A Third of Known Computer Security Flaws Have No Solution

A Third of Known Computer Security Flaws Have No Solution

In the first half of 2019, analysts at computer security firm Risk Based Security (RBS) enumerated a total of 11,092 flaws in computer systems (known as vulnerabilities) that could be exploited by a hacker to take unauthorized actions in another person’s or organization’s system.

First half 2019 sees 4,000 data breaches exposing 4B records

First half 2019 sees 4,000 data breaches exposing 4B records

The 2019 MidYear QuickView Data Breach Report by Risk Based Security found that there were 3,816 data breaches during the first six months of the year, up 54 percent, resulting in 4.1 billion records being compromised, up 52 percent.

Hackers have worked out how to exploit security flaws in hook-up apps

Hackers have worked out how to exploit security flaws in hook-up apps

Security experts have issued a warning after three gay hookup apps - including Grindr - and a threesome app were found to expose users' exact locations, just by knowing the publicly available username.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

'Five Eyes' security alliance calls for access to encrypted material

'Five Eyes' security alliance calls for access to encrypted material

“The Five Eyes are united that tech firms should not develop their systems and services, including end-to-end encryption, in ways that empower criminals or put vulnerable people at risk,” said British Home Secretary Priti Patel.

Social Media

Social Media

Instead of an employee threaten the integrity of your group’s online security, it is in your best interests to implement an Internet filtering solution from TitanHQ.

ANYONE can be re-identified from ‘anonymous data’, researchers claim & let you TEST it

ANYONE can be re-identified from ‘anonymous data’, researchers claim & let you TEST it

Online services that claim to anonymize users’ personal data aren’t as secure as we think, according to researchers who found over 99 percent of people can be identified from a handful of supposedly anonymous data points.

It's not that hard to unmask real people in anonymous data, researchers warn

It's not that hard to unmask real people in anonymous data, researchers warn

The Computational Privacy Group at Imperial College London has also created a tool to check how likely you'd be correctly re-identified in anonymous data sets.

US attorney general William Barr says Americans should accept security risks of encryption backdoors

US attorney general William Barr says Americans should accept security risks of encryption backdoors

U.S. attorney general William Barr has said consumers should accept the risks that encryption backdoors pose to their personal cybersecurity to ensure law enforcement can access encrypted communications.

Studies prove once again that users are the weakest link in the security chain

Studies prove once again that users are the weakest link in the security chain

Organizations need to make sure users understand the importance of protecting sensitive data and safeguarding company assets, and that they’re aware of how their actions impact the overall security for the whole organization.

6 Reasons Why Face App Puts Your Privacy at Serious Risk

6 Reasons Why Face App Puts Your Privacy at Serious Risk

It is another reason why you should not use Face App. Also Read: 10 Interesting Facts About Nostalgia We Bet You Didn’t Know About. Here on Face App you share your pictures and username publicly with others and you do not know who can use your personal details.

Google and Facebook’s tracking software is widely used on porn sites, shows new study

Google and Facebook’s tracking software is widely used on porn sites, shows new study

Visitors to porn sites have a “fundamentally misleading sense of privacy,” warn the authors of a new study that examines how tracking software made by tech companies like Google and Facebook is deployed on adult websites.

Florida's statewide student data project alarms privacy groups

Florida's statewide student data project alarms privacy groups

The letter describes the database as “part of an alarming trend in Florida over the past year,” alongside other new record-collection requirements outlined in the Stoneman Douglas Public Safety Act. Across the country, too, more and more schools and governments are looking toward surveillance technology to ease their security concerns.

Security and privacy key to smart buildings and cities

Security and privacy key to smart buildings and cities

At the core of the security problem is the fact that many of the systems that smart building and cities will need to rely on will be linked to a wide variety of internet of things-connected (IoT) devices and sensors that are potentially vulnerable to cyber attacks.

Digital ID Verification – The Key to Developing Intelligent Security Systems

Digital ID Verification – The Key to Developing Intelligent Security Systems

With the increased advancement in intelligent systems, businesses can now implement systems that are able to verify users in real-time, all the while lending better security to transactions.

Google’s new reCAPTCHA has a dark side

Google’s new reCAPTCHA has a dark side

Khormaee won’t share what signals Google uses to determine these scores because he says that would make it easier for scammers to imitate benign users, but he believes that this new version of reCaptcha makes it incredibly difficult for bots or Captcha farmers—humans who are paid tiny amounts to break Captchas online—to fool Google’s system.

Google is reportedly arguing that cutting Huawei off from Android threatens US security

Google is reportedly arguing that cutting Huawei off from Android threatens US security

Because Huawei phones are already banned in the US, understanding how Google is making that case that a forked version of Android being sold elsewhere in the world is a serious threat to US national security might seem like a bit of a jump.

Data Protection, Security, and the GDPR: A fuzzy and fraught relationship

Data Protection, Security, and the GDPR: A fuzzy and fraught relationship

First a look at: 1.1 The media backdrop 1.2 The Crux: a.k.a what the GDPR really says about security 1.3 Security as source of privacy risks: security as a legitimate interest, IP addresses as personal data, and profiling in a security context.

Online Privacy Is Getting Worse: Data Breaches in 2019 on Track to Top Last Year’s Total

Online Privacy Is Getting Worse: Data Breaches in 2019 on Track to Top Last Year’s Total

The second-largest breach so far in 2019 was the loss of personal data from nearly 203 million job applicants that was exposed as a result of a misconfigured database.

‎Umbrella Security

‎Umbrella Security

Adapt your plans based on live threat alerts from trusted sources, or share incident forms with your team. * Protect devices and data with simple step-by-step guides to digital security tools *. * Protect your team with shareable checklists and incident forms *.

5 Brain-Boosting Podcast Episodes About Online Privacy and Security

5 Brain-Boosting Podcast Episodes About Online Privacy and Security

#2 Security, privacy and the internet of things – with Steve Lord, Cybersecurity Sauna podcast. In this Cybersecurity sauna podcast episode, Steve Lord speaks about the security and privacy issues of the devices used in IoT today.

Discovery of cameras built into airlines’ seats sparks privacy concerns

Discovery of cameras built into airlines’ seats sparks privacy concerns

Cameras pointed at passengers have been noticed in the inflight entertainment systems used by some American Airlines and Singapore Airlines aircraft, BuzzFeed News reports.

Canadian Cops Will Scan Social Media to Predict Who Could Go Missing

Canadian Cops Will Scan Social Media to Predict Who Could Go Missing

Israel said that the risk of false positives increases when predictive models use data of “questionable fidelity” such as social media posts.

Google Street View Puts Homes at Risk, Say Police

Google Street View Puts Homes at Risk, Say Police

The police have advised homeowners across the UK to contact Google to ask for images of their properties to be blurred in order to prevent criminals from targeting them. Police leaders believe that Google’s Street View tool puts homes at risk of being scouted by burglars.

Facebook stored hundreds of millions of passwords unprotected

Facebook stored hundreds of millions of passwords unprotected

According to security reporter Brian Krebs, who cited a “senior Facebook insider”, “access logs showed some 2,000 engineers or developers made approximately nine million internal queries for data elements that contained plaintext user passwords”.

Police in Canada Are Tracking People’s ‘Negative’ Behavior In a ‘Risk' Database

Police in Canada Are Tracking People’s ‘Negative’ Behavior In a ‘Risk' Database

Information in the database includes whether a person uses drugs, has been the victim of an assault, or lives in a “negative neighborhood.” The Risk-driven Tracking Database (RTD) is part of a collaborative approach to policing called the Hub model that partners cops, school staff, social workers, health care workers, and the provincial government.

Cyber criminals earn $3bn a year exploiting social platforms

Cyber criminals earn $3bn a year exploiting social platforms

Apps, adverts and links are the primary delivery mechanism for cryptocurrency mining software on social platforms, with the majority of malware detected by this research mining monero (80%) and bitcoin (10%), earning $250m a year for cyber criminals.

How Has Tor Helped You? Send Us Your Story.

How Has Tor Helped You? Send Us Your Story.

Last September, we asked to hear stories about how Tor has helped protect people online. How To Share Your Story There are several ways you can tell us how Tor has helped you.

Consumers Worry About Personal Data Privacy But Few Take Action: Study

Consumers Worry About Personal Data Privacy But Few Take Action: Study

But even though consumers are concerned with one story after another of companies losing or misusing personal data, apparently it’s not enough for them to take actions in response.

ICANN seeks full deployment of tougher security extensions

ICANN seeks full deployment of tougher security extensions

But according to an announcement on Friday from ICANN, the DNS infrastructure is being targeted by ‘malicious activity.’ In response to the attacks on DNS, ICANN are calling for full deployment of the ‘Domain Name System Security Extensions’ (DNSSEC).

More