Data Security: Hot Stories

Search Result for Online in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Online in All Fields - Top 20 Stories
Lastpass - The Best Way to Manage Online Passwords
As a leading password manager, its first priority is safeguarding your data. It relies on strong encryption algorithms, AES-256 bit encryption with PBKDF2 SHA-256, to ensure complete security in the cloud. You create an account with an email address and a strong master password to locally-generate a unique encryption key. Your data is encrypted and decrypted at the device level. In other words your master password and the keys are never sent to LastPass’ servers. It also offers Two-factor authentication ...
By Anne Yang  View Source  
Step by Step for TWO-FACTOR AUTHENTICATION
Traditional, but not so secure way to login to your bank accounts: enter your username and familiar password for most of your online accounts. Not so fast! If you're one of the folks, who use five or fewer passwords online, you are in hacker's dish because they easily take down multiple accounts just by cracking one password. There's a new and handy way to better protect you data with multi-factor authentication (MFA). You can view step-by-step instructions for enabling it for all your accounts...
By Kim Trump  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Spectre and Meltdown Explained: What They Are and How They Work
As you may have heard in the news, there are 3 significant flaws on all computer systems running modern hardware called Meltdown and Spectre, the latter actually means 2 flaws. If exploited, these flaws can expose sensitive information on your computer (e.g. passwords, encryption keys, company documents). The risks are in nearly every computer chip manufactured in the last 20 years. Is there a design to tolerate fundamental security flaws for higher performance? ...
By Josh Fruhlinger  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
New Android Trojan Red Alert 2.0 Is Coming
Do you like to download banks's apps and used to do financial transactions online. It's special time to be cautious. A new Android Trojan “Red Alert 2.0” has been discovered, which has targeted banks, and similar high value related apps. This kind of malware, trojan and bank data targeted, was found before. However, this one is cutting edge on either functions or disguise. It's more dangerous and more difficult to uncover. Keep an eye on your Android and account...
By Josh Mayfield  View Source  
The 10 Windows Group Policy Risk Your Data Security
Microsoft Windows computers are believed to have higher security risk than Unix computers. For common users the real threat isn't that the OS is not so strong as others, but settings is too complicated to get them right, for example, Windows 8.1 has more than 3,700 settings. Group Policy is supposed as a security tool to manage office users, however it possibly causes security issue due to misuse it...
By Roger A. Grimes  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Emma Watson Photo Hacked and Sold Online
Emma Watson's computer has been hacked and she may be the new victim of privacy leak. Some rumours about these photographs have spread online. Her team has confirmed the hack, but no nude photographs of Ms Watson were leaked. One or two websites are selling the photos in encrypted way, not for Watson's privacy but for their money...
By Helena Horton  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Don't Do Cyber Crime If Can't Do Jail Time
You may heard the old adage "Don't do the crime if you can't do the time". It's the same to young cyber criminals. A 17-year-old was sentenced to 12 months rehabilitation after hacking British telecom; another 17-year-old was sentenced to four years in Massachusetts for leading a group of villainous hackers. Hacker sometimes means go to jail.
By Steve Morgan  View Source  View Cache  
Hackers Guilty of Mining Millions from EA Game
The virtual money and online marketplace are targets of hackers too. A young guy from CA was found guilty not because he stole money from a US bank, but mined $16 million FIFA coins from a soccer game of EA. This isn't a first hack case related to virtual money, and higher value cases would come very soon in cyber security circumstances...
By Sean Buckley  View Source  
Cameras IoT Brings New Hacker Risk
IoT, Internet of Things, is officially part of modern Internet. Cameras, DVRs, and things attached on Internet are objects of hackers too. The recent massive Internet Outage are suggested to be a DDOS attack from millions of CCTV video cameras, these online cameras are really independent computers so they can be as source to such attack as long as their password leaded...
By Brian Krebs  View Source  
Private Info Leaked In World Anti Doping Agency Hack
Serena and Venus Williams, or Simone Biles, can you connect these superstars with hackers? The ‘Fancy Bear’ hackers said that some private data are stolen from WADA and published online. It's a bad news for involved celebrities....
By Thomas Fox-Brewster  View Source  
Chinese Tycoons Party Officials Data Leaked on Twitter
Personal information on dozens of Chinese Communist Party officials and captains of industry from Jack Ma to Wang Jianlin may have been exposed on Twitter in one of the country’s biggest online leaks of sensitive information. Posts on Twitter from an account under the name “shenfenzheng” -- which has since been frozen -- claimed to show...
By Bloomberg News  View Source  
Stanford launches new online courses in computer security
Staying ahead in the cyber security game is critical to defending against new threats. To protect against cybercrime, corporations, business and government must continuously update their security measures and keep employees properly trained. Since 2005, Stanford has provided professionals around the world with the opportunity to learn the latest...
By PRNewswire  View Source  
4 easy ways to keep your Netflix account safe from hackers
A report on Thursday from the security software company Symantec revealed that hackers are selling stolen Netflix accounts online for as little as $0.25 each. Some of these accounts are created with stolen credit card information. But others are regular Netflix accounts that cybercriminals have surreptitiously gained access to. Tech Insider...
By Tim Stenovec  View Source  
Potential data leak on millions of California voters
State election officials are looking into claims that data on millions of California voters were publicly posted online. California Secretary of State Alex Padilla said Tuesday that his office was working to verify media reports, first circulated Monday, that the information of as many as 191 million voters nationwide had been posted online “in...
By Christine Mai-Duc  View Source