The one thing you’ve always been certain of is that a computer that’s not connected to a network, doesn’t munch data from any USB sticks, and doesn’t accept any kind of electronic connection requests is reasonably safe against hackers and crackers breaking into its electronic vaults.
Ark OS, the private cloud crowdfunding project that aims to enable you to provide all your cloud services right in the comfort — and security — of your home, has beaten its funding goal of $45,000.
It’s Thanksgiving weekend and one of the things we’re undoubtedly thankful for is the ability to go on a massive spending spree immediately after turkey day. Just a little tip — when you’re busy buying, the bad guys are busy stealing.
“I have to be very careful about everything I say to my friends as I conduct business activities over the same accounts,” said one employee. “My friends don’t understand why I am reluctant to use [Facebook] to talk.”
You’d think of any organization, the U.S. government would want to make sure its systems were secure. Guess it’s not doing that so well.
Don’t forget to take your daily recommended dose of skepticism! Sure to ward off a bad case of the press-release blues.
Intel is becoming a new kind of company, but it isn’t going to toss out its old business.
Your face is now on its way to becoming part of Facebook’s business in one form or another. Unless Franken has something to say about it, of course.
LG spied on us, got caught red-handed, and is now promising to fix the issue. Suuuuure.
Editor’s Pick At companies that run on Google Apps, the Google+ identity machine creates an invasive view of everything you do, including personal email and search conducted from work devices.
Since they’re digitally literate from the start, many younger workers are required or encouraged to use personal Facebook and Twitter accounts to post company-approved messages.
Is this facet of modern life something we are getting used to — something that doesn’t bother us any more than using a fob to enter a building?
Yahoo wants to keep the NSA out, just like Google.
This message will self-destruct in 5 seconds.
Starting today, these self-described Hungarian security freaks are offering a $25,000 prize to anyone who can hack their startup.
Guest Post Developers need to start paying more attention to security, earlier in the process.
Apple released an internal report of government information requests today, saying that countries around the world have asked Apple for private user data on about 2,219 accounts and precisely 36,464 devices between January 1, 2013, and June 30.
Editor’s Pick There are over four billion street lights in the world. Almost all of them are high-intensity discharge lights that use mercury vapor or some other toxic substance to create light. All of them are powered, and most burn out every two years.
Now what if all these could become nodes on a sensor network spanning the entire globe?
The German leader called President Obama demanding clarification and said that if such practices were being employed, it “would be a serious breach of trust” and “completely unacceptable”.
Updated 12:22 PST with new information on Apple’s TouchID
For Google and Facebook, the race is on to figure out exactly how we use our mobile devices.
Leaders from the World Wide Web Consortium (W3C), ICANN, the Internet Architecture Board, and other organizations made it clear that the U.S.’s policies and practices in surveillance are harmful to an open web.
Guest Post Despite Google’s claim that it is merely looking out for the wellbeing of its users by hiding keyword data, Google doesn’t hide the data if you pay for it. That is, if marketers place paid ads in Google Adwords for their keywords, Google will pass along visitor keyword data.
“It almost looks like it was designed to go in there,” Hilsenteger says.
The U.S. Department of Justice filed a motion in the Foreign Intelligence Surveillance Court today opposing tech companies’ bid to disclose to their users that the government is spying on their data.
Editor’s Pick These simple, obvious mistakes are ones we make over and over again. Let’s make a deal and just stop, m’kay?
60 percent of Android smartphones returned to the store aren’t actually broken. And if InnoPath’s new Mobie app gets widespread adoption, they may not actually get returned in the first place.
Two out of five software engineers working on big data solutions say that government agencies are tracking the data they’re collecting.
The bad guys of the Internet target high-volume searches — like those for celebrity names. So if you want to avoid malware, avoid searching for these 10 celebs.
File storage company Hightail acquired security company adeptCloud today, continuing its quest to compete with major names in the cloud file-sharing industry.
One Russian senator is on a crusade to take Twitter to task for violating laws on privacy — from the EU’s Articles of Convention on Human Rights to Russia’s own Personal Data Law.
In 2011, Chrysler tweeted that “no one in Detroit knows how to f*cking drive.” The same year, New York congressman Anthony Weiner accidentally tweeted a picture of his crotch to all of his followers. And last year, KitchenAid insulted Barack Obama and, incredibly, mocked the death of the president’s grandmother.
Coding platform Github is giving its users a little more security today through two-factor authentication.
In some ways simple conversations have been the last refuge of our analog past. No longer.
The NY Times could have protected itself by having what is called a “registry lock” in place, which prevents domain transfers or changes to the DNS details. In fact, having that lock in place is likely the only thing that prevented Twitter.com from suffering the same fate as the NY Times.
“Sync skips the cloud to deliver files faster and safer,” BitTorrent says.
You might think that the NSA and other shadowy three-letter agencies are the world’s biggest cloud cheerleaders: all your data, all the time, in the cloud where Prism and XKeyscore can, apparently, access it.
“Germany is a country of freedom.”
“We’re a human-run agency operating in a complex environment with a number of different regulatory regimes, so at times we find ourselves on the wrong side of the line,” said an anonymous NSA official.