Security RSS feed for this section

PlayDrone Finds Google Play App Security Issues

|

PlayDrone, a webcrawler, has found Google Play app security flaws. See the evidence and engineers behind PlayDrone here. Brant David reviews.
Leave a comment Get the Whole Story

The Cyber State: NSA Trains CryptoKids, Tracks Angry Birds, Parents Spy

|

The NSA tracks Angry Birds, trains children to hack, and creates a society of surveillance. Parents creep along their kids' social media. What does the future hold?
2 Comments Get the Whole Story

Obama: Change in Internet Trust? Nope. Zero Privacy, Get Over It

|

President Obama's speech on Internet security and the NSA was meant to offer hope in these dark times. It didn't change much. See our David Michaelis' thoughts here.
2 Comments Get the Whole Story

Best Tips, Tricks: How To Keep Your Email Secure

|

aNewDomain.net — Anyone who uses email today is a prime candidate for theft. That’s a fact. You’ve got to take precautions to avoid anything bad happening to you or your email. Here are some ideas. Take me, for example. One day I started getting a whole slew of direct messages from my friends on Twitter. […]
Leave a comment Get the Whole Story

Social Engineering: The New Face of Security Breaches

|

Social engineering can be a scary thing. Our Lamont Wood poses five incredibly-likely scenarios in this first-person security piece.
Leave a comment Get the Whole Story

Bitcoin Security Loopholes: Analysis

|

Bitcoin, the wildly exciting digital currency, has some key security loopholes. Read on to find out how to keep your Bitcoins safe.
Leave a comment Get the Whole Story

Freeware Friday: Dashlane Manages Password Overload

|

Sandy Berger reviews our Freeware Friday app pick Dashlane, a simple security program that helps maintain all the passwords you use on the Internet.
4 Comments Get the Whole Story

Protect Your Data and Communications with Cryptocat

|

Protecting your privacy online is gold these days. Mat Lee reviews Cryptocat, a plugin that can help keep your data and communications safe.
Leave a comment Get the Whole Story
UniKey Keys

UniKey, a New Lock at Your Fingertips

|

Cassandra Chin looks at UniKey, a new smartphone-based locking system that competes in the home automation security market.
Leave a comment Get the Whole Story

David Michaelis: Obama’s PRISM Paradox, Time to Calibrate

|

There are tradeoffs for 100 percent security, according to President Obama. The biggest issue with PRISM is that no one ever asked Americans whether they were willing to give a way their privacy and data. It's a false paradox, says our political columnist David Michaelis. And it's a false paradox. Read more here ...
Leave a comment Get the Whole Story

YouTube MOOC, Two Factor Security: Yet Another Tech Show YATS

|

Everything you thought you knew but maybe didn't consider about out of band two-factor authentication. It's Yet Another Tech Show. And it rocks. Hosted by our Mat Lee, its home is here at aNewDomain.net.
Leave a comment Get the Whole Story

Ten Terrific Tablet Tasks: Carpentry, Cooking, Remote Access, Lighting and More

|

Need a carpenter's assistant? A new security system? A second monitor? Our Mike Olsen has 10 terrific tasks your tablet will do if you have the right app. Here's everything you need to know about 10 tablet tasks -- we bet you never even considered some of these -- that will change the way you live and work. For the better, we hope.
Leave a comment Get the Whole Story

Why Four Digit PINs Blow: How to Protect Your Data infographic

|

Four digit PINs only result in 10,000 possible combos. How long do you think it takes a hacker to guess yours? Not long. Check out this eye-opening infographic and get some tips on how to protect your data if you're stuck with a four digit PIN.
Leave a comment Get the Whole Story

RSA 2013: History of Encryption Through the Ages, From 700 BC Scytale to DES to Now, Wow

|

From the 700 BC Scytale to the Thomas Jefferson's eponymous Jefferson Wheel to DES on up to now, this is the history of encryption technology like you've never seen it. An infographic on steroids. Incredible. And perfectly timed with RSA 2013 in San Francisco, running this week from Monday, February 25, 2013 to Friday, March 1. You've got to see this graphic to believe it. A work to behold.
Leave a comment Get the Whole Story

Raytheon Riot: Secret, Security Search Tech, Patent Filed, Video Here

|

The UK Guardian obtained video from a Raytheon executive explaining its RIOT "search for spies" tech. It triangulates deep information. Here's how it works.
Leave a comment Get the Whole Story
Apple iOS Needs Parental Controls

Dear Tim Cook: Letter from an American Dad, Apple iOS Parental Controls

|

It isn't easy being a parent. Being a parent to a kid with an Apple iPad and iPod is an order of magnitude tougher. Our Alan Wallace is an iDad writing a letter to Apple CEO Tim Cook. In his open letter, Alan asks for specific changes and improvements to Apple iOS parental controls. And he's not alone..
17 Comments Get the Whole Story

Full Body Scan Airport Video: What TSA Officials See, Plus Tech Explainer

|

What do TSA officials see when you go through the full body scan? Check out this video -- plus an explainer on how full body scan airport contraptions work and why LAX and various other airports in New York and elsewhere are replacing them. Plus, an xray scanner image -- circa 2007, before privacy algorithms were added to these systems -- showing just how revealing a TSA research lab will be in the name of security.
1 Comment Get the Whole Story

New Samsung Galaxy Grand: Minus Exploited Exynos, Minus Gift List

|

The Samsung Galaxy Grand announced this a.m. is not so grand without a quad-core processor, or details regarding pricing or availability. Why announce it at all? What's the problem with Seoul these days? We have some ideas ...
Leave a comment Get the Whole Story

Enemies of the Internet infographic

|

Enemies of the Internet infographic. Up in arms about CISPA, SOPA, PIPA and other efforts in the U.S? Here's what Internet censorship looks like around the globe.
Leave a comment Get the Whole Story

Microsoft Crimes Unit: Insecure Supply Chains, Pre-infected Hardware News

|

Microsoft Crimes Unit attorneys today announced a break in their case against hackers embedding and infecting computers pre-sale -- at manufacturing or middleman level. Really? Tom Ewing has more. Lots more investigating to do here, but this is the most clear and comprehensive coverage of this odd and long-running story I've seen yet.
Leave a comment Get the Whole Story
UA-33842469-2