Opinion

Data Sovereignty: Is Big Brother Over-Reaching?

A US judge has ordered Microsoft to hand over email data stored in foreign servers. How will this affect data privacy among users around the world?

Read More...

Technology Security

Rogue Cell Towers Are The Industrial Espionage Threat of The Decade

Last week news broke that ESD America, which manufacturers the $3,500 Cryptophone (a security hardened Samsung Galaxy S3) has discovered 19 rogue cell towers across the United States which were hoovering up SMS and data from phones as well as intercepting calls. ESD America found these towers as its Cryptophone alerts users when calls are being forced over unencrypted bandwidth via 2G from a nameless cell tower (cell towers from big telcos are always named). ESD America’s CEO, Les Goldsmith, is unsure of why there are so many rogue base stations (called interceptors) within the United States but is concerned about the high number of

Read More...

Cloud Computing, Hardware, Rumors, Software Programs, Technology Security

Security Researcher Claims iOS Devices Have a Backdoor

Apple Logo iMessage iWatch Backdoor

A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What’s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by posting a support page about it. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple’s services) so they’re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly

Read More...

Mobile Computing, Opinion, Technology Security, VR World

The NSA Gathers 90% Irrelevant Data

NSA Spying

The Washington Post is reporting via documents obtained from Edward Snowden that the NSA is collection hundreds of thousands of records, upwards of 160,000 communications, most of which are completely irrelevant to the target person or people. After spending four months analyzing the data which included 22,000 reports and 160,000 data intercepts, the Washington Post was able to discern that a whopping 89% of the total data collected was from non-targets or mere bystanders. The records obtained by Edward Snowden and passed on to the Washington post spanned 4 years of records that started in 2009 and ended in 2012. Obviously, they are merely a

Read More...

Business, Hardware, Mobile Computing, Opinion, VR World

DHS Pushes New Ridiculous Security Measures

DHS

The Department of Homeland Security (DHS) recently posted a ‘warning’ to foreign airports that have direct flights into the US, with an apparent focus on UK airports, namely Manchester and London’s Heathrow. In this posting, Secretary Johnson, the head of the DHS stated that elevated security measures were being implemented based on the ever changing security climate. So, what exactly are these elevated security measures? According to the BBC, these new security measure being implemented in airports like Manchester and London are requiring users to have their electronic devices charged and to be able to power the device on when prompted to. Furthermore, if a

Read More...

Android, Business, Mobile Computing, Operating Systems, Software Programs, Technology Security, VR World

OnePlus One Gets Delayed Due to an OpenSSL Security Update

OnePlus Official Image

The much awaited OnePlus One smartphone has hit yet another snag on its way to being delivered to those that could actually get ahold of one. The $299 smartphone has it all, and for a reasonable price, but the catch is that they’re limiting production so that they don’t bankrupt themselves, or their parent company OPPO in the process. And since the device is running CyanogenMod as the OS, there are some things that need to be ironed out before the device ships to consumers as a ‘shipping’ final device. One of those things is that CyanogenMod recently had a major security update as a

Read More...

Business, Enterprise, Rumors, Technology Security, VR World

80 Tech Companies Cooperating with NSA, Claims Wikileaks

Wikileaks

Since we’ve had quite a bit of time between Snowden disclosures of NSA activities, it appears as though Wikileaks has gotten ahold of some secret NSA documents that name names as to whom has been cooperating with them. They claim that they have over 80 different companies in their strategic partnerships. The Wikileaks obtained slide states that these 80 “Major Global Corporations” are supporting BOTH missions. However, the document doesn’t specify exactly what both of those missions are, exactly. However, since this slide is labelled as COMINT that means it specifically pertains to communications between people, which may narrow exactly what those missions might be.

Read More...

Software Programs, Technology Security

The Whitehouse Says They Have Right to Withhold a Security Vulnerability

Whitehouse Logo

On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted a blog clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the Heartbleed bug officially on Twitter, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question. So, what exactly are they going to disclose and when? Well, there’s a nifty little check list that the Whitehouse has provided us with so that

Read More...

Software Programs, Technology Security, VR World

Time to Run and Hide from Internet Explorer, For Now

Internet Explorer

Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that was a pretty accurate statement. However, nowadays Internet Explorer is fairly good and the only browser on Windows worth anything for touch. The guys and gals over at FireEye managed to discover this Zero Day Exploit and dubbed the entire operation, “Operation Clandestine Fox.” They claim that this zero day exploit targets IE9 through IE11 browsers, which make up about 26% of all browser users around the world which is pretty significant. Microsoft has also put out a security bulletin on

Read More...

Enterprise, Software Programs, Technology Security, VR World

Oracle Adds Mobile Authenticator to Its Suite

User identity theft isn’t only a personal problem. While you are wondering who pulled your social security number out of your trash can, businesses are worried about who is rummaging through their files. Oracle  has been providing enterprise security products for some time via the Oracle Access Management Suite. Their recent addition is the Oracle Mobile Authenticator. Its purpose is to provide employees and customers who are accessing sensitive information with two-factor strong authentication protection. Going beyond password protection, a personal phone or tablet becomes a secondary authentication device. That device can eliminate the need to use a token or smart card to validate the

Read More...