Analysis, Companies, Google, VR World

Google Announces Improved Gmail Security Warnings

Google Gmail logo

The security of personal information & data is all the hype lately. This was a highly debated subject after the Apple iPhone access requested by the FBI following a recent terrorist attack that was declined by the company completely. Now, Google announced improved Gmail security warnings. One of the most prominent issues is the warning that is issued to accounts when is believed they’ve been targeted by state-sponsored attackers. This comes as a controversial measure. One, that we’re sure will raise a lot of attention in the world of security and data theft. It will also prove crucial to see how will Google react to potential data access to those

Read More...

Analysis, Apple, Business, Companies, Microsoft, News, VR World

Bill Gates sides with FBI on Apple encryption fight?

Apple Net Neutrality

The situation concerning the backdoor access to the Apple iPhone 5C used by the San Bernardino shooter Syed Ryzwan Farook – is heating up. Even Bill Gates weighed in on the subject, revealing to Financial Times that he would allow FBI one-time access to the attacker’s mobile phone. He stated that all tech companies (including Apple) should comply with government requests for assistance pertaining to investigations regarding terrorist activity. In more areas than one, some agree with Gates. This would be a one time-only access. It would allow the FBI to further investigate this case, revealing more info about an attack that shocked the United

Read More...

Microsoft, Operating Systems, Software Programs, Windows

Windows 10 Privacy Concerns Addressed By Microsoft’s Terry Myerson

Windows 10

After Windows 10 was released late last month, the praises for the new operating system came flowing. It showed remarkable stability, built-in new features and overall it projected an increase in performance, plus, it returned the start menu as well. After the initial few weeks of work, some concerns for the new operating system’s privacy & security features have risen. There were several possible sources of concern for users; from the machine ID, key logging to other problematic situations, for example, covertly downloading a multi-gigabyte ISO of Windows 10 to Windows machines without user permission. In a nutshell it was kinda messy and Microsoft had

Read More...

Android, Operating Systems

Paranoids, Meet Your New Phone: Silent Circle’s Blackphone 2

Blackphone_2

Whether you are a paranoid being or simply want added privacy and/or security, this is the phone for you it seems. The second generation of Silent Circle’s Blackphone 2 brings privacy and security front and center. It does this by offering full device encryption, thanks to Silent OS – an interesting version of Android intended for enterprise customers, putting an emphasis on secure and worry-free daily routines. If you thought the Blackphone 2 is another one of those ultra secure, but slow and outdated phones, think again. Powered by a Qualcomm Snapdragon 615 octa-core processor clocked at 1.7GHz, 3GB of LPDDR3 RAM, it has a

Read More...

Asia Pacific (APAC), China, Global Politics, Software Programs, Technology Security, VR World

Qihoo 360 Caught Cheating in Antivirus Testing

qihoo-360

Qihoo caught swapping antivirus engines between consumer and benchmark versions.

Read More...

Android, Mobile Computing, Operating Systems, Software Programs, Technology Security, VR World

Bluebox Labs: Xiaomi Phones a Major Security Risk

Xiaomi logo

Xiaomi devices ship with a number of security flaws due to the use of a forked version of Android.

Read More...

Analysis, Cloud Computing, Mobile Computing, Technology Security, VR World

IT: It’s the Place to be for Job Hunting

Chart_IT Unemployment 980

As unemployment waivers, people with IT skills are sought after.

Read More...

Asia Pacific (APAC), Global Politics, Japan

Japan Estimates Further Growth of its Security Market

20152018

IDC Japan announces its latest market analysis, which estimates the potential growth of Japan’s local security business sector through the years 2015 to 2018.

Read More...

VR World

Intel Acquires PasswordBox

intel-1

Intel and PasswordBox offer more security solutions after the acquisition.

Read More...

Asia Pacific (APAC), Global Politics

Walkman A event, Cloud Direct, 6-Second Camera: The Headlines in Tokyo for Nov. 27

wlkmana

Here is the daily roundup from Japanese consumer tech and tech business websites for November 27, 2014.

Read More...

Asia Pacific (APAC), Global Politics, Japan, Technology Security, VR World

One Fifth of Japanese Have Lost a Smartphone, According to Survey

lookoutjapanlostphone

A small sample research done by Lookout Inc. Japan reveals that at least one out of five people in Japan have experienced losing their smartphones.

Read More...

VR World

Synology releases DiskStation Manager 5.1

Synology DSM 5.1

Synology’s DSM receives an update that increases focus on security.

Read More...

Cloud Computing, Enterprise, Software Programs, Technology Security, VR World

Google Discovers Vulnerability in SSL 3.0

Google Logo

Google’s security researchers have discovered a new bug within SSL, this time in SSL 3.0 that exploits the fallback to SSL 3.0 and its inherently insecurity

Read More...

Business, Cloud Computing, Enterprise, Software Programs, Technology Security

Yahoo Hacked via Shellshock Vulnerability

Yahoo Logo

The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.

Read More...

Business, Cloud Computing, Enterprise, Rumors, Technology Security, VR World

No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers

Zero Day Kevin Mitnick

There’s a very good chance that today’s Wired piece about Kevin Mitnick’s newest venture has a lot to do with the discovery of the Bash Bug within various Linux and Unix operating systems. This is a bug that could be considered a Zero Day exploit because of the fact that it is a security vulnerability within an application that is possible to exploit due to the fact that the software vendor has no knowledge of it yet or it has not been patched yet. Either way, it is a vulnerability that someone can take advantage of. Now, Wired ran a piece about Kevin Mitnick and his

Read More...

Technology Security, VR World

5 million Gmail Passwords Leaked, Google Says Don’t Panic

gmail5million

5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts. The leaked Gmail accounts were first published on a Bitcoin forum, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification.

Read More...

Technology Security, VR World

Don't Panic: 5 Million Gmail Passwords Leaked

gmail5million

5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts. The leaked Gmail accounts were first published on a Bitcoin forum, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification.

Read More...

Opinion

Data Sovereignty: Is Big Brother Over-Reaching?

Globe and Cloud

A US judge has ordered Microsoft to hand over email data stored in foreign servers. How will this affect data privacy among users around the world?

Read More...

Technology Security

Rogue Cell Towers Are The Industrial Espionage Threat of The Decade

cell-tower

Last week news broke that ESD America, which manufacturers the $3,500 Cryptophone (a security hardened Samsung Galaxy S3) has discovered 19 rogue cell towers across the United States which were hoovering up SMS and data from phones as well as intercepting calls. ESD America found these towers as its Cryptophone alerts users when calls are being forced over unencrypted bandwidth via 2G from a nameless cell tower (cell towers from big telcos are always named). ESD America’s CEO, Les Goldsmith, is unsure of why there are so many rogue base stations (called interceptors) within the United States but is concerned about the high number of

Read More...

Cloud Computing, Hardware, Rumors, Software Programs, Technology Security

Security Researcher Claims iOS Devices Have a Backdoor

Apple Logo iMessage iWatch Backdoor

A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What’s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by posting a support page about it. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple’s services) so they’re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly

Read More...