Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
7 Clear-Cut Signs Tell You Hackers in Your Computer
Smart hackers isn't easy to be uncovered, who enter your device, steal everything they want, and leave without trace. However every walk has to leave footprint, even if it's very light, but not nothing. Ordinary people usually haven't strong idea to detect hackers. Computers, phones, mobiles, and down to the innocent webcam are all weak to cyber-criminals. So what if they've already broken in, here are 7 clear-cut signs that you've been hacked. Never miss them...
By Kim Komando  View Source  
Two Hackers Have Found How to Break into Hotel-Room Locks
When you read a story talking about security vulnerability that may risk millions of hotel rooms, never think it's just a story. Your and your family's privacy may leak from these rooms if only you have chance to stop hotels. A ridiculous case was as early as 2003, 15 years ago, an guy in a a hacking conference in Berlin found his laptop was stolen and there was no evidence of force entry. Yes, his room's keycard-operated lock got hacked. As a matter of fact, hacker are much stronger than that age, no hotel room is safe now...
By Gulliver  View Source  
Artificial Intelligence is Helping Bosses Spy You
You may not read every word of your employment contact before signing. At AI era, the file probably includes new articles related to your privacy. When you get the job, it means you consents to sort of surveillance by modern IT or AI technology. For example, Amazon has patented a wristband that tracks the hand movements of workers; Workday, a software firm, crunches around 60 factors to predict which employees will leave. Your boss can know you more than yourself...
By The Economist  View Source  
Apple Strong Principles Bend to Chinese Police State
Apple officially moves its Chinese iCloud operations. At this moment who will believe that Apple protects encryption keys from China? Starting Wednesday, iCloud customers in China will be transferred to China, housed in a center operated by a Chinese company. In fact some people start to delete private data from iCloud since a debate between Apple and FBI 2 years ago. In general, if anyone dislikes FBI, he or she is easy to go with enemies of FBI. Apple possibly will gain more customers who trust China rather than America...
By Marcio Jose Sanchez  View Source  
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Inside North Korea Hacker Army
South Korea is hosting winter Olympic Game, but the key player is North and its leader. Few people can understand why things go in such a way: North Korea get everything without paying a coin. Too many secrets hidden in the country, hacker army is one of them. A recent report uncovered that Pyongyang has sent hundreds of hackers to other countries to make money by any means necessary. South Korea is an ideal place of the mission. At Seoul's Gangnam district, Jong Hyok looks like...
By Sam Kim  View Source  
Maximize Encryption Effectiveness and 4 Common Pitfalls
Every coin has two sides, so does encryption. To minimize adverse effects you had better have some knowledge about encryption technology and products. There are tradeoffs in network performance and complexity that might arise when organizations aren't approaching encryption thoughtfully. Here are four pitfalls to avoid as you begin encrypting content: Proprietary Algorithms, Full Disk Encryption, Regulatory Compliance, and Decryption Key Storage...
By Joe Cosmano  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Spectre and Meltdown Explained: What They Are and How They Work
As you may have heard in the news, there are 3 significant flaws on all computer systems running modern hardware called Meltdown and Spectre, the latter actually means 2 flaws. If exploited, these flaws can expose sensitive information on your computer (e.g. passwords, encryption keys, company documents). The risks are in nearly every computer chip manufactured in the last 20 years. Is there a design to tolerate fundamental security flaws for higher performance? ...
By Josh Fruhlinger  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Hackers Spying on Sonos and Bose Smart Systems
Anything attached to internet, it will be potential object of hackers. The warnings about toys isn't passed completely, the home speakers are reported to have a number of security gaps that could give anyone access to the device from a remote location. Some famous brands, like Sonos and Bose, are in the warning list. As a matter of fact, the internet connected devices give the physical accessing of hackers, it opens a crack, small or big, to cause home security issues...
By CHEYENNE MACDONALD  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
Uber Pays $100,000 to Hacker for 57M Accounts Leak
Uber is facing a moment of truth. It needs to clean up its act. This company have our address and credit card information, and even details of travel history. It admitted a serious data leak was hidden: hackers breached and gained access to 57 million user accounts. What the Uber did is to pay $100,000 to hackers to delete the data. None argue it's deal with criminals. Does Uber really think customers' privacy is a small trade with hackers? They trusts hackers, but we have different opinion...
By Jake Novak  View Source  
North Korean Malware Still Lurks in Computers Worldwide
The US Department of Homeland Security issued an alert about a hacker group "Hidden Cobra" also known as "Lazarus" that run a victims' networks and may launch further network exploitation. This hacker group is believed related to North Korea. Last month, Britain had blamed the country for being behind the WannaCry cyber attack in May. The malware had infected lots of computers of 150 countries, and even some Britain's hospitals had to cancel scheduled operations. FBI doubts Volgmer "backdoor Trojan" is the next...
By WION Web Team  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
Guess Who Is Dating With You: A Game of Hackers
Researchers in Kaspersky are evaluating some popular dating apps. It's said that dating apps are new targets of some hacker organizations. Why? People in love are easy to cheat and are open to spend money. The recent reports are as estimation: multiple vulnerabilities are discovered and some of them leak important private data. Because data apps lack basic data protection investment, you may date with hackers who know you everything, such a terrible scenario! ...
By Kaspersky Lab  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source