Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
Facebook turned on a key security feature by default on Wednesday that scrambles data sent by users to the company's servers, following similar moves in recent years by Web services such as Google and Twitter. Two years ago, the social ...
Tags: Facebook, Secure Browsing
Google has announced the company is in the process of migrating its SSL [Secure Sockets Layer] certificates from 1024-bit to 2048-bit levels of encryption. Google Identity Team's Tim Bray describes the decision as "part of our continuous ...
Tags: SSL Certificates, google
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
A talk promising to reveal security shortcomings of modern cars’ electronic network systems will be presented at the DefCon 21 hacking conference in Las Vegas next month. To be presented by Twitter security engineer Charlie Miller ...
Tags: Car Security
Yahoo has won a court ruling that allows the release of records that show how the web firm fought against demands to hand over data under Prism, when the web monitoring system was first established in 2008. A court ruled that the United ...
Tags: Yahoo, Computer Products
High-growth countries are usually exhibited by a low per capita income. The upside, though, is that such countries, usually emerging countries, are able to do more with fewer resources. Dr Gilbert Saggia, Oracle Country Manager for Kenya, ...
Tags: Computer Products
OKI Malaysia has introduced new printers based on digital LED print technology to strengthen its A4 mono workgroup offerings targeted at medium to large enterprises. The new models are the B721dn and B731dn, both of which are monochrome, ...
Mobile Helix, the enterprise application and data security platform provider, has launched Link, which it describes as the industry’s first pure HTML5 platform. Link unlocks enterprise productivity by combining unparalleled security ...
Tags: Mobile Helix, Link, HTML5 Platform
Web content filtering company Netsweeper has supplied its products to Pakistan, even as some top IT companies have refused to supply gear for a controversial filtering project, a Canadian research group has disclosed. The new report ...
Tags: Netsweeper, Internet Content, Pakistan
AT&T and NEC Corporation of America today announced Friday's launch of the ultimate workhorse among ruggedized 4G LTE smartphones, the NEC Terrain™. The NEC Terrain is equipped with AT&T Enhanced Push-to-Talk (EPTT), and it ...
Tags: AT&T, NEC, Smartphone
Apple has revealed that it received 5,000 US government requests for customer data between 1 December 2012 and 31 May 2013, making it one of the most scrutinised tech companies by the NSA-run surveillance group last week revealed to be ...
Tags: Apple, Data Request, US Government
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance