Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
2018 Data Breach Investigations Report
In reality, nearly 81% of data breaches are facilitated by weak, reused or stolen passwords. When we talk about data secure, the key point should be how to make a strong password and how to keep it safe. This report uncover some new investigation 2018. If you once doubted the importance of password, the key role of data secure. The report may be deserved to have a look. If you leave a password on a sticky note, it gives attackers the chance to take keys and it’s an entirely avoidable risk with devastating cost.
By Verizon Enterprise  View Source  
Did You Update Twitter Password That May Be Leaked
Twitter masks passwords through a process called hashing using a function known as bcrypt, which replaces the actual password with a random set of numbers and letters that are stored in Twitter’s system. Due to a bug, passwords were written to an internal log before completing the hashing process. Twitter itself found this error, removed the passwords & are implementing plans to prevent this bug from happening again. In the meantime, Twitter is asking 300+ Million users to change their passwords. Did you do it?
By Chaim Gartenberg  View Source  
Malware Brick Wi-Fi Routers To Hit 500K Devices
The FBI recommends that everyone with a small office and home office router or NAS device reboot them immediately.Wi-Fi Routers are new object of hackers, but the victim isn't limited to router. More than 5ook devices are infected by a router-bricking malware. Reboot devices will temporarily eliminate the second stage malware and lead the first stage malware to call out for instructions. Labs of FBI and the Justice Department disclose more details regrading to the malware...
By Michael Kan  View Source  
Lastpass - The Best Way to Manage Online Passwords
As a leading password manager, its first priority is safeguarding your data. It relies on strong encryption algorithms, AES-256 bit encryption with PBKDF2 SHA-256, to ensure complete security in the cloud. You create an account with an email address and a strong master password to locally-generate a unique encryption key. Your data is encrypted and decrypted at the device level. In other words your master password and the keys are never sent to LastPass’ servers. It also offers Two-factor authentication ...
By Anne Yang  View Source  
Step by Step for TWO-FACTOR AUTHENTICATION
Traditional, but not so secure way to login to your bank accounts: enter your username and familiar password for most of your online accounts. Not so fast! If you're one of the folks, who use five or fewer passwords online, you are in hacker's dish because they easily take down multiple accounts just by cracking one password. There's a new and handy way to better protect you data with multi-factor authentication (MFA). You can view step-by-step instructions for enabling it for all your accounts...
By Kim Trump  View Source  
7 Clear-Cut Signs Tell You Hackers in Your Computer
Smart hackers isn't easy to be uncovered, who enter your device, steal everything they want, and leave without trace. However every walk has to leave footprint, even if it's very light, but not nothing. Ordinary people usually haven't strong idea to detect hackers. Computers, phones, mobiles, and down to the innocent webcam are all weak to cyber-criminals. So what if they've already broken in, here are 7 clear-cut signs that you've been hacked. Never miss them...
By Kim Komando  View Source  
Two Hackers Have Found How to Break into Hotel-Room Locks
When you read a story talking about security vulnerability that may risk millions of hotel rooms, never think it's just a story. Your and your family's privacy may leak from these rooms if only you have chance to stop hotels. A ridiculous case was as early as 2003, 15 years ago, an guy in a a hacking conference in Berlin found his laptop was stolen and there was no evidence of force entry. Yes, his room's keycard-operated lock got hacked. As a matter of fact, hacker are much stronger than that age, no hotel room is safe now...
By Gulliver  View Source  
Artificial Intelligence is Helping Bosses Spy You
You may not read every word of your employment contact before signing. At AI era, the file probably includes new articles related to your privacy. When you get the job, it means you consents to sort of surveillance by modern IT or AI technology. For example, Amazon has patented a wristband that tracks the hand movements of workers; Workday, a software firm, crunches around 60 factors to predict which employees will leave. Your boss can know you more than yourself...
By The Economist  View Source  
Apple Strong Principles Bend to Chinese Police State
Apple officially moves its Chinese iCloud operations. At this moment who will believe that Apple protects encryption keys from China? Starting Wednesday, iCloud customers in China will be transferred to China, housed in a center operated by a Chinese company. In fact some people start to delete private data from iCloud since a debate between Apple and FBI 2 years ago. In general, if anyone dislikes FBI, he or she is easy to go with enemies of FBI. Apple possibly will gain more customers who trust China rather than America...
By Marcio Jose Sanchez  View Source  
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Inside North Korea Hacker Army
South Korea is hosting winter Olympic Game, but the key player is North and its leader. Few people can understand why things go in such a way: North Korea get everything without paying a coin. Too many secrets hidden in the country, hacker army is one of them. A recent report uncovered that Pyongyang has sent hundreds of hackers to other countries to make money by any means necessary. South Korea is an ideal place of the mission. At Seoul's Gangnam district, Jong Hyok looks like...
By Sam Kim  View Source  
Maximize Encryption Effectiveness and 4 Common Pitfalls
Every coin has two sides, so does encryption. To minimize adverse effects you had better have some knowledge about encryption technology and products. There are tradeoffs in network performance and complexity that might arise when organizations aren't approaching encryption thoughtfully. Here are four pitfalls to avoid as you begin encrypting content: Proprietary Algorithms, Full Disk Encryption, Regulatory Compliance, and Decryption Key Storage...
By Joe Cosmano  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Spectre and Meltdown Explained: What They Are and How They Work
As you may have heard in the news, there are 3 significant flaws on all computer systems running modern hardware called Meltdown and Spectre, the latter actually means 2 flaws. If exploited, these flaws can expose sensitive information on your computer (e.g. passwords, encryption keys, company documents). The risks are in nearly every computer chip manufactured in the last 20 years. Is there a design to tolerate fundamental security flaws for higher performance? ...
By Josh Fruhlinger  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Hackers Spying on Sonos and Bose Smart Systems
Anything attached to internet, it will be potential object of hackers. The warnings about toys isn't passed completely, the home speakers are reported to have a number of security gaps that could give anyone access to the device from a remote location. Some famous brands, like Sonos and Bose, are in the warning list. As a matter of fact, the internet connected devices give the physical accessing of hackers, it opens a crack, small or big, to cause home security issues...
By CHEYENNE MACDONALD  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source