Posts filtered by tags: Security[x]


 

UK shrinks timetable for telcos to stop installing 5G kit from Huawei

The UK government has squeezed the timetable for domestic telcos to stop installing 5G kit from Chinese suppliers, per the BBC, which reports that the deadline for installation of kit from so-called ‘high risk’ vendors is now September. It had already announced a ban on telcos buying kit from Huawei et al by the end of this year — acting on national security concerns attached to companies that fall under the jurisdiction of Chinese state surveillance laws. But, according to the BBC, ministers ar...
Tags: Travel, Security, Mobile, Europe, UK, China, Nokia, Digital, US, Bbc, Policy, Finland, National Security, Huawei, 5g, Dowden


UK Will Ban the Installation of Huawei 5G Equipment After September 2021

The UK has taken another step towards removing Huawei from its 5G network. On Sunday, the British government announced that the country’s telecommunications companies would not be allowed to install new 5G equipment from Huawei after September 2021, Bloomberg reported.Read more...
Tags: Security, UK, Science, Privacy, China, Bloomberg, Huawei


The Supreme Court will hear its first big CFAA case

The Supreme Court will hear arguments on Monday in a case that could lead to sweeping changes to America’s controversial computer hacking laws — and affecting how millions use their computers and access online services. The Computer Fraud and Abuse Act was signed into federal law in 1986 and predates the modern internet as we know it, but governs to this day what constitutes hacking — or “unauthorized” access to a computer or network. The controversial law was designed to prosecute hackers, but ...
Tags: Security, Lawsuit, Supreme Court, California, Government, Articles, America, Tech, Georgia, Tesla, Information Technology, United States, Hacking, Internet Security, Computing, Hacker


A Hacker Is Reportedly Selling Hundreds of Microsoft C-Suite Email Credentials for As Little as $100

How much are a CEO’s email credentials worth? According to one hacker, anywhere between $100 and $1,500 will do, although the specific price will be set depending on the company’s size and the person’s role in it. Unfortunately, this is not a drill: There are purportedly hundreds of C-suite level email credentials…Read more...
Tags: Security, Science, Email, Microsoft, Privacy, Hacks


A Hacker Is Reportedly Selling Hundreds of C-Suite Email Credentials for Microsoft Accounts for As Little as $100

How much are a CEO’s email credentials worth? According to one hacker, anywhere between $100 and $1,500 will do, although the specific price will be set depending on the company’s size and the person’s role in it. Unfortunately, this is not a drill: There are purportedly hundreds of C-suite level email credentials…Read more...
Tags: Security, Science, Email, Microsoft, Privacy, Hacks


How to stop Google from tracking you on any device

Though Google tracking can be useful, it can also be turned off, for the most part. Westend61/Getty Images You can stop Google from tracking some aspects of your online activity by changing your Google Account settings. Google tracks many details about you whenever you use your Google account on your computer, laptop, tablet, and phone. Here's how to stop Google from tracking your web activity, location, YouTube history, and more.  Visit Business Insider's Tech Reference library for more s...
Tags: Google, Security, Privacy, Trends, Tracking, Google Account, Dave Johnson, Tech Insider, Business Insider Google, BI-freelancer, Tech Reference, Laptops & Tablets (Reference, Software & Apps (Reference, Tech How To, Smartphones (Reference


Parler Wasn't Hacked, but That Doesn't Mean It's Safe to Use

Last night, Twitter lit up with claims that Parler, a social media platform surging in popularity among Trump supporters—especially since the election—was hacked. Parler’s CEO John Matze did damage control today, strongly denying the claim, but the rumors continue circulating online. Some say the leak has been…Read more...
Tags: Security, Privacy, Lifehacks, Data Security, Trump, Parler, John Matze


How to stop Google from tracking your computer and limit its data collection of your online history

There are several ways you can disable or limit how Google tracks you. Alain Jocard/Getty Images You can stop Google from tracking your computer by going to your Google Account page and turning off Web & App Activity and Location Services.  Google tracks your activity and location on any device when you're signed into Google.  If you force Google to stop tracking you, you'll lose Google's ability to personalize its services based on your web behavior and location.   Visit Business Insider'...
Tags: Google, Security, Privacy, Trends, Location Tracking, Google Account, Dave Johnson, Tech Insider, Open Google, BI-freelancer, Tech Reference, Laptops & Tablets (Reference, Software & Apps (Reference, Tech How To, Location Services Google, Google Account Dave Johnson Business Insider


Decrypted: Apple and Facebook’s privacy feud, Twitter hires Mudge, mysterious zero-days

Trump’s election denialism saw him retaliate in a way that isn’t just putting the remainder of his presidency in jeopardy, it’s already putting the next administration in harm’s way. In a stunning display of retaliation, Trump fired CISA director Chris Krebs last week after declaring that there was “no evidence that any voting system deleted or lost votes, changed votes or was in any way compromised,” a direct contradiction to the conspiracy-fueled fever dreams of the president who repeatedly...
Tags: Iphone, Apple, Security, Startups, Facebook, Twitter, Privacy, Tech, Malware, Cybercrime, Cyberattack, Silicon Valley, Biden, Cyberwarfare, Computer Security, Cisa


Biden-Harris team finally get their transition .gov domain

Finally. It only took almost three weeks, but the Biden-Harris transition has officially begun. On Monday, the General Services Administration gave the green light for the Biden-Harris team to transition from political campaign to government administration, allowing the team to receive government resources like office space, but also classified briefings and secure computers. And, with it, comes a shiny new .gov domain. Transitioning is an obscure part of the law that’s rarely discussed, in larg...
Tags: Security, Obama, Government, Tech, Joe Biden, Policy, General Services Administration, Michigan, Biden, Wall Street Journal, Head, Trump, Murphy, Obama Biden, Emily Murphy, Biden Harris


A bug meant Twitter Fleets could still be seen after they disappeared

Twitter is the latest social media site to allow users to experiment with posting disappearing content. Fleets, as Twitter calls them, allows its mobile users post short stories, like photos or videos with overlaying text, that are set to vanish after 24 hours. But a bug meant that fleets weren’t deleting properly and could still be accessed long after 24 hours had expired. Details of the bug were posted in a series of tweets on Saturday, less than a week after the feature launched. full d...
Tags: Travel, Security, Twitter, Privacy, Spokesperson, Software, Computing, Operating Systems, Real Time Web, Microblogging, Text Messaging


A bug meant Twitter Fleets could still be seen after they disappear

Twitter is the latest social media site to allow users to experiment with posting disappearing content. Fleets, as Twitter calls them, allows its mobile users post short stories, like photos or videos with overlaying text, that are set to vanish after 24 hours. But a bug meant that fleets weren’t deleting properly and could still be accessed long after 24 hours had expired. Details of the bug were posted in a series of tweets on Saturday, less than a week after the feature launched. full d...
Tags: Security, Startups, Twitter, Privacy, Spokesperson, Software, Computing, Operating Systems, Real Time Web, Microblogging, Text Messaging


The Trump Admin Is Refusing to Give Full Cybersecurity Support to Biden's Transition Team

President-elect Joe Biden’s transition team is using a “standard, paid Google workspace network” with only limited support from the federal government thanks to Donald Trump’s refusal to concede the 2020 elections and efforts to hobble the inbound Democratic administration, the Wall Street Journal reported on Friday.Read more...
Tags: Google, Security, Elections, Science, Technology, Joe Biden, Cybersecurity, Transition, General Services Administration, Biden, Donald Trump, Wall Street Journal, GSA, 2020 Election


Facebook patches a Messenger bug that allowed others to snoop on your calls

We often joke around that hackers or government agencies are listening to our calls. Facebook just patched a bug that would’ve allowed anyone to snoop on your calls on Messenger. The bug was found by Google Project Zero researcher Natalie Silvanovich last month, and it affected Messenger‘s Android users. To start the attack, the hacker would have to initiate a call and send a specially crafted invisible message. Then they could listen to your audio, even if you don’t pick up the call.  Thankfull...
Tags: Security, Startups, Facebook, Google Project Zero, Natalie Silvanovich


Pardon the Intrusion #31: Stop using “123456” as your password

Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we explore the wild world of security. And the yearly ritual continues. The list of worst passwords for 2020 is here, and it’s every bit awful as you would expect. According to an analysis of 275,699,516 passwords by NordPass, a password manager service from the makers of NordVPN, it’s becoming amply clear that a lot of people are still banking on simple, easy-t...
Tags: Security, Startups, Newsletter, Tech


FireEye acquires Respond Software for $186M, announces $400M investment

The security sector is ever frothy and acquisitive. Just last week Palo Alto Networks grabbed Expanse for $800 million. Today it was FireEye’s turn, snagging Respond Software, a company that helps customers investigate and understand security incidents, while reducing the need for highly trained (and scarce) security analysts. The deal has closed, according to the company. FireEye had its eye on Respond’s Analyst product, which it plans to fold into its Mandiant Solutions platform. Like many ...
Tags: Security, Fundings & Exits, Startups, TC, Enterprise, Tech, M&a, Machine Learning, Mergers and Acquisitions, Fireeye, Blackstone, Foundation Capital, Palo Alto Networks, Exit, CRV, Kevin Mandia


Facebook sues operator of Instagram clone sites

Facebook has today filed another lawsuit against a company acting in violations of its terms of service. In this case, the company has sued Ensar Sahinturk, a Turkish national who operated a network of Instagram clone sites, according to court filings. Facebook says Sahinturk used automation software to scrape Instagram users’ public profiles, photos and videos from over 100,000 accounts without permission, and this data was then published on his network of websites. In the filing, Facebook says...
Tags: Security, Social, Facebook, Apps, Instagram, Tech, Facebook Page, Cambridge Analytica, Ensar Sahinturk, Sahinturk, ENSAR


From fake contact tracing apps to attacks on vaccine makers, COVID-19 will define cyberattacks in 2021, experts say. Here's how businesses can prepare.

Steve Parsons/PA Images via Getty Images The ongoing COVID-19 pandemic will continue to pose unique threats and vulnerabilities for businesses fending off cyberattacks in the coming year, Kaspersky cybersecurity analysts predict. Cybercriminals have already started using sophisticated tactics to exploit fear surrounding the pandemic, including fake contact tracing apps that steal people's information.  Others have capitalized on the high-stakes nature of COVID-19 treatment, targeting vacc...
Tags: Security, UK, Enterprise, US, Trends, Tech, Cybersecurity, Hacks, Kaspersky, Emm, Steve Parsons, Yara, Microsoft Teams Slack, Costin Raiu, Raiu, Aaron Holmes


Google plans to test end-to-end encryption in Android messages

For the past year and a half, Google has been rolling out its next-generation messaging to Android users to replace the old, clunky, and insecure SMS text messaging. Now the company says that rollout is complete, and plans to bring end-to-end encryption to Android messages next year. Google’s Rich Communications Services is Android’s answer to Apple’s iMessage, and brings typing indicators, read receipts, and you’d expect from most messaging apps these days. In a blog post Thursday, Google...
Tags: Apple, Google, Android, Security, Apps, Imessage, Tech, Sms, Encryption, End-to-end Encryption, Software, Computing, Messages, Operating Systems, Google Allo, Google s Rich Communications Services


UK to invest in AI and cyber as part of major defense spending hike

The UK has announced a massive boost in defense spending — £16.5 billion ($21.8BN) over four years, the biggest such spending bump for 30 years — in what prime minister Boris Johnson has described as a “once in a generation modernization” of the UK’s armed forces and “the end of the era of retreat” on funding for defense. Overall the UK prime minister said the spending hike will create 40,000 jobs, adding that it will cement the country’s position as the biggest military defense spender in Europ...
Tags: Security, Europe, UK, Scotland, Russia, Defense, US, Tech, Artificial Intelligence, Britain, Military, Drones, Labour, Nato, House Of Commons, Boris Johnson


4 COVID-era trends impacting the business process outsourcing industry

Everise The business process outsourcing (BPO) industry has been hit hard by the COVID-19 pandemic, seeing a double digit decline in managed services in the second quarter of this year, with total global spending down by 16%.  Yet like many industries, the pandemic has accelerated digital transformation in the BPO industry allowing digitally-focused companies like Everise to expand their services to support remote workers. Because of his work, Business Insider named Sudhir A...
Tags: Security, Work From Home, Asia, Enterprise, America, Trends, Research, Cisco, Deloitte, Sudhir, Technavio, BPO, Sudhir Agarwal, Edit Series, TB2020, SP-ING-WB-2020


How to Stop a Zoombombing

The dreaded “Zoombombing” is a risk for all Zoom meetings, even private rooms secured with a passcode and data encryption. All it takes is for the invite to wind up in the wrong hands, and suddenly you have someone screaming randomly in your work meeting—or worse.Read more...
Tags: Security, Work From Home, Lifehacks, Video Chat, Zoom, Zoombombing


Build.security raises $6M for its authorization policy management platform

Build.security, a Tel Aviv and Sunnyvale-based startup that aims to make it easier for developers to bake authorization policy management right into their applications, today announced a $6 million seed funding round led by cybersecurity-centric firm YL Ventures. CrowdStrike CEO and co-founder George Kurtz also participated in this round, in addition to former Zscaler CISO Michael Sutton, former Bank of America Chief Security Scientist Sounil Yu, Fireglass co-founder Dan Amiga, Cynet CEO and co-...
Tags: Security, Startups, TC, Tel Aviv, Tech, Bank Of America, Intel, Computing, John Brennan, Cyberwarfare, Cto, Data Security, Computer Security, SUNNYVALE, Amit, YL Ventures


Oh God, the Worst Passwords of 2020 Are Here and They're Horrifying

We’re still doing this, huh?Read more...
Tags: Security, Science, Passwords, Data Privacy, Consumer Tech, 2FA, NordPass


Firefox's Latest Update Promises Safer, More Secure Browsing

The latest Firefox update is finally here, and comes packaged with a new feature that tries to make browsing a bit less scary. Read more...
Tags: Firefox, Security, Science, Https


Microsoft’s ‘Pluton’ could bring Xbox protections to PC CPUs

Microsoft teamed up with Intel, AMD, and Qualcomm to work on a new security chip. Code-named Pluton, the chip helps thwart exploits like Spectre and Meltdown.
Tags: Security, News, Microsoft, Trends, Intel, Computing, Amd, Qualcomm, TPM, Intel AMD


Turn Off Gmail's 'Smart' Features to Avoid Tracking

Google collects data on everything you do while using its products and services. Sometimes this data is sold to advertisers; sometimes it’s used to make it easier to use Google’s products. Read more...
Tags: Google, Security, Gmail, Lifehacks, Data Privacy


Microsoft reveals Pluton, a custom security chip built into Intel, AMD, and Qualcomm processors

For the past two years, some of the world’s biggest chip makers have battled a series of hardware flaws, like Meltdown and Spectre, which made it possible — though not easy — to pluck passwords and other sensitive secrets directly from their processors. The chip makers rolled out patches, but required the companies to rethink how they approach chip security. Now, Microsoft thinks it has the answer with its new security chip, which it calls Pluton. The chip, announced today, is the brainchild ...
Tags: Apple, Security, Hardware, Microsoft, Tech, Macintosh, Computing, Windows 10, Qualcomm, Operating System, Microsoft Windows, Operating Systems, Weston, Microsoft Microsoft, Intel AMD, Advanced Micro Devices


Apple's Ad Practices Are The Latest Target For Privacy Activists

After making a name for himself going after Facebook’s and Google’s data practices, Austrian lawyer Max Schrems—and his advocacy group Noyb—is setting his sights on a new tech giant. According to two separate complaints his group filed with regulatory bodies based in Germany and Spain, the advertising tech that comes…Read more...
Tags: Apple, Google, Security, Facebook, Science, Privacy, Germany, Advertising, Spain, Max Schrems, Identifiers


Bumble Left Daters' Location Data Up For Grabs For Over Six Months

Bumble, the dating app behemoth that’s allegedly headed to a major IPO as soon as next year, apparently took over half a year to deal with major security flaws that left sensitive information its millions of users vulnerable.Read more...
Tags: Security, Science, Privacy, Dating Apps, Bumble, APIs, Vulnerabilities, Oopsies