Posts About: Security

The Weak Case Against Strong Encryption

I used to think that the idea of banning encryption was too absurd for discussion. Whenever a politician or government official suggested it, I figured it to be a ploy covering the real desire, which was not to ban encryption,...

Bug-free Code? That's a lie!

Behavioral psychiatrists say that virtually all people lie. Most are little white lies to protect the feelings of others. Some lies are acts of commission -- a deliberate statement of untruth -- whereas others are lies of omission. In the...

Facebook Should Care More About Privacy

Following the revelations that have shown major flaws in Facebook’s privacy settings with regard to linking your mobile number, security experts are now calling for the company to get serious about protecting users. The issue relates to Facebook and one...

The Security Risks of Third-Party Data

Most of us get to be thoroughly relieved that our e-mails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even the ones you don't think of as secret, are more likely than you...

The NSA Plans for a Post-Quantum World

Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are...

It's Time to Upgrade to Linux 4.7.1

If you are currently using Linux version 4.6 series, then the Lead Maintainer has a message for you. It's time to upgrade. Greg Kroah-Hartman on Tuesday announced the arrival of Linux 4.6.7. This is making it clear that it will be the...

SMS Password Recovery: nopls

Allowing SMS password recovery on your applications and etc has now become a horrible means of password recovery. Recent hacks, (i.e. LinusTechTips) show an upcoming trend in hacking via social engineering. The best thing ever, but often incorrectly implemented: two-factor...

Securing your SSH Server with Private Keys

Have a look at /var/log/auth.log, and find all those little Chinese servers trying to brute force your box... no bueno.  One of the most common issues I see doing Linux server administration is bad passwords, the same passwords, no service isolation,...

Application Layer Attacks Could Defeat DDoS Protection

Security Researchers have officially observed large application-layered distributed denial-of-service attacks using new techniques that could end up foiling DDoS protection and defenses. This could be a sign of things and change for web application operators. This attack targeted a Chinese Lottery...

The Important GMail Update You Never Want to See

Back in 2013, the Syrian President Bashar Al-Assad fired several scud missiles into civilian cities and populations, destroying towns, then a 16 year old named Dlshad Othman created an early warning system. His system used citizen reports of missile launches to calculate their...

Facebook Needs to Care About Privacy More

Following the revelations that have shown major flaws in Facebook’s privacy settings with regard to linking your mobile number, security experts are now calling for the company to get way more serious about protecting users more. The issue relates to...

Symantec Partners with Web Hosts to Offer Free SSL

Symantec has started a program called Encryption Everywhere that will offer basic SSL/TLS Certificates to domain owners for, you guessed it, free. Symantec wants to make the web a little more encrypted. With this goal, they will be offering free...

Your Mouse Can be Hacked Now

Now we are at the point where wireless mice and keyboards are prime for hacking. With a massive vulnerability leaving billions of devices at major risk. The U.S. Cybersecurity company Bastille claims to have found the vulnerability, officially calling it...

Take a Selfie to Process an Online Payment

MasterCard is working on a process to accept selfies and fingerprints as a new alternative to passwords to accept online payments. MasterCard is working on a process to accept selfies and fingerprints as a new alternative to passwords to accept...

Top 5 Security Breaches of 2015

It was an interesting year for cybersecurity and the fight against data breaches in the world of information technology. It has been a pretty bountiful year for hackers who has gained unauthorized access to countless corporate and government databases. Here...