Blog: In The News
You are here: Home \ Blog
7 September 2015 - 10:37, by , in Uncategorized, No comments
An attacker with access to security-sensitive information about the Firefox web browser went unnoticed for up to two years, putting hundreds of millions of users at risk. The attacker was able to spy on highly sensitive information by gaining access to a privileged account on Bugzilla@Mozilla, the bug tracking software the Mozilla corporation uses to...
4 September 2015 - 20:03, by , in Uncategorized, No comments
– To encrypt, or not to encrypt? – Encryption is a hot topic in security circles these days. There are lots of different viewpoints about whether to encrypt or not. All of us here on Naked Security will tell you that you can’t have enough encryption. Wisely used, encryption gives you a valuable extra layer...
4 September 2015 - 15:39, by , in Uncategorized, No comments
The US Department of Justice (DOJ) yesterday released a new and enhanced policy to cover the use of “stingrays” – tracking devices that mimic cell phone towers, tricking phones into connecting with them to reveal their precise location. The new policy, designed to “establish a higher and more consistent legal standard and increase privacy protections”, states that all...
4 September 2015 - 12:05, by , in Uncategorized, No comments
The Dark Web is a small and secretive part of the regular web that’s become a haven for drug markets, paedophiles and sex traffickers. It’s dark because it uses encryption to hide the locations of everything on it from everything else. Users are anonymous and protected by a raft of anti-privacy features baked directly into...
3 September 2015 - 16:33, by , in Uncategorized, No comments
Earlier this year the UK Information Commissioner’s Office (ICO), along with 28 other data protection regulators from around the world, announced an investigation into how websites and apps – squarely aimed at children – were collecting and sharing personal information. The results are now in. In an announcement yesterday, the ICO explained how the overall picture...
3 September 2015 - 10:04, by , in Uncategorized, No comments
China and the United States usually treat each other the way two heavyweight boxers do – circling each other, jabbing occasionally, but never throwing a big punch that could leave them exposed. But sometimes one of them lands a punch, like China apparently did in June when it allegedly hacked the US government and stole data...
2 September 2015 - 22:50, by , in Featured, News, No comments
Back in 2012, a man in the South of England was apparently renovating his chimney when he came across the skeleton of a pigeon. One leg bone had a capsule attached, which turned out to contain what looked very much like a coded message dating back to World War 2. The British made extensive use...
2 September 2015 - 19:26, by , in Featured, Law & order, News, No comments
In the competitive playground that is search, Google is the schoolyard bully, 30 companies told the Competition Commission of India (CCI) in response to its recent inquiries. The Economic Times reports that the CCI has given Google until 10 September 2015 to reply, plus another week before the company has to present itself before a...
2 September 2015 - 16:50, by , in Uncategorized, No comments
The Wikimedia Foundation (WMF), host of the online encyclopaedia, Wikipedia, announced on Monday that it has suspended 381 accounts for creating pages deemed to be either overly promotional in nature or featuring spam links. WMF says the identified accounts, known as ‘sockpuppets’, had either charged or accepted financial consideration, “to promote external interests on Wikipedia...
2 September 2015 - 12:57, by , in Malware, News, No comments
Start thinking back, and bring to mind the big “Malware In The Media” stories of the last few years. What did you come up with? We let our minds go to town. We visualised hyberbolic headlines like RANSOMWARE RAVAGES BRITAIN and AMERICA UNDER ATTACK BY STATE-SPONSORED HACKERS. In particular, our first thoughts were of two...