When parents post photographs and information about their children to social media, what are the privacy implications for those children when they’re grown? What happens on the internet tends to stay on the internet, and not necessarily in a good way.
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android malware, monitoring all apps on Android devices for suspicious behavior, according to PC World.
The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on public confidence in technology companies in America, such as Internet service providers and software companies, according to a Harris poll commissioned by ESET. The poll found that two-thirds of adult Americans who said
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.
A new technique for spotting cyber attacks has been designed by a young American student – and could prevent attacks against planes and power plants, by looking for abnormal communications within computers, rather than sifting for malicious software.
Samsung is the most popular brand of smartphone among a large portion of the adult population – adulterers, with the Korean handsets chosen by more than half of those conducting secret affairs.
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from the sky, causing head injuries. The competitor, Raija Ogden was treated by paramedics at the scene after the UAV (Unmanned Aerial Vehicle) suddenly plunged from the sky, hitting her on the head. The
Armed with an impressive-looking shield logo, security app Virus Shield shot to the top of the sales charts on Android last week. There was one, tiny, problem: the app was a fake.
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge” – and one-fifth had found “incriminating” posts which they confronted children about.
Most five year olds can write their own name – but few have a job title to put after it. A young Xbox fan has joined an elite group of official Microsoft “security researchers” after he exposed a security flaw on Xbox’s Live Service.
It’s one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment – but it’s quite a different level of threat when simply *previewing* a message in your email client infects your computer.
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.
Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and even murder.
Malware written specifically for DVR recorders used for the output of surveillance cameras has forced some machines to mine Bitcoin – although the low-powered machines are ‘very bad’ miners, Wired points out.