Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, 20 September 2014

A closer look at Apple and Google’s police-proofing of iOS 8 and Android L

A closer look at Apple and Google’s police-proofing of iOS 8 and Android L

As we reported yesterday, Google has announced that new versions of Android will automatically enable 
encryption by default, and like Apple the company says it will protect people from the police.
A day after Apple announced that its new iOS 8 will encrypt data by default and even Apple can’t crack an 
iPhone or iPad that uses it, Google followed suit by announcing new versions of Android will also enable 

encryption by default.

Saturday, 6 September 2014

How to protect your Apple iCloud account by setting up two-step verification

How to protect your Apple iCloud account by setting up two-step verification

Unless you've been completely avoiding the news this past week, you will have heard about Apple's little 
problem with nude photos being stolen from celebrity accounts. The company has strongly denied that there 
has been a security breach, but in a statement it advised customers to check the strength of their passwords 
as well as enabling two-step verification.

Apple denies lax iCloud security is to blame for naked celebrity image leaks

Apple denies lax iCloud security is to blame for naked celebrity image leaks

Apple CEO Tim Cook has refuted suggestions that a lax attitude toward security was responsible for 
hackers gaining access to nude celebrity images.
In his first interview on the subject, Cook confirmed that Apple is planning additional measures to keep 
attackers out of user's iCloud accounts, but emphasised that none of the Apple IDs and passwords were 
leaked from the company's servers.

Tuesday, 2 September 2014

Never mind the iPhone 6: Apple must explain iCloud hack debacle

Never mind the iPhone 6: Apple must explain iCloud hack debacle
Sometimes I wish the internet could just be a place to exchange wholesome information, such as cooking 
recipes and tips on Linux, but sadly, there is a dark side. There are deviant people lurking on the web doing 
all sorts of horrible things.

Monday, 1 September 2014

iCloud hacking scandal sees naked photos of A-list celebrities leaked on 4chan

iCloud hacking scandal sees naked photos of A-list celebrities leaked on 4chan

A swathe of nude and explicit photos of A-list celebrities has been leaked on 4chan in a mass hacking 
scandal.
For the uninitiated, 4chan is an image-based website where users can anonymously post photos and videos, 
as well as comment on the posts of others without registering. Photos of over 100 stars have been leaked 
onto its forums, including those of Cara Delevigne, Kim Kardashian and (much to the Internet's 
delight) Hunger Games star Jennifer Lawrence.

Thursday, 28 August 2014

Google, Twitter and HP take the fight to the world’s top security flaws

Google, Twitter and HP take the fight to the world’s top security flaws

Google, Twitter and HP are among 12 organisations that have formed a new group that aims to get to the 
bottom of the most critical security design flaws in modern software.

Tuesday, 26 August 2014

Redefining mobile security: What can businesses do to reduce the risks?

Redefining mobile security: What can businesses do to reduce the risks?

Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, 
such as anytime, anywhere communications and the storage of vital and personal information for use in our 
work and personal lives. It has also provided greater flexibility in where and how we work and 
communicate, making things much easier for us.

Monday, 25 August 2014

BYOD, COPE or CYOD? How to choose the right enterprise mobility strategy for your business

BYOD, COPE or CYOD? How to choose the right enterprise mobility strategy for your business

Finding the ideal alignment and balance between hardware, software and employee preference has become 
the Holy Grail for those tasked with defining enterprise mobility strategy. BYOD delivered many great things, 
such as higher employee productivity and satisfaction.

Monday, 18 August 2014

GameOver Zeus botnet back from the dead despite Microsoft's takedown

GameOver Zeus botnet back from the dead despite Microsoft's takedown

Back in early June Microsoft announced it had taken down the GameOver Zeus botnet, in an effort to 
protect customers. But, thwarting the internet bad guys is much more difficult in practice than it is in theory. 
Now security researches claim the phoenix is rising from its ashes.

Sunday, 17 August 2014

How to protect your iPhone or Android handset in four easy steps

How to protect your iPhone or Android handset in four easy steps

A friend of mine bought a new iPhone 5S recently, used it for just over a week, and then 'lost it'. It might 
have been stolen or simply misplaced, she has no idea. All she knows for certain is she no longer has it in her possession. That’s bad enough, but she spent much of the first week copying over photos and other personal data to it from her old phone, but didn’t devote any time - at all - to protecting the device.

Friday, 15 August 2014

Where does a hacker's drive come from?

Where does a hacker's drive come from?

Ever wondered why hackers do what they do? Thycotic, a software firm specialising in privileged access 
password protection, conducted a survey of 127 hackers at Black Hat USA 2014 to try and understand 
their thinking.

Tuesday, 12 August 2014

Need to blow off steam? John McAfee’s BrownList is here


Need to blow off steam? John McAfee’s BrownList is here
Flamboyant security pioneer/political refugee John McAfee is launching a new site where people can blast companies, governments or pretty much anything.

Monday, 11 August 2014

Unsuspecting cat turned into hacker's accomplice

Unsuspecting cat turned into hacker's accomplice

We are shocked. Shocked, we say. Warkitteh turned a household cat into an unwitting hacker's accomplice. Cats, hacker humor, Wifi security.
Gene Bransfield is a 20 year veteran with IT and cybersecurity credentials. He works as principle system security engineer with Tenacity Solutions and is a pretty sharp dude. He also claims to be a "husband, a father, and a dog owner." But he admits to not owning a cat yet has no qualms about weaponising one.

Saturday, 9 August 2014

Facebook buys cyber-security startup PrivateCore

Facebook buys cyber-security startup PrivateCore

Facebook has purchased PrivateCore for an undisclosed sum, to help protect the data of its users.
PrivateCore is a cyber-security company that authenticates and secures server data.

Cloud computing: Customisation is the name of the game

Cloud computing: Customisation is the name of the game

With Gartner predicting that half of all enterprises will have hybrid cloud deployments by 2017, its obvious that cloud technology is permeating all levels of organisations. What this also means is that nothing is black and white with cloud computing. Enterprises are deploying different forms of cloud solutions in ways that best support their business needs and organisational infrastructure.

Friday, 8 August 2014

Yahoo follows Google with encryption for its email service

Yahoo follows Google with encryption for its email service

Privacy activists will be happy bunnies, because Yahoo has said that it is going to encrypt its email traffic, and keep it safe from the prying eyes of government surveillance.
The move follows Google's recent announcement that it would be offering such a scheme, as the big communications facilitators of the tech world try to appeal to those who are angry about the NSA's tentacles (and others) extending into their electronic missives.

Wednesday, 6 August 2014

IP EXPO Europe 2014 seeks participants for Cyber Hack lab

IP EXPO Europe 2014 seeks participants for Cyber Hack lab

Cyber Security EXPO, which is a part of IP EXPO Europe 2014, has sent out a call for folks who are 
interested in contributing to Cyber Hack, a live open source security lab which will be present at the show.

Tuesday, 5 August 2014

Mozilla spills 76,000 developer emails in major leak

Mozilla spills 76,000 developer emails in major leak

Mozilla has made a faux pas on the security front, with the browser maker accidentally leaking the email addresses of no less than 76,000 developers.
This actually happened beginning on 23 June, when a "data sanitisation" process of the Mozilla Developer Network (MDN) site database started failing, and did so for a month without being noticed. The problem was spotted by a Mozilla web developer 11 days ago, and since then, the company has been investigating the issue before making an announcement.

Monday, 4 August 2014

Israel turns spying tables on US, hacks John Kerry's phone calls

Israel turns spying tables on US, hacks John Kerry's phone calls

With so much in the news over the past year about the vastly inflated spying capabilities of United States intelligence services, it's been easy to forget that the US is just as often a victim of spying. This week it emerged that none other than Secretary of State John Kerry was the victim of spying from close ally Israel, and at least one other nation.

Saturday, 2 August 2014

GCHQ awards cyber security approval to 6 Master’s degrees

GCHQ awards cyber security approval to 6 Master’s degrees

GCHQ has rubber stamped six Master’s degrees in cyber security that it hopes increases the country’s 
defences against all facets of a critical threat.