Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting users to fake websites that masquerade as genuine trusted sites. From there, they send the users more ads than they’d usually see while online, potentially steal their personal information, and perform other malicious tasks. To help users discover whether their home routers have been taken over by skilled attackers, F-Secure has come up with a simple online tool called Router Checker that lets anyone secure their home network with just one click.
The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the NSA and the GCHQ, have revealed that various U.S. tech companies might also be involved, whether willingly or unwillingly, in some NSA programs. The implications of the leaks detailing the Prism data collection program – that says the NSA has access to personal customer data from various U.S. companies including Apple, Facebook, Skype, Microsoft and Yahoo – might be far greater than initially believed, as they could affect the U.S.-EU Safe Harbor Framework for transatlantic data transfer and connected trade deals.
Given the myriad of security mechanisms and technologies tech companies have developed, it's easy to fall into a sense of complacency and think that what you're doing is safe from prying eyes.
Truth be told, if skilled attackers really want to see what you're up to online, there's not really much you can do to stop them.
Case in point: Last week at the annual Pwn2Own hacking competition, all 4 major browsers were exploited.Safari, Firefox, IE, Google Chrome -- none of these browsers can provide safe refuge from hackers.
If you're frustrated that your smartphone locks while it's still in your hands, Google may soon come to your rescue. A handful of Android Police readers report that their Lollipop-equipped phones' Smart Lock security now includes "on-body detection," a motion-sensitive feature that keeps your Android device unlocked so long as it's either in-hand or in your pocket. This isn't completely secure (a pickpocket could have a field day), but you don't have to worry about someone snooping on your personal info just because you left your handset on the table for a hot minute. Just when you'll get this option isn't certain, though. Google is slowly rolling out body detection to users through Google Play Services, not software updates, so you might not know it's available until you dig through the settings at the right time.
Photo by Will Lipman.
Source: Android Police
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they're also not afraid to employ more straightforward and simpler spycraft methods when it comes to keeping an eye on enemies of the state.
Thursday, Apple issued a new security update for Mac users running OS X Yosemite 10.10.2. The update, titled ‘Security Update 2015-003 1.0,’ is available right now through the Updates tab of the Mac App Store and is recommended for all users as it improves the security of OS X.
If you’re running a public beta of OS X Yosemite 10.10.3, you won’t see this update because the stable OS X Yosemite 10.10.3 release is bound to include contents of today’s security update.... Read the rest of this post here
"New security update is available for OS X Yosemite 10.10.2 users" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.
Mobile malware is bad enough by itself, but it's a nightmare at work -- one infection could put everyone's phones at risk, if not the whole business. IBM has a fix, though. A new version of its MobileFirst Protect tool now automatically looks for virus-ridden Android and iOS apps on staffers' phones, and puts any compromised device on lockdown before it can pose a threat to you or anyone else. It immediately limits access to apps and services, and it'll let your IT staff know if there's trouble. The system automatically updates its malware knowledge, too, so it shouldn't be caught off-guard by recently discovered exploits. Yes, IBM's threat tool another form of corporate oversight, but it could prove a lifesaver if it prevents a careless coworker from wrecking your personal phone.
[Image credit: IBM, Flickr]
A new device is causing commotion around the interwebs today, that has the ability to unlock PIN-protected iOS devices. The tool, first spotlighted by security firm MDSec, is being used in the phone repair markets to brute-force iPhone and iPad Lock screens.
According to MDSec, these ‘IP Boxes’ are about the size of an Apple TV, and you can acquire one for around $300. It works by simulating the PIN entry on a device over a USB connection, and is able to sequentially bruteforce every possible PIN combination.... Read the rest of this post here
"New ‘IP Box’ tool unlocks iPhone PINs via brute force attacks" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.
A new spy tool that's being referred to as StingRay or KingFish is a sophisticated cell phone spying and tracking tool that's so secret that it requires law enforcement agencies to sign non-disclosure agreements before buying one. Equally disturbing is its price: The New York Times reports that one device costs $502,000, followed by $42,000 in yearly charges. All this money and police aren't even allowed to explain to taxpayers why they need to spend so much on technology that can potentially infringe upon their privacy even when used for legitimate purposes.
Android 5.1 has been available to Nexus devices for a little while now, and it looks like one of its neatest features - sorry HD Voice and Device Protection - isn't quite ready for public consumption yet. Thanks to a little bit of sleuthing by Pocketables editor-in-chief John Freml, it looks like you'll eventually be able to log into a Google VPN when you connect to one of those potentially sketchy open WiFI networks out there.
Filed under: Mobile