Cybersecurity Protections for SMBs Found to Be Lacking

Cybersecurity Protections for SMBs Found to Be Lacking

The ransom demand is also likely to be considerably higher than the cost of cybersecurity protections for SMBs to prevent ransomware attacks.

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of passwords used in Chrome are unsafe and have been released in data breaches, according to new information from Google. In February, a new feature was introduced to the Google Chrome browser which checks whether users’ passwords are secure.

Tech Tent: Is your face on a watch list?

Tech Tent: Is your face on a watch list?

Image copyright Getty Images Image caption Surveillance cameras are now often backed up with facial recognition systems Is it a brilliant new law enforcement tool helping keep public spaces safe from criminals and terrorists?

Apple adopte une nouvelle politique anti-suivi dans Safari

Apple adopte une nouvelle politique anti-suivi dans Safari

La société a publié une politique anti-suivi WebKit – un moteur de navigateur Safari – qui détaille les types de méthodes anti-suivi qu’elle a développées. La nouvelle politique traite également des pratiques qui, de l’avis de la société, sont préjudiciables aux utilisateurs et aux conséquences inattendues de telles contre-mesures.

Sending encrypted data with sound

Sending encrypted data with sound

With this question in mind, let’s take a look at the properties of sound and how industry-standard encryption can be applied to acoustic data transfer to render it secure and safe from the risk of prying ears.

Google Android Adware Warning Issued To 8 Million Play Store Users

Google Android Adware Warning Issued To 8 Million Play Store Users

The Google Play Store hosted 85 apps ridden with adware, which were downloaded by 8 million users. Today is no different: Security researchers at Trend Micro have revealed that the Google Play Store hosted 85 app ridden with adware.

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

“What we did here is we studied the system and we showed that actually there is a vulnerability that exists in their system that allows us to use their system and to send carefully created queries that allow us to extract — to exfiltrate — information from the data-set that the system is supposed to protect,” explains Imperial College’s Yves-Alexandre de Montjoye, one of five co-authors of the paper.

A new clothing line confuses automated license plate readers

A new clothing line confuses automated license plate readers

Garments from Adversarial Fashion feed junk data into surveillance cameras, in an effort to make their databases less effective. In a talk, she explained the that hoodies, shirts, dresses, and skirts trigger automated license plate readers (ALPRs) to inject useless data into systems used to track civilians.

Kaspersky AV injected unique ID that allowed sites to track users, even in incognito mode

Kaspersky AV injected unique ID that allowed sites to track users, even in incognito mode

A case in point: for almost four years, AV products from Kaspersky Lab injected a unique identifier into the HTML of every website a user visited, making it possible for sites to identify people even when using incognito mode or when they switched between Chrome, Firefox, or Edge.

Huge Survey of Firmware Finds No Security Gains in 15 Years

Huge Survey of Firmware Finds No Security Gains in 15 Years

CITL researchers studied publicly available firmware images and evaluated them for the presence of standard security features such as the use of non-executable stacks, Address Space Layout Randomization (ASLR) and stack guards, which prevent buffer overflow attacks.

Microsoft Quietly Says it Keeps and Transcribes Your Conversations —Sometimes Even if You Chose Not to Let Them

Microsoft Quietly Says it Keeps and Transcribes Your Conversations —Sometimes Even if You Chose Not to Let Them

Following in the footsteps of other large corporations such as Facebook, Google, Apple and Amazon; Microsoft silently updated its privacy statement admitting it has a group of people listening to users' conversations and interactions through its platform —and transcribing part of those dialogs:Our processing of personal data for these purposes includes both automated and manual (human) methods of processing .

Trump administration reportedly wants to extend NSA phone surveillance program

Trump administration reportedly wants to extend NSA phone surveillance program

Getty Images The Trump administration has reportedly asked Congress to permanently reauthorize all provisions of the USA Freedom Act, including a controversial National Security Agency program that collects and analyzes records on millions of Americans' calls and texts in an attempt to thwart terrorists.

Bakkt’s bitcoin futures and warehouse to debut in September

Bakkt’s bitcoin futures and warehouse to debut in September

Withapproval by the New York State Department of Financial Services to create Bakkt Trust Company, a qualified custodian, the Bakkt Warehouse will custody bitcoin for physically delivered futures. And by now, digital asset markets are global and well-developed, but they have largely been designed to serve retail customers rather than institutional participants.

Facebook is funding brain experiments to create a device that reads your mind

Facebook is funding brain experiments to create a device that reads your mind

The research is important because it could help show whether a wearable brain-control device is feasible and because it is an early example of a giant tech company being involved in getting hold of data directly from people’s minds.

Alarm as Trump Requests Permanent Reauthorization of NSA Mass Spying Program Exposed by Snowden

Alarm as Trump Requests Permanent Reauthorization of NSA Mass Spying Program Exposed by Snowden

Civil liberties groups and privacy advocates raised alarm Thursday after the Trump administration called on Congress to reauthorize an NSA mass surveillance program that was exposed by whistleblower Edward Snowden.

How Search Engine Results Are Terrible

How Search Engine Results Are Terrible

The Google Maps App, Google Search App, and YouTube are installed on almost every mobile device in the US, and likely have so much usage that, if their search statistics were included, Google’s true market share would be 97%+.Even worse, the actual clicks to Google’s properties has increased over the past decade while clicks to third party properties– not listed with favor in Google’s search results– have gone down.

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users. Researchers with VPNMentor have discovered a massive leak in biometric security platform BioStar 2, which uses facial recognition and fingerprint scanning as part of its means to identify users.

King's Cross developers under investigation for scanning public with facial recognition cameras

King's Cross developers under investigation for scanning public with facial recognition cameras

Police trials of facial recognition are currently under judicial review and a parliamentary report released last month said new laws were “urgently needed” to govern the use of the emerging technology.

'No controls in place': Myki details exposed in huge privacy breach

'No controls in place': Myki details exposed in huge privacy breach

Your personal information could be accessed by hackers and stalkers after a massive privacy breach by the government exposed the travel data of millions of Victorians, the state's information watchdog has found.

The world’s most-surveilled cities

The world’s most-surveilled cities

We compared the number of public CCTV cameras with the crime and safety indices reported by Numbeo, which are based on surveys of that site’s visitors.

Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services

Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services

The contract doesn't mention that, in fact, Apple sometimes stores iCloud data on third-party storage services provided by the likes of Amazon Web Services or Google Cloud Platform -- as stated in the iOS security guide.

Why DuckDuckGo isn’t as bad as some people make it seem.

Why DuckDuckGo isn’t as bad as some people make it seem.

According to DuckDuckGo’s privacy policy: DuckDuckGo does not collect or share personal information. So they use the tracking pixel data to improve their product. TL;DR: They collect anonymous data to measure engagement of specific events, to make it a more user friendly experience for everybody.

MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself

MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself

A DEFCON 27 talk by Pen Test Partners revealed command injection and remote code execution vulnerabilities in popular 4G hotspots and MiFi routers made by ZTE, Netgear, TP-Link, and Huawei.

Trump Administration Asks Congress to Reauthorize N.S.A.’s Deactivated Call Records Program

Trump Administration Asks Congress to Reauthorize N.S.A.’s Deactivated Call Records Program

Eventually, the Obama administration and Congress agreed on a reform law that would end the N.S.A.’s bulk collection of domestic calling data, but preserve its ability to swiftly gain access to records held by telecoms when a judge agreed that a specific number had terrorism links.

U.S. Senator Gary Peters of Michigan

U.S. Senator Gary Peters of Michigan

“This week, reports disclosed that Facebook has been paying third-parties to transcribe private audio conversations of Facebook users. This week, reports disclosed that Facebook has been paying third-parties to transcribe private audio conversations of Facebook users.

Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says

Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says

A new Google study this week confirmed the obvious: internet users need to stop using the same password for multiple websites unless they’re keen on having their data hijacked, their identity stolen, or worse.

Kasper-Spy: Kaspersky Anti-Virus puts users at risk

Kasper-Spy: Kaspersky Anti-Virus puts users at risk

A strange discovery on my office computer led me to unearth an astonishing data leak caused by Kaspersky's antivirus software. The data leak allowed websites to unnoticeably read the individual ID of Kaspersky users.

Apple: break Safari's anti-tracking rules and we'll treat you like malware

Apple: break Safari's anti-tracking rules and we'll treat you like malware

Apple on Wednesday published a policy governing how its Safari browser will block advertisers and websites from tracking you online -- and it's got strong words for anyone who tries to thwart its approach.

Apple & Google Halt Human Transcription Programs But Microsoft Refuses to Back Down

Apple & Google Halt Human Transcription Programs But Microsoft Refuses to Back Down

A report from Motherboard revealed these changes to the privacy policy where Microsoft explicitly states that human employees or contractors may listen to Cortana and Skype Translator recordings.

I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

She added that when a user set up two-step verification with a phone number, the company would not use the information to serve targeted ads.

More