Google and Mozilla move to stop Kazakhstan 'snooping'

Google and Mozilla move to stop Kazakhstan 'snooping'

It comes after reports internet services providers in the country have required people to install a government-issued certificate on all devices and in every browser.

Popular Porn Site Breach Exposed 1.2 Million 'Anonymous' User Profiles

Popular Porn Site Breach Exposed 1.2 Million 'Anonymous' User Profiles

Researchers from vpnMentor have discovered a data breach at the popular Luscious porn site that exposed the personal profiles of 1.2 million supposedly anonymous users.

Facebook expands data abuse bug bounty programme to Instagram

Facebook expands data abuse bug bounty programme to Instagram

Instagram users can now report app developers they believe are misusing their data as part of an expansion to the social network’s security tools. Instagram said the security researchers would test the feature and receive bounty awards for any eligible reports which identify an issue.

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of passwords used in Chrome are unsafe and have been released in data breaches, according to new information from Google. In February, a new feature was introduced to the Google Chrome browser which checks whether users’ passwords are secure.

Sending encrypted data with sound

Sending encrypted data with sound

With this question in mind, let’s take a look at the properties of sound and how industry-standard encryption can be applied to acoustic data transfer to render it secure and safe from the risk of prying ears.

Google Android Adware Warning Issued To 8 Million Play Store Users

Google Android Adware Warning Issued To 8 Million Play Store Users

The Google Play Store hosted 85 apps ridden with adware, which were downloaded by 8 million users. Today is no different: Security researchers at Trend Micro have revealed that the Google Play Store hosted 85 app ridden with adware.

Bakkt’s bitcoin futures and warehouse to debut in September

Bakkt’s bitcoin futures and warehouse to debut in September

Withapproval by the New York State Department of Financial Services to create Bakkt Trust Company, a qualified custodian, the Bakkt Warehouse will custody bitcoin for physically delivered futures. And by now, digital asset markets are global and well-developed, but they have largely been designed to serve retail customers rather than institutional participants.

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users. Researchers with VPNMentor have discovered a massive leak in biometric security platform BioStar 2, which uses facial recognition and fingerprint scanning as part of its means to identify users.

MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself

MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself

A DEFCON 27 talk by Pen Test Partners revealed command injection and remote code execution vulnerabilities in popular 4G hotspots and MiFi routers made by ZTE, Netgear, TP-Link, and Huawei.

Major breach found in biometrics system used by banks, UK police and defence firms

Major breach found in biometrics system used by banks, UK police and defence firms

The fingerprints of over 1 million people, as well as facial recognition information, unencrypted usernames and passwords, and personal information of employees, was discovered on a publicly accessible database for a company used by the likes of the UK Metropolitan police, defence contractors and banks.

Hackers have worked out how to exploit security flaws in hook-up apps

Hackers have worked out how to exploit security flaws in hook-up apps

Security experts have issued a warning after three gay hookup apps - including Grindr - and a threesome app were found to expose users' exact locations, just by knowing the publicly available username.

Is America Finally Ready For A Surveillance-Free Smartphone?

Is America Finally Ready For A Surveillance-Free Smartphone?

If you follow the funding strategies for technology companies and the darlings of Silicon Valley, you know the smartphone space is a tough nut to crack. The company exists to serve a core mission—for Purism, the security and privacy of its customers—above a profit motive.

There is more than only black and white in information security and privacy

There is more than only black and white in information security and privacy

When it comes to information security and privacy, some people specialized in spreading black and white thinking. The new filter bubble, inflated by black and white thinking of like-minded people, is proclaimed as the only truth.

HUAWEI announces HarmonyOS open source operating system for smartphones and smart devices

HUAWEI announces HarmonyOS open source operating system for smartphones and smart devices

Richard Yu, CEO of Huawei’s Consumer Business Group, regarding the thoughts behind developing this new OS, said: We’re entering a day and age where people expect a holistic intelligent experience across all devices and scenarios.

Group sex app leaks locations, pics and personal details. Identifies users in White House and Supreme Court

Group sex app leaks locations, pics and personal details. Identifies users in White House and Supreme Court

We’ve seen some pretty poor security in dating apps over recent years; breaches of personal data, leaking users locations and more. We contacted 3fun about this on 1st July and asked them to fix the security flaws, as personal data was exposed.

Apple may soon hand special iPhones to security researchers

Apple may soon hand special iPhones to security researchers

As Patrick Wardle, principal security researcher at Jamf that found several issues in macOS, told Forbes: "If you're a large, well-resourced company such as Apple, who claims to place a premium on security, having a bug-bounty program is a no brainer."

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

Loki Messenger is an open source and decentralized encrypted messaging service using blockchain technology to secure user data. The decentralized nature of blockchain technology allows the Loki Project to create a privacy suite enabling users to interact securely with the internet, encompassing encrypted messaging services, forums, online marketplaces and social media platforms.

Barr says the US needs encryption backdoors to prevent “going dark.” Um, what?

Barr says the US needs encryption backdoors to prevent “going dark.” Um, what?

Citing the threat posed by violent criminals using encryption to hide their activities from law enforcement, Barr said that information security "should not come at the expense of making us more vulnerable in the real world."

Introducing KeePassium for iOS

Introducing KeePassium for iOS

KeePassium is a password manager that combines the security of KeePass with the beauty of iOS design. KeePassium was created because existing KeePass apps on iOS were either abandoned, outright ugly, or had an “by engineer, for engineers” design. KeePassium is a premium app for those who value their privacy.

Telegram: the messaging app driving Hong Kong’s decentralized revolution

Telegram: the messaging app driving Hong Kong’s decentralized revolution

Hong Kong authorities have also attempted to clamp down on Telegram group members, which protestors say is taking cues from the ways China polices the Internet.

Chrome 76 arrives, blocking Flash and making paywalls easier to bypass

Chrome 76 arrives, blocking Flash and making paywalls easier to bypass

The blocking of Flash will be welcomed by many, and -- once word spreads about what the implications are (namely that it makes it far easier to get around paywalls ) -- the same is likely to be true of the changes to the detection of Incognito mode.

Windows 10, Office Online users get new warning over data privacy

Windows 10, Office Online users get new warning over data privacy

Netherlands authorities last year cited eight undocumented privacy issues with ProPlus versions of Office 2016 and Office 365 that allowed Microsoft to collect Dutch-created user content from the apps that was stored on US servers and potentially exposed to US law enforcement.

Cybersecurity Lessons from Working with the Ecuadorian Government

Cybersecurity Lessons from Working with the Ecuadorian Government

But I wanted to share an earlier experience of working with the Ecuadorian government to ensure the cyber and data security of my home nation. We restructured the security backbone of all Registration Institutions and National Public Data Recording Address (DINARDAP Spanish acronym), by implementing endpoint, perimetral, database security amongst others.

Which IoT Companies Do People Most Mistrust? (Hint: Facebook)

Which IoT Companies Do People Most Mistrust? (Hint: Facebook)

But many IoT companies aren't doing enough to secure their devices , leaving users vulnerable to attacks. And last year, a Toluna poll found that Facebook was the least trusted tech company by a significant margin.

Tide Foundation

Tide Foundation

Decentralized blockchains with specific protocols such like Tide help organizations to encrypt their sensitive data and provide a strict framework for accessing it, protecting against security breaches and helping meet privacy regulation.

An exposed password let a hacker access internal Comodo files

An exposed password let a hacker access internal Comodo files

A hacker gained access to internal files and documents owned by security company and SSL certificate issuer Comodo by using an email address and password mistakenly exposed on the internet.

Home Affairs pushes for cyber spy powers

Home Affairs pushes for cyber spy powers

The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.

The Encryption Debate Is Over - Dead At The Hands Of Facebook

The Encryption Debate Is Over - Dead At The Hands Of Facebook

Facebook’s model entirely bypasses the encryption debate by globalizing the current practice of compromising devices by building those encryption bypasses directly into the communications clients themselves and deploying what amounts to machine-based wiretaps to billions of users at once.

Which Linux distro is best for privacy?

Which Linux distro is best for privacy?

The Linux distros mentioned above are considered two of the best for privacy (both have very specific capabilities that makes each better for different use cases and threat models).

Is someone watching me? — Webcam Security

Is someone watching me? — Webcam Security

People worldwide are encountering cyberattacks like getting their computers infected by malware and letting others access their webcams or microphones. With a malicious code a hacker can easily control your computer and perform many different actions like access your webcam.

More