Our Network

Tag Archives | Security

This ruling may convince retailers like Target to take data breaches more seriously

The data breach said to have affected 110 million consumers who shopped at Target in the tail-end of 2013 might become even more expensive for the beleaguered retailer. According to Reuters, a judge says consumers whose credit cards were compromised via the breach will be allowed to sue the company because the plaintiffs “plausibly allege that they [...]

Continue Reading

SOPA lives? MPAA looks to revive parts of the controversial bill to fight piracy

The Motion Pictures Association of America wants to implement some aspects of the controversial Stop Online Piracy Act of 2011, and it’s enlisting the help of state-level lawmakers to do so, according to numerous reports about the association’s efforts. Internet advocates fought SOPA aggressively when it was revealed in 2011. Websites like Reddit, Wikipedia, and [...]

Continue Reading

The Islamic State joins North Korea as a surprising suspect in a cyberattack

A new report from Citizen Lab claims the so-called Islamic State could be responsible for a cyber attack meant to reveal the location of members of the “Raqqah is being Slaughtered Silently” (RSS) advocacy group for reporting on the Islamic State’s human rights violations in occupied Syria. “Though we are unable to conclusively attribute the attack to ISIS or [...]

Continue Reading

A popular phone-breaking tool has been updated to bypass iCloud’s heightened security measures

A tool used by law enforcement to gain access to Apple’s iCloud service has been updated to bypass the two-factor authentication feature, which requires a randomly-generated code in addition to a user’s normal password. Apple introduced this feature after iCloud was hacked in August. The tool only works if law enforcement — or a hacker [...]

Continue Reading

The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP

Setting up encryption on your wireless router is one of the most important things you can do for your network security , but your router probably offers various different options—WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) among the alphabet soup. How-To Geek explains which one to choose for a faster, more secure home network. Read [...]

Continue Reading

Google opens an experimental end-to-end encryption tool up to scrutiny

Google has moved End-To-End, an experimental tool meant to bring end-to-end encryption to the company’s Gmail service, over to GitHub so it can be scrutinized by independent groups. End-To-End is part of Google’s efforts to improve its image after it was implicated in the global surveillance programs revealed over the last year-and-a-half. It was one [...]

Continue Reading

A small win against law enforcement’s perpetual surveillance machine

A police department in Washington state trained a webcam on a target’s house for six weeks. The device recorded the home all day, every day, and its feed was backed up to an external hard drive. Police eventually saw the target firing a gun for target practice, and because he was suspected of living in the United States illegally, [...]

Continue Reading

POODLE, a bug that could affect 10 percent of all websites, is back

POODLE is coming back for more. The bug, which was originally thought to affect only older versions of the Secure Sockets Layer (SSL) protocol used to encrypt information as it travels around the Internet, is now known to affect the Transport Layers Security (TSL) protocol, too. Or put another way, without all the gobbledygook: a [...]

Continue Reading

How the app industry’s reliance on mobile ad networks makes us all less secure

Antivirus software company Avast has published a blog post warning consumers about mobile advertising networks that trick people into downloading malware which then steals a few dollars each month. This is accomplished via text messages giving 25 cents to the malware’s creator a few times each week, and while that isn’t much for most people, [...]

Continue Reading

Sony Execs Knew About Extensive IT Flaws Two Months Before Leaks

Earlier this year, Sony Pictures released one hell of an internal IT assessment. The report showed that not only was the company ignoring basic security protocol , its IT security was plagued with unmonitored devices, miscommunication, and a lack of accountability. It’s dated Sept 25th, almost two months to the day before hackers exposed thousands [...]

Continue Reading

Designed by OhhWord Media