The digital privacy of Australians ends from Tuesday, October 13.
Source : Data retention and the end of Australians’ digital privacy
The digital privacy of Australians ends from Tuesday, October 13.
Source : Data retention and the end of Australians’ digital privacy
Last week, T-Mobile revealed that hackers had stolen records for “approximately” 15 million people. How approximate? If history is any guide, very approximate.
Source : Never trust the first number announced in a data breach – Quartz
La croyance partagée que toutes les installations nucléaires sont isolées de l’Internet public est un mythe
Source : Les risques de cyberattaques contre les centrales nucléaires se multiplient
If you used the World Wide Web anytime after 2007, the United Kingdom’s Government Communications Headquarters (GCHQ) has probably spied on you.
Source : GCHQ tried to track Web visits of “every visible user on Internet” | Ars Technica
The protections that Tor offers can be attractive to criminal enterprises or actors and HSI [Homeland Security Investigations] will continue to pursue those individuals who seek to use the anonymizing technology to further their illicit activity.
Source : First library to support anonymous Internet browsing effort stops after DHS e-mail | Ars Technica
We’re reminded of this sad truism every time there’s a major leak—like the 2012 dump of passwords belonging to LinkedIn users, for example. Now researchers who have cracked more than 11 million Ashley Madison passwords have released the top 100 choices users of that site picked. It won’t come as a shock to hear that the passcodes are no better.
Source : Top 100 list shows Ashley Madison passwords are just as weak as all the rest | Ars Technica
When ads and security clash, Google wants to figure out a compromise, because Google is an advertising company.
Source : Google Tips Off Developers On Apple Security Workaround, Ad Selling | Re/code
I think GCHQ was doing half theater and half genuine threat response here. The likelihood that The Guardian had anything hidden in the trackpad was low, but from GCHQ’s perspective they’d hide something in the trackpad so why wouldn’t anyone else?
Source : The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than They Intended
Experts say there’s either a doorway in or there isn’t. And if there is, lots of other people, including criminals, can use it too.
Source : The Many Things Wrong With the Anti-Encryption Op-Ed in the New York Times
The “BeNews” app is a backdoor app that uses the name of defunct news site “BeNews” to appear legitimate. We found the backdoor’s source code in the leak, including a document that teaches customers how to use it. Based on these, we believe that the Hacking Team provided the app to customers to be used as a lure to download RCSAndroid malware on a target’s Android device.
Source : Fake News App in Hacking Team Dump Designed to Bypass Google Play
© 2025 no-Flux
Theme by Anders Noren — Up ↑