Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Authentication & Encryption

You are using the plain HTML view, switch to advanced view for a more complete experience.

Android Marshmallow: The smart person's guide
This comprehensive guide covers the must-know details about Android Marshmallow.
Kingston buys encrypted flash drive maker IronKey

Kingston Technology today announced it has acquired the USB technology and assets of IronKey from Imation Corp.

Imation, which purchased the then privately-held IronKey in 2011, did not disclose the financial details of the sale to Kingston.

IronKey is perhaps best known for its highly secure USB flash drives, which use 256-bit AES encryption algorithm to secure data and a stainless steel case with no seams so it cannot be pried open.

To read this article in full or to leave a comment, please click here

Snowden leaks furor still spilling over into courts

Nearly three years after former NSA contractor Edward Snowden first leaked details about massive domestic spying, his revelations have prompted a broader discourse, especially among legal scholars, over the potentially invasive nature of big data cybersurveillance tools.

Even as intelligence officials, the FBI and Congress worry about the rise of terrorists using encryption to communicate, legal experts are concerned that the enormous volume of data still being collected and stored by the National Security Agency and other intelligence agencies will pose legal concerns based on the Fourth Amendment of the U.S. Constitution. The Fourth Amendment prohibits unreasonable searches and seizures without a judge's warrant supported by probable cause.

To read this article in full or to leave a comment, please click here

Cybercriminals use spy tactics for online bank heists

The times when stealthy, persistent and advanced malware was associated only with cyberespionage are gone. Criminals are now using similar threats and techniques to steal millions of dollars from financial institutions.

Last year researchers from security vendor Kaspersky Lab were called in to investigate unusual thefts from 29 banks and other organizations located in Russia, leading to the discovery of three new sophisticated attack campaigns. Their findings were presented Monday during the company's annual Security Analyst Summit.

One group of attackers is using a modular malware program known as Metel or Corkow to infect computer systems belonging to banks and to reverse ATM transactions. During a single night, the gang stole millions of rubles from a Russian bank using this hard-to-detect transaction rollback trick.

To read this article in full or to leave a comment, please click here

Java installer flaw shows why you should clear your Downloads folder

On most computers, the default download folder quickly becomes a repository of old and unorganized files that were opened once and then forgotten about. A recently fixed flaw in the Java installer highlights why keeping this folder clean is important.

On Friday, Oracle published a security advisory recommending that users delete all the Java installers they might have laying around on their computers and use new ones for versions 6u113, 7u97, 8u73 or later.

The reason is that older Java installers are designed to look for and automatically load a number of specifically named DLL (Dynamic Link Library) files from the current directory. In the case of Java installers downloaded from the Web, the current directory is typically the computer's default download folder.

To read this article in full or to leave a comment, please click here

Hackers breach DOJ, dump details of 9,000 DHS employees, plan to leak 20,000 from FBI

While some people were enjoying Super Bowl 50, hackers brought the pain to the Department of Home Security by dumping a directory of over 9,000 DHS employee names, email addresses, locations, telephone numbers and titles such as “DHS PRISM Support.” The same Twitter account announced plans to leak data of 20,000 FBI employees – including those who work outside of the US.

The hacker claimed to have downloaded “hundreds of gigbytes of data from a Department of Justice computer.” The unnamed hacker also told Motherboard that the data was obtained after compromising a DOJ employee’s email account, which is what the he used to contact the reporter. The email account wasn’t enough to access a DOJ web portal, but the hacker called the relevant department, social engineered his way in, and gained access to databases via a DOJ intranet.

To read this article in full or to leave a comment, please click here

I forgot my Windows 10 password!
Forgetting your Windows 10 password isn't the disaster it used to be. Windows lets you get back on track with a pretty easy reset process. Here's how it works.
Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims
In this Threat Intelligence report examining over 100 websites that have been compromised due to threat actors that exploit Web Analytics - technologies to collect, analyze, and re...
Bypassing the Windows 10 password with a PIN
There's an easier way to get into Windows: setting up a numerical PIN, just like you'd use with a bank ATM. Here's how to do it.
Post Selected Items to:

Showing 10 items of 129

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner PRNews.io •   © 1999-2016 NewsKnowledge