A hackers group that calls itself the Shadow Brokers recently published on web and made accessible to everyone sophisticated hacking and surveillance tools. They claim that those tools come come from breach of NSA. Released hacking tools exploit vulnerabilities in software that the vendor doesn’t know about (so called “zero day vulnerabilities”) and thus haven’t […]
Spotify is making some users reset their passwords and the reason is – other websites keep getting hacked. There have been numerous huge data breaches affecting tens of millions of users. Situation is even worse because of the fact that many people re-use their passwords across many services. So breach of one service where password was re-used compromises other sites […]
It is estimated that by year 2020 there will be anywhere up to 50 billion internet-connected devices and 20% of them will be cars and or trucks. Such rapid explosion of use of connected devices explodes comes with security risks. Therefore US Department of Justice, together with other agencies, is evaluating and trying to predict those risks […]
Recently Microsoft won a closely-watched case against US Department of Justice on disclosure of European customer data. In that case US court of appeals ruled that US search warrants do not reach our customers’ data stored abroad. In this article Microsoft explains their motivation fighting this case and why they think it’s a big deal. Full article
Leaked Germany’s federal data protection commissioner’s secret report reveals that Germany’s intelligence agency, the Bundesnachrichtendienst (BND), has repeatedly seriously violated law. According to report, the BND has created seven databases without the appropriate legal approval, and also transferred huge amount of data to NSA in US. Full article
This article explains three commonly used security terms for non-technical people. Those terms are: “encryption”, “OAuth and OAuth2”, and “ransomware”. Full article
“Visual hacking” is spying on physical items: like overlooking someone’s computer or mobile screen, desk, paper documents. These attacks are hard to notice and detect when it does happen. Kate Borten of the Visual Privacy Advisory Council shares her tips on how to secure against visual hacking. Full article
Internet contains unimaginable amounts of data. So how hard it would be to track down you? And how to find what data is there about you on the internet? Full article