The fall-out from the hack of the Milan-based Hacking Team continues with all sorts of revelations about how the powerful would like to continue spying on the largely powerless. Adobe Flash vulnerabilities continue to be revealed while the US National Security Agency will be pretty hacked off following the discovery of its latest spying techniques. Meanwhile users of a website that facilitates affairs must be feeling nervous as hackers promise to spill the beans on names, addresses and even sexual fantasies.
CEO stalked by hacker group, company taken down; free BlackBerry devices loaded with snooping software handed out to rival politicians; New York Stock Exchange, United Airlines and Wall Street Journal go offline all within a few hours of each other; unsurprising revelations about the UK police seeking out spying software and more.
When you buy a new laptop or computer it’s tempting to whip it out of the box, plug it in and fire it up immediately. Of course, you just want to see how good, fun and fast it is.
There’s rarely a quiet moment in the world of cyber miscreants and the past week testifies to this. From a newspaper columnist being threatened by Anonymous to retract her ‘strong’ opinions, to a private eye being jailed for hiring hackers, it’s all going on. And of course, another major flaw has been discovered, this time in Adobe Flash Player.
Have you ever had a problem with a slow internet connection? Is it something that happens consistently? Does it happen even when you only have a few devices connecting to your network? If so, you might have someone leeching off your Wi-Fi bandwidth.
The cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.
Seismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability
The release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?
Industry reports can be as appetising as chewing on wet concrete. But two recently released missives from Infonetics and Verizon paint interesting if not alarming pictures; the growth of mobile malware is rapidly accelerating and the hacked credit card industry is worth more than the global trade in cocaine. Reading between the lines both reports point to a well-known but rarely voiced truism; you can only ever really rely on yourself because those charged with protecting our data, simply aren’t doing it.
There’s some very powerful spy software available for snooping on mobile phones. But nobody would spy on you would they? Well, bugging happens at all sorts of levels from political worthies to anonymous everyday people. If you find your mobile phone chewing through battery life or your data usage rockets skywards, these could be signs of snooping. And if not read on to become acquainted with snooping clues, in this age of mass surveillance they could be very useful.