on computer users, one that can reportedly steal passwords wirelessly with help of a radio and… pita bread. More →
Looking forward to turning your Android phone into cash that can then be used for a new smartphone purchase? Before you go ahead with your plans of selling your current handset, you should first make sure you delete your personal data from the device. And make sure you do it properly, because simply restoring to factory settings won’t be enough to really protect your data. More →
Why are we so suspicious of law enforcement officials who are howling bloody murder about Apple and Google’s decision to encrypt smartphone traffic? Largely because they keep making totally boneheaded arguments. The latest such argument comes to us courtesy of Motherboard, which reports that Daniel Conley, the Suffolk County District Attorney in Massachusetts, has argued that widespread smartphone encryption will lead to an outbreak of perverts snapping “upskirt” photos of women who are riding public transportation. More →
If there’s one thing British writers do vastly better than we Americans, it’s using subtle but cutting wit to ridicule others’ complete stupidity. Now the United Kingdom’s own prime minister David Cameron has given them quite an opportunity to use their talents after he said he wanted to prevent mobile apps such as WhatsApp from using encryption that would potentially block intelligence agencies from being able to read everyone’s messages. Thankfully, our friends across the pond haven’t let us down — below we’ve found you the four funniest British responses to Cameron’s attack on encryption. More →
The NSA’s far-reaching powers have been further detailed in an extensive report from The Intercept, which reveals that the agency has conducted an advanced spying operation for years in an effort to spy on mobile operators working on phone encryption. The operation reportedly also targeted bodies that oversee telecom standards, in order to stay updated on new security protocols and identify or even insert vulnerabilities into those communication networks it wanted access to. More →
MIT researchers are working together with the Meteor Development Group on a Mylar project that would allow companies to offer customers fully encrypted Internet services, MIT Technology Review reports. Mylar would extend data security to servers, adding a new layer of encryption to complement the encrypted connection between a personal computer and server. Mylar would actually encrypt the user’s data on a server, requiring the related decryption password in order to access the data. As a result, the data would be safe from prying eyes and various Prism-like spying operations.
It seems like every other week another high-profile company’s servers are hacked. Last November, for example, Adobe suffered a security breach and as many as 150 million users’ may have been affected. Instead of crying about it, two security researchers are using these data dumps to try to thwart the next attackers, with a clever new method called Honey Encryption, reports MIT Technology Review. More →
It seems there’s a new app for iPhone users who feel like they’re being watched. Per Technology Review, the new Silent Circle iOS app encrypts every call, text or email sent from users’ iPhones and thus prevents them from being intercepted by third parties. The app is the brainchild of Phil Zimmermann, the Internet privacy pioneer who developed the Pretty Good Privacy (PGP) email encryption protocol all the way back in 1991. The app is still in its development stages and is being tested out for both iPhone and iPad, and Zimmermann hopes to have it ready to sell by the end of the year as a $20 monthly subscription service, Technology Review reports. More →
The U.S. Army has started a pilot program on June 6th to test the effectiveness of equipping troops with tablets and phones in combat, CNN recently reported. The idea is to provide troops with the ability to send text messages and geotagged images that alert others about their current surroundings. Similarly, the infantry could use the devices to file regular reports and easily view maps, CNN said. So far, the troops have been testing the iPhone and phones powered by Windows Phone and Android, and soldiers have particularly liked the iPhone and Android-powered devices. In addition to smartphones, the Army is also testing the iPad and tablets from Dell and HP. The results of the tests have been so positive that the Army could begin deploying a small amount of troops equipped with smartphones later this year. “Today, we don’t have the level of encryption that we would need to take [a smartphone] overseas and fully integrate it into our mission-command systems,” said Ed Mazzanti, an Army director working on the program. “There could be some limited deployments even this year, tied to tactical radios that supply the encryption that’s needed.” More →
A lawsuit has been filed against Apple, Pandora, and The Weather Channel in the U.S. District Court of Puerto Rico that alleges Apple “intentionally [intercepts] personally identifying information.” The plaintiff, Lymaris M. Rivera Diaz, is charging Apple with unfair trade practices, abuse and fraud, and he believes that Apple shares the iPhone’s unique ID, as well as personal location information, with third party developers such as The Weather Channel and Pandora. Apple’s vice president of software technology, Bud Tribble, testified before the Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Tuesday, and said “Apple does not track users’ locations,” and that the Cupertino-based company has no plans to do so. This is the second lawsuit filed against Apple in regards to the location tracking scandal; The first was filed in Tampa, Florida late last month. More →
Google and Apple testified before the Senate on Tuesday, where both firms were grilled on collecting location information from mobile phones. During the hearing, Senator Al Franken was particularly vocal on the issue. “My wireless companies, Apple and Google, and my apps, all get my location or something very close to it,” Senator Franken said. “We need to address this issue now, as mobile devices are only going to get more popular.” We covered Apple’s response on Tuesday, during which Apple’s vice president of software technology, Bud Tribble, said that “Apple does not track users’ locations,” and that the firm never plans to do so. However, Franken was also concerned that Apple and Google have done little to police third-party applications that are collecting and transmitting location data, and suggested that both companies require developers to alert users of their specific privacy policies. Trimble said Apple already does this, but it has never tossed an application for violating that rule. Google’s director of public policy, Alan Davidson, said Google would consider adding the option. According to The Wall Street Journal, Jessica Rich, the deputy director of the Federal Trade Commission’s consumer-protection bureau said that, despite both firms saying they don’t collect user data, “there’s a lot [the FTC] can do… to challenge,” those claims. More →