From January 2017, Chrome will indicate connection security with an icon in the address bar labeling HTTP connections to sites as non-secure. Google continues its effort to make the web a better place by pushing the adoption of encryption, we left the IT giant in May when it announced the decision to switch on default HTTPS […]
The Network of NewSat satellite firm was the ‘most corrupted’ of ever, it was hacked by foreign hackers and it had interception kit in its data centre. The story demonstrates the high interest of spy agencies in hacking communication systems. Once upon a time, the Australian satellite company was deeply hacked by cyber spies that […]
In the aftermath of the DNC hack the staffers were instructed in the use of the popular instant messaging Signal app, also called the âSnowden-approvedâ app. The need of privacy is pushing the IT industry in developing secure messaging systems that implement end-to-end encrypted to protect users from prying eyes. Signal is probably the most popular app […]
WhatsApp has introduced significant changes to its Privacy Policy, such as the sharing of user data with Facebook. Is it possible to say no? How? If you are one of the WhatsApp users there is something that you need to know, the popular messaging app will begin sharing its usersâ data with Facebook. Facebook, that […]
A few members of the community are calling for a ‘Tor general strike’ to protest against some decisions taken recently by the core members. Last month, the Tor Project announced that an internal investigation had confirmed the allegations of sexual misconduct against the notorious member Jacob Appelbaum. The allegations divided the internet privacy community, as a result of […]
Google has launched a new Google API working together with Dashlane, to stop using passwords for Android users and improving the user experience. It is true that Android security apps work wonder and also Google has been trying to use fewer passwords or none whatsoever, making it harder for someone to penetrate the privacy of its users. […]
The US federal authorities asked a 3D printing lab to recreate a dead manâs fingers to unlock his smartphone … will it work? Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past. The federal authorities […]
According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of recommendations to avoid privacy breaches. Early this year, the Shodan search engine launched a feature that lets users easily access vulnerable webcams. In September 2015, researchers from the Rapid7 security firm discovered a number of security vulnerabilities affecting several Video […]
A group of researchers has developed Riffle, a new anonymity scheme that provides better security and performance than others, including Tor. Tor is probably the most popular anonymizing network, million of users leveraged on it to protect their privacy and online anonymity. Now Massachusetts Institute of Technology researchers revealed a new anonymity architecture that could rival Tor. […]
Shard is a free tool that could be used by hackers to discover shared passwords between most popular web services, including Facebook, LinkedIn, Reddit, Twitter, or Instagram. In the past months, we have read about numerous data breaches, LinkedIn, MySpace, VerticalScope are just a few examples of illustrious victims. Hundreds of thousands of millions of credentials have flooded the […]