Tag: security

  • Android botnet hijacking SMS data

    FireEye reports on a mobile botnet called MisoSMS that is stealing SMS data from Android phones. MisoSMS infects Android systems by deploying a class of malicious Android apps. The mobile malware masquerades as an Android settings app used for administrative tasks. When executed, it secretly steals the user’s personal SMS messages and emails them to…

  • Data hijacked through massive security hole in the internet

    WIRED.com reports that data was hijacked through a security vulnerability in the traffic-routing system. In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system — a vulnerability so severe that it could allow intelligence agencies, corporate spies or criminals to intercept massive amounts of…

  • FaceCrypt uses facial recognition to encrypt your data

    PetaPixel writes about FaceCrypt, an iOS app that locks your encrypted data using a selfie. Instead of using your standard password, all of your info — be it passwords, photos, credit card numbers, passport data or that note reminding you where you hid the kids Christmas presents — is locked inside of a vault that…

  • US stolen smartphone database complete

    The Verge reports on the completion of the US database that blocks activation of stolen phones. Though most smartphones already offer tools to let you locate lost phones, only Apple has managed to offer a feature which satisfies SF and NYC prosecutors’ desire to deter theft. The Activation Lock feature of iOS 7 can not…

  • Nexus phones vulnerable to SMS attack

    It’s a little surprising that this attack seems to only work on Nexus devices, since phone manufacturers should theoretically be taking similar stock ROMs that the Nexus devices use and customize it from there. Of course, this attack has not been tested on all the major phones out there yet, so it’s possible that it…

  • Blunderbusiness Class DIY gun from parts purchased at airport

    Most of us have had stuff confiscated by TSA agents before in the name of security. While it’s understandable that we don’t want a plane to blow up in the middle of the skies, the fact that folks are also able to build DIY guns based on stuff purchased after passing through security also shows…

  • NSA infected over 50,000 networks worldwide

    The NSA isn’t exactly at the top of everybody’s Christmas list at the moment, and it doesn’t look like the situation is getting any better. Considering the recent leaks, it’s honestly not surprising that the the agency has infected as many as 50,000 networks, but it’s still a very disturbing thought. NSA Has 50,000 ‘Digital…

  • Message encryption coming to Office 365 in early 2014

    While there is still a lot of concern over the NSA having access to data from large technology companies, one of the best tools for end users to protect their privacy would be proper encryption. Offering message encryption on Office 365 is a good step in that direction. Microsoft Bringing Message Encryption To Office 365…

  • Twitter boosts security with forward secrecy

    The battle for privacy continues. Forward Secrecy at Twitter On top of the usual confidentiality and integrity properties of HTTPS, forward secrecy adds a new property. If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys…

  • Your typing pattern can be used to identify you

    SC Magazine reports that researchers have developed a way to identify users based on the way they type. A series of 90 minute typing tests carried out on 2000 people at Iowa State University found users could be identified with a half percent margin of error based on the way they hit keys. The work…