By
Rob ScottOctober 6, 2014
In an era of system hacks becoming more common, JP Morgan is the latest to report a massive breach of customer information. While the company believed a few weeks ago that only one million accounts were affected, it now reports that 76 million households and 8 million small businesses were part of the data breach. While recent breaches have largely involved retailers, some analysts are more concerned about the JP Morgan case, especially since banks tend to have more sensitive data about their customers. Continue reading Why Analysts Are Concerned About the JP Morgan Data Breach
By
Rob ScottOctober 1, 2014
Last week we reported that a bug called “Shellshock” had been identified as a potentially dangerous security flaw in the Bash software that appears in more than 70 percent of devices connected to the Internet. While initial reports have suggested that Linux and OS X systems are anticipated to be particularly vulnerable, Apple released a statement claiming that there is no need to panic. “The vast majority of OS X users are not at risk to recently reported Bash vulnerabilities,” said Apple. Continue reading Apple Claims that Most OS X Users Are Safe from Shellshock
By
Rob ScottSeptember 30, 2014
Apple introduced security measures in the wake of high-profile celebrity images being hacked from personal iCloud accounts. Apple now alerts users when their iCloud data is downloaded to a new device, and the company has added a two-factor authentication option. Users of anonymous image board Anon-IB, one of the forums hackers used for stealing and sharing photos, are reportedly angry. They are complaining that the leaked celebrity images have exposed their secret hacking techniques. Continue reading Apple is Taking Steps to Protect iCloud Users from Hackers
By
Rob ScottSeptember 26, 2014
In 1987, programmer Brian J. Fox wrote one of the Internet’s most widely used tools. The software is named “Bash” (short for Bourne-Again Shell) and now appears in more than 70 percent of devices connected to the Internet, including computers, routers, servers and some mobile phones. Yesterday, security experts warned that Bash contains a software bug called “Shellshock” that could potentially be used to take over hundreds of millions of machines, including Mac computers and smartphones that run Android. Continue reading Security Experts Warn of Potentially Dangerous Shellshock Bug
By
Meghan CoyleSeptember 10, 2014
Home Depot has confirmed that hackers have breached its store payments system and may have stolen up to 60 million credit card numbers. The breach could affect customers who paid with a credit or debit card at any of the 2,157 stores in the U.S. and Canada between April and September. This latest hacking incident has led retailers to speed up the installation of chip-reading credit card terminals at their stores. Credit card companies are also adding security to their cards. Continue reading Recent Home Depot Hack Prompts Retailers to Upgrade Security
By
Meghan CoyleSeptember 8, 2014
Apple CEO Tim Cook confirmed that the hackers responsible for recently leaking nude photos of celebrities were able to break into the celebrities’ iCloud accounts. The company plans to add additional security alerts to help prevent future security breaches. In the next two weeks, Apple users will start receiving notifications when someone tries to change an account password, restore iCloud data to a new device, or when a new device logs onto the account for the first time. Continue reading Apple to Add Security Alerts Following Celebrity Photo Leaks
By
Meghan CoyleAugust 18, 2014
Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users
By
Meghan CoyleAugust 13, 2014
The National Security Agency is funding a project at Carnegie Mellon University to develop the world’s first “polyglot” programming language that combines CSS, JavaScript, PHP, HTML5, and more. Wyvern, the new language, intends to make Web programming easier. Files will be more organized, making it easier for Web developers to secure their websites, which seems to be the NSA’s primary goal. Wyvern is an open source project still in development. Continue reading NSA Funds Development of All-In-One Programming Language
By
Meghan CoyleAugust 11, 2014
Last week, Yahoo joined Google and Microsoft in the effort to bring more privacy to users of their popular email services. The 110 million unique Yahoo email users will have the option to turn on an encrypted messaging feature. The feature relies on PGP encryption, which stores each user’s encryption key on their personal laptops and devices. Google also announced that encrypted websites will fare better in their search results due to a new feature in its ranking algorithm. Continue reading Tech Giants Tighten Security on Emails with Encryption Option
By
Meghan CoyleAugust 7, 2014
Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack
By
Meghan CoyleMay 13, 2014
The Federal Trade Commission recently charged Snapchat of deceiving users about the privacy of their personal data and their image and video messages. Under the terms of a new settlement with the FTC, Snapchat will be required to implement a privacy program that will be independently monitored for the next 20 years. If Snapchat violates the agreement, the company may be subject to fines. Snapchat has reportedly resolved most of the privacy issues over the past year. Continue reading Snapchat Agrees to Settle with FTC Over Deceptive Marketing
By
Meghan CoyleMay 7, 2014
Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches. Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats
By
Meghan CoyleMay 5, 2014
At Facebook’s F8 developer conference in San Francisco, CEO Mark Zuckerberg unveiled Facebook’s newest projects that emphasize app development for third parties. The company’s motto “move fast and break things” has become less relevant as Facebook grows and third party apps rely increasingly on Facebook databases. The new ad network and app development tools will make it easier for third party app developers to create apps with Facebook functions. Continue reading F8: Facebook Introduces Ad Network, App Tools and New Motto
By
Chris CastanedaOctober 4, 2013
Blippex is a newcomer search engine that is essentially built by its users. The site takes users’ submissions in order to provide the data for search results. Its results are different from other popular search engines as it is anonymous and does not identify users. In contrast, Google’s search is not anonymous as its business is based on advertising, with much of it personal and targeted to the user. Blippex will have to prove it can rival the competition. Continue reading Blippex Hopes to Challenge Google with New Search Approach
By
Rob ScottApril 25, 2013
Google has joined a consortium of technology companies that plans to make online accounts more secure. The FIDO Alliance, which was founded in part by Lenovo and PayPal, launched a set of technology standards earlier in the year that could reduce reliance on passwords. The group hopes hardware can have more of a role in authenticating users, and has been working on different ideas such as security chips and voice recognition. Continue reading Google Joins FIDO Alliance: Hopes to Replace Passwords