Les adresses e-mail des comptes LastPass, les indices de mots de passe, le salage , et le hachage d’authentification ont été compromis.
Étiquette : security (Page 20 of 21)
In an unusual twist on biometrics research, US computer scientists have joined with law-enforcement officials to find new ways to automatically detect tattoos on people in photographs.
Source : Image software spots links in tattoo ink : Nature News & Comment
A major union says the cyber theft of employee information is more damaging than it first appeared, asserting that hackers stole personnel data and Social Security numbers for 4 million current and former federal workers .
Source : News from The Associated Press
The Obama administration on Thursday announced what appeared to be one of the largest breaches of federal employees’ data, involving at least four million current and former government workers in an intrusion that officials said apparently originated in China.
Source : Data Breach Linked to China Exposes Millions of U.S. Workers – NYTimes.com
The technology so often outstrips whatever rules and structures and standards have been put in place, which means that government has to be constantly self-critical and we have to be able to have an open debate about it.
Source : New Snowden documents reveal secret memos expanding spying | Ars Technica
Le Freedom Act ne changera strictement rien à la surveillance pratiquée par la NSA à l’étranger avec l’aide de ses partenaires anglais, australiens, néo-zélandais et canadiens.
Source : Le Sénat américain adopte une réforme symbolique des pouvoirs de la NSA
If you put a key under the mat for the cops, a burglar can find it, too.
Source : Apple’s Tim Cook Delivers Blistering Speech On Encryption, Privacy | TechCrunch
Certaines personnes s’inquiètent de l’utilisation possible de la norme NFC à des fins de géorepérage des déplacements des clients dans les rayonnages des magasins et d’analyse de leurs comportements d’achat.
Google’s Project Abacus is attempting to kill the password and replace it with human interaction. The premise is simple: each of us has a unique usage pattern, from the way we hold and move a device to our typing cadence and touch patterns on a keyboard.
It’s time for America to lead the world toward a more secure future rather than a digital ecosystem riddled with vulnerabilities of our own making.
Source : Tech giants don’t want Obama to give police access to encrypted phone data – The Washington Post
