Information security has never been a more sensitive subject than it is these days, so it’s little surprise that allegations from a security researcher that iOS contains a ‘backdoor’ permitting access to users’ information provoked a strong response from Apple.
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.
The talk was nixed by the legal counsel with Carnegie Mellon’s Software Engineering Institute after a finding that materials from researcher Alexander Volynkin were not approved for public release, according to a notice on the conference’s website.
Scammers are using the MH17 disaster in east Ukraine to spread objectionable links, online security experts have warned.
A link to a pornographic website disguised as a video of the Malaysia Airlines crash was posted on a Facebook page dedicated to one victim.
All data sent via the Internet of Things (IoT) needs to be secured with encryption, according to the findings of recent INQUIRER research.
The research, carried out in conjunction with Intel, revealed that 44 percent of INQUIRER readers believe that data encryption is the best way to ensure the IoT is secure. 23 percent would prefer to see users being given full control over their own data, while 10 percent believe the best IoT security option is to not store any usage data at all.
A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.
Jonathan Zdziarski, a researcher who often trains federal and state law enforcement agencies in forensic techniques, revealed the existence of the mostly hidden features. The data-stealing avenues have evolved over the last few years and may have been used by the U.S. National Security Agency to collect data on potential targets, Zdziarski said.