Hackers hijack and publish mental health data of hundreds of people

Hackers hijack and publish mental health data of hundreds of people

In a country that claims to be at the forefront of digitization and data security, the criminals managed to access the database of thousands of customers of the company Vastaamo after detecting vulnerabilities in their system.

Is it safe to use an old Android phone?

Is it safe to use an old Android phone?

As a result, Google and the phone-makers eventually have to cut support for older handsets, usually once a device gets to be two or three years old.Those handsets then will no longer receive security updates meaning that when a threat is detected on that phone, it simply won't be fixed.

NitroPad: Secure Laptop With Unique Tamper Detection

NitroPad: Secure Laptop With Unique Tamper Detection

Thanks to the combination of the open source solutions Coreboot, Heads and Nitrokey USB hardware, you can verify that your laptop hardware has not been tampered with in transit or in your absence (so-called evil maid attack).

A Paranoid Guide to Fighting the ‘Bugging Epidemic’

A Paranoid Guide to Fighting the ‘Bugging Epidemic’

“I used to sell mostly cameras, but in last few years it’s more detection devices,” said Jill Johnston, chief executive of KJB Security Products in Nashville.Also popular are radio frequency, or R.F., detectors that can pick up signals emitted by surveillance devices.

Is your Airbnb host spying on you with a hidden camera? Use this simple trick to find out.

Is your Airbnb host spying on you with a hidden camera? Use this simple trick to find out.

Alex Heid, chief research and development officer at SecurityScorecard, has developed a simple method for detecting whether an Airbnb host is watching guests live on a hidden camera.Here's how to find out if your Airbnb host is discreetly watching you on a live security camera.

Facial Recognition in Identity Verification

Facial Recognition in Identity Verification

There is no doubt that facial recognition systems have greatly improved the accuracy and efficiency of security verification processes while reducing labour costs, as the technology excels at detecting small but unique facial features that would be overlooked by human eyes.

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Google says the built-in microphone it never told Nest users about was 'never supposed to be a secret'

Google says the built-in microphone it never told Nest users about was 'never supposed to be a secret'

Nest Guard Nest Google says that "the microphone has never been on and is only activated when users specifically enable the option." Read more: Google is reabsorbing Nest, the smart home company it bought for $3.2 billion in 2014 It also said the microphone was originally included in the Nest Guard for the possibility of adding new security features down the line, like the ability to detect broken glass.

773 million email addresses exposed in ‘mega data breach’ — here’s how to see if yours is one of them

773 million email addresses exposed in ‘mega data breach’ — here’s how to see if yours is one of them

“While it’s important that individual web users have strong, secure logins, the onus is on the businesses to detect and block malicious bot traffic before large-scale password hacks can occur.” The breach is yet another reminder that the best way to protect your privacy is to use a password manager and two-factor authentication, said Bill Evans, a vice president at California security firm One Identity.

Over 140 International Airlines Affected by Major Security Breach

Over 140 International Airlines Affected by Major Security Breach

Potential attackers could view and change private information in flight bookings made by millions of customers of major international airlines because of a security issue in the Amadeus online booking system found by Safety Detective's Noam Rotem.

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

iBorderCtrl provides a unified solution with aim to speed up the border crossing at the EU external borders and at the same time enhance the security and confidence regarding border control checks by bringing together many state of the art technologies (hardware and software) ranging from biometric verification, automated deception detection, document authentication and risk assessment.

5 Security Vulnerabilities You Don’t Want to Overlook

5 Security Vulnerabilities You Don’t Want to Overlook

Therefore, development and security teams can no longer overlook known security vulnerabilities in open source components. To combat vulnerabilities, many rely on platforms such as WhiteSource, an open source security management solution, which detects known vulnerabilities in real-time through the SDLC, including post-deployment.