Data Security: Hot Stories

Search Result for Privacy in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Privacy in All Fields - Top 20 Stories
Artificial Intelligence is Helping Bosses Spy You
You may not read every word of your employment contact before signing. At AI era, the file probably includes new articles related to your privacy. When you get the job, it means you consents to sort of surveillance by modern IT or AI technology. For example, Amazon has patented a wristband that tracks the hand movements of workers; Workday, a software firm, crunches around 60 factors to predict which employees will leave. Your boss can know you more than yourself...
By The Economist  View Source  
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Uber Pays $100,000 to Hacker for 57M Accounts Leak
Uber is facing a moment of truth. It needs to clean up its act. This company have our address and credit card information, and even details of travel history. It admitted a serious data leak was hidden: hackers breached and gained access to 57 million user accounts. What the Uber did is to pay $100,000 to hackers to delete the data. None argue it's deal with criminals. Does Uber really think customers' privacy is a small trade with hackers? They trusts hackers, but we have different opinion...
By Jake Novak  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
Computer Anti-Virus Scam Cost 2 Durham Region Guys More Than $32k
You buy anti-virus software to protect privacy, but the result is your losing lots of money. Police are warning about a computer scam after two Durham Region residents lost more than $32,000. The scammer called victims to sell them software protection. After a few months the deal done, they called back saying there was an issue with the software, and that the purchase price will be returned to the victim’s bank account...
By National Post  View Source  
Yahoo: All 3 Billion Accounts Breached in 2013
The secret is finally uncovered by Yahoo itself: its entire user base of 3 billion accounts was compromised by an August 2013 data breach. Back to that year and that moment, Yahoo said another tone: 1 billions accounts may be impacted. Although it's a large number, as a user of Yahoo, you and me, possibly think we aren't in the victim group. Now the truth isn't just triple the initial report, but the entire user base were compromised! So who do we trust to protect our privacy? The IT giant, or ourselves?
By Jeremy Kirk  View Source  
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
China Government Use its Own Encryption in Windows 10
MS announced a news that hardly impacts global OS market but may change some people's fates in future. It will allow China's government to use own encryption in Window 10. This is a horrible start. Right now there is no detail to disclose, for example, how China replaces the original encryption with own version and if the rule will apply to all computers sold in China. The deal may solve some security concerns of China government, but is raising privacy threat on other side. Where to buy computer possibly will become a new question...
By Brad Sams  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Emma Watson Photo Hacked and Sold Online
Emma Watson's computer has been hacked and she may be the new victim of privacy leak. Some rumours about these photographs have spread online. Her team has confirmed the hack, but no nude photographs of Ms Watson were leaked. One or two websites are selling the photos in encrypted way, not for Watson's privacy but for their money...
By Helena Horton  View Source  
Sex Videos Are Safe Under Rumuki
Sex tapes are a high risk object of privacy. As long as produced, they are never totally secure. We heard lots of bad or sad stories. Zealand startup Rumuki aims the market: keep sex videos security for young lovers. The device is a prenup for sex videos with encryption, and only unlocks and shows with mutual consent. In first week of its launching, more than 1,000 devices are register...
By M. J. Coren  View Source  
Smart TV Maker Spying on Its 11 Million Users
Your privacy is money of others. Your computer, or your phone is monitoring you. Surprise? maybe not. How about your TV? Your smart TV is spying you too. As one of the world's biggest smart TV makers, Vizio has been caught secretly collecting data over 11 Million TVs and then selling customers' privacy without the user's explicit consent. The case has been fined heavily and finally exposed the scandal...
By Swati Khandelwalr  View Source  
The Strange Origins of TrueCrypt, ISIS Favored Encryption Tool
Before companies like Apple and Microsoft built encryption into their products, before Apple took on the U.S. government (briefly) over the unlocking of a San Bernardino shooter’s iPhone, TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and...
By EVAN RATLIFF  View Source  
4 simple ways to improve Internet security
Some people make dieting resolutions in the New Year. I make security and privacy resolutions, because those are the things that keep me up at night. After all, as a journalist, it’s important for me to give my sources assurances that I will keep their communications confidential. And in today’s world, that is an ever-more-difficult task. ...
By JULIA ANGWIN, PROPUBLICA  View Source  
Cupid Media breaks heart of Privacy Commissioner after users hacked
An online dating company has been slammed by Australia's privacy commissioner after it breached privacy laws, with hackers accessing the personal information of about 254,000 Australians. Australian Privacy Commissioner Timothy Pilgrim announced today Cupid Media breached the Privacy Act by failing to take reasonable steps to secure data held on...
By David Swan  View Source