This being Computerworld, the number of readers who update the firmware in their router is probably high. But, I suspect very few non-techies keep their firmware current, or even know that the software in their router needs updating (and is called “firmware” rather than “software”). It’s quite understandable. For one thing, the security issues raised
Video: A tech company creates an army of badass android data couriers to fight against cyber-terrorism.
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick. Only instead of a mistress, they’re sharing
I don’t do “cloud computing”. It’s a security nightmare. I have always used a Corsair USB for my offsite storage needs. They have always served me well. Well now there’s a new kid on the block – and he’s very fast. VisionTek Products revealed on Thursday that its latest pocket-sized USB3 storage device is more than
A Tor exit node has been found slapping malware onto downloads as users exit the hidden network and enter the public web. Leviathan Security Group researcher Josh Pitts found the operator of the Russia-based node compromising binaries only a month after raising concerns of the possible attack. He created the Backdoor Factory research tool to
Slacking on password security can have horrific consequences. Even so, it’s easy to lose track of how many are vulnerable. With just a couple of files, you can steal passwords from nearly everywhere they’re stored on a victim’s Windows PC, including your own, just to see how secure they really are. A good rule of
The Anonabox fiasco hasn’t deterred other projects hoping to sell an anonymity router of their own. In fact, many of them see Anonabox’s 9,000 disappointed backers as proof of the demand for their own privacy-in-a-box product. At least five new or soon-to-launch crowdfunding projects now claim to offer a consumer-focused anonymity router with names like
Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities. Here’s how to use it to give your own a network a security checkup. Kali Linux is packed with software for testing
FBI Director James Comey gave a speech yesterday reiterating the FBI’s nearly twenty-year-old talking points about why it wants to reduce the security in your devices, rather than help you increase it. Here’s EFF’s response: The FBI should not be in the business of trying to convince companies to offer less security to their customers.
Smart lock screens that will let you be super secure without ever entering a PIN again. Well, it’s there now and it works as advertised. Just pair your favorite wearable or Bluetooth gizmo, and the secure lock screen goes away. Lose connection, and it’s back.
Google’s two-factor authentication system is a great way to keep your email and other accounts safe, especially if you’ve always got a smartphone (or even a dumb phone) around. Today Google is adding even more options beyond the current phone call, text message, email, and app-based verification. The latest update to the desktop version of
Tablets and cell phones not only can track you but also act as remote listening and video recording devices. These devices can be remotely turned on and have your conversations listened to. DETRACKTOR products will stop the tracking and bugging of your cell phone and tablets as well as protect your ID and credit cards
What’s not to like about the Internet of Things? You drive to work in your connected car while the GPS automatically navigates you away from a traffic jam that would have parked you on the expressway for two hours. At the same time, your onboard messaging app reads you an email from your boss telling
Part of the Government’s ongoing National Security agenda would see the Australian Customs and Border Protection agency gather oodles of biometric data on travellers going in and out of Australia and share it with various law enforcement agencies around the country. The plan may be headed for a happy derailment, however, after a bi-partisan Parliamentary
In the closing credits of Citizenfour, Poitras took the unusual step of adding an acknowledgment of the free software projects that made the film possible: The roll call includes the anonymity software Tor, the Tor-based operating system Tails, GPG encryption, Off-The-Record (OTR) encrypted instant messaging, hard disk encryption software Truecrypt, and Linux. All of that