For as ubiquitous as connectivity has become and how reliant we've grown on it, the internet is still a digital jungle where hackers easily steal sensitive information from the ill-equipped and where the iron-fisted tactics of totalitarian regimes bent on controlling what their subjects can access are common. So instead of mucking around in public networks, just avoid them. Use a VPN instead.
Tagged With security centre
Remember when Anonymous threatened to destroy the entire internet? We laughed and ultimately their words were just hacker hubris. But it got us thinking — could someone actually destroy the internet?
The bug that allowed fake chargers to hack your iPhone has finally been fixed by Apple. Good! But you won't get the software fix until iOS 7. Apple was alerted of the security hole earlier this year and the hack was demonstrated at the Black Hat hacking convention on Wednesday.
The connected house you can control from the internet or your smartphone? They might be called a smart homes, but some of them have some very dumb vulnerabilities. In fact, some of the houses made smart by a company called Insteon were insecure enough that a Forbes reporter could hack them from the comfort of her living room.
Skype has long claimed to be "end-to-end encrypted", an architectural category that suggests conversations over the service would be difficult or impossible to eavesdrop upon, even given control of users' internet connections. But Skype's 2005 independent security review admits a caveat to this protection: "defeat of the security mechanisms at the Skype Central Server" could facilitate a "man-in-the-middle attack" (see section 3.4.1).
In the past several weeks, EFF has received many requests for advice about privacy tools that provide technological shields against mass surveillance. We've been interested for many years in software tools that help people protect their own privacy; we've defended your right to develop and use cryptographic software, we've supported the development of the Tor software and written privacy software of our own. This article looks at some of the available tools to blunt the effects of mass surveillance.
North Korea tried and failed to hide behind the undisputed superstars of the hacker community last month when South Korea got hit by a large scale cyberattack. According to South Korea, Kim Jong Un and company worked hard to cover its tracks by hiding the IP addresses of computers used in the attacks and later destroying their hard drives. And when they got caught, they did what any dictatorial wasteland would: blame Anonymous.
Graph Search is Facebook's bold new way of browsing the social network, letting you call up photos of your family in California, restaurants your friends like in New York, or any public updates from Gizmodo employees who also like hot air ballooning. It's been available the last several months in beta, but today it starts rolling out to Facebook at large. And in the wrong hands, it can be the ultimate stalker search engine.
Despite the fact that the US government seems more enthusiastic than ever about gathering data, its taste for making it classified seems to be waning. This year’s Information Security Oversight Office report reveals that the total number of "original classification" decisions fell over 40 per cent in 2012.