Data Security: Hot Stories

Search Result for Privacy in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Privacy in All Fields - Top 20 Stories
Facebook Confirms Hackers Steal Data of Millions of Users
Facebook said that 50 million users were affected in recent hacking at first time, but now shrink to 30 million as the final number. Is it a good news? I don't think so. The positive point is Facebook has now confirmed that actually over 29 million users were in hackers' hands. What we can is to expect Facebook, the great company can do right things to protect our privacy, if our data aren't in that 30 millions in luck. There is a list showing what your information may be stolen...
By Anmol  View Source  
Staffer Accused of Sneaking Into Computers of Senator Office
A Democratic staffer was accused to enter Republican senators' office and tried to use one of their computers, police said in an affidavit made public Thursday. This guy stands accused of a number of federal and local crimes for posted personal information of senators, like addresses and telephone, to their Wikipedia pages over the last couple of weeks. This privacy leak wasn't done high technology hackers, but a junior staff. A simper password or screen protection may stop the leaking...
By Stephen Dinan  View Source  
UK Conservative Party conference App Leaks MP Personal Details
Some phone numbers and email addresses for high-profile British MPs were shared on Twitter, and a few of them even received prank calls and messages. This data lead was due to a mobile conferencing app for the UK's Conservative Party. When things is related to security, you must get qualified guys to do, otherwise you take a risk of privacy sharing on Twitter or Facebook, especially your privacy is interesting in public...
By Catalin Cimpanu  View Source  
White House Confirmed Attack On Office of Personnel Management
White House confirmed this week that China carried out the cyber attack on the OPM (Office of Personnel Management) and risk more than 22 million sensitive records on American government officials. Bolton disclosed the Chinese hacking in unveiling the Trump's new cyber strategy, which focuses on security efforts to a aggressive stance against cyber attacks. China has been the most aggressive part in cyber espionage and is also the main source to hack personal privacy...
By Bill Gertz  View Source  
US State Department Reveals Data Breach Employee Information Exposed
Trump once said he wrote important things on papers. He seems distrust modern information technology to protect privacy. The new accident in the US State Department, which has confirmed a data breach through its email system, lets the president win again. The latest new revealed that a compromised email system leaked, and 1% employees' personally identifiable information(PII) have been exposed. Because, these are sort of personal data, the security notice was marked "Sensitive but Unclassified." The hacker may want to get more ...
By Charlie Osborne  View Source  
Two Hackers Have Found How to Break into Hotel-Room Locks
When you read a story talking about security vulnerability that may risk millions of hotel rooms, never think it's just a story. Your and your family's privacy may leak from these rooms if only you have chance to stop hotels. A ridiculous case was as early as 2003, 15 years ago, an guy in a a hacking conference in Berlin found his laptop was stolen and there was no evidence of force entry. Yes, his room's keycard-operated lock got hacked. As a matter of fact, hacker are much stronger than that age, no hotel room is safe now...
By Gulliver  View Source  
Artificial Intelligence is Helping Bosses Spy You
You may not read every word of your employment contact before signing. At AI era, the file probably includes new articles related to your privacy. When you get the job, it means you consents to sort of surveillance by modern IT or AI technology. For example, Amazon has patented a wristband that tracks the hand movements of workers; Workday, a software firm, crunches around 60 factors to predict which employees will leave. Your boss can know you more than yourself...
By The Economist  View Source  
Apple and FBI Agree to End Encryption Battle
Two years after the FBI failed to let Apple hack into a phone used by one of the San Bernardino murders. Apple has been highlighted for protecting customers' privacy, even if the customer killed dozen of Americans and FBI needs more clues to safe innocent man and woman. Is this dispute really an issue about customers' privacy? Since 2018 Feb, Apple moves all iCloud data of Chinese customers to China. It refused FBI to hunt terrorists but leave a backdoor for Chinese Government. It's not to keep privacy but trade privacy...
By Elizabeth Weise  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
The Most Secure VPNs of 2018: Top Picks for the best encryption
Honestly, I usually suggest to be cautious before installing some information security products. But VPN seems an exception, especially if you have to travel abroad and visit countries like China or North Korea. VPN security and encryption is a rather tricky business different other security issues: the fundamental purpose of a VPN is to increase your online security and privacy by sending your data through an encrypted tunnel. If you cannot trust your network, VPN is the only solution...
By Desire Athow  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Uber Pays $100,000 to Hacker for 57M Accounts Leak
Uber is facing a moment of truth. It needs to clean up its act. This company have our address and credit card information, and even details of travel history. It admitted a serious data leak was hidden: hackers breached and gained access to 57 million user accounts. What the Uber did is to pay $100,000 to hackers to delete the data. None argue it's deal with criminals. Does Uber really think customers' privacy is a small trade with hackers? They trusts hackers, but we have different opinion...
By Jake Novak  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
Computer Anti-Virus Scam Cost 2 Durham Region Guys More Than $32k
You buy anti-virus software to protect privacy, but the result is your losing lots of money. Police are warning about a computer scam after two Durham Region residents lost more than $32,000. The scammer called victims to sell them software protection. After a few months the deal done, they called back saying there was an issue with the software, and that the purchase price will be returned to the victim’s bank account...
By National Post  View Source  
Yahoo: All 3 Billion Accounts Breached in 2013
The secret is finally uncovered by Yahoo itself: its entire user base of 3 billion accounts was compromised by an August 2013 data breach. Back to that year and that moment, Yahoo said another tone: 1 billions accounts may be impacted. Although it's a large number, as a user of Yahoo, you and me, possibly think we aren't in the victim group. Now the truth isn't just triple the initial report, but the entire user base were compromised! So who do we trust to protect our privacy? The IT giant, or ourselves?
By Jeremy Kirk  View Source  
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
China Government Use its Own Encryption in Windows 10
MS announced a news that hardly impacts global OS market but may change some people's fates in future. It will allow China's government to use own encryption in Window 10. This is a horrible start. Right now there is no detail to disclose, for example, how China replaces the original encryption with own version and if the rule will apply to all computers sold in China. The deal may solve some security concerns of China government, but is raising privacy threat on other side. Where to buy computer possibly will become a new question...
By Brad Sams  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source