Skip to main content

Privacy

Private Email Server Made Hillary Clinton Vulnerable To Hackers, But The State Dept Isn't Much Safer

posted onMarch 6, 2015
by l33tdawg

By using private email, Hillary Clinton put her data at risk every time she clicked on a link or downloaded an attachment as secretary of state. But the American public, and even Clinton herself, will probably never know if hackers were able to monitor her communication from 2009 to 2013, the four years she served as the most powerful U.S. diplomat.

What’s worse than Superfish? Meet PrivDog, leaving users wide open to attacks

posted onFebruary 25, 2015
by l33tdawg

Last week, a storm erupted on the net after it became widely known that Superfish – software that was being pre-installed on Lenovo PCs – could compromise users’ security and privacy.

The problem with Superfish was not just that it injected money-making ads into websites, but that it used a self-signed root certificate to intercept encrypted HTTPS traffic for every website users visited – replacing legitimate site certificates with its own.

How the NSA’s Firmware Hacking Works and Why It’s So Unsettling

posted onFebruary 23, 2015
by l33tdawg

One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmware—the guts of any computer—“surpasses anything else” they had ever seen.

Tim Cook: 'Sacrificing our right to privacy can have dire consequences'

posted onFebruary 16, 2015
by l33tdawg

At the Summit on Cybersecurity and Consumer Protection held at Stanford University, President Obama pushed for more public-private collaboration and information sharing to allegedly prevent hacks such as the breaches suffered by Home Depot, Target and Anthem. While that doesn’t sound bad, actions such as outlawing encryption – as if only terrorist or pedophiles use it – and providing law enforcement with backdoors into software sounds terrible. Any backdoors left open will also be exploited by cyber bad guys. An unnamed technology executive called it “a stupid approach.”

Uber customer data exposed through online lost and found database

posted onFebruary 12, 2015
by l33tdawg

App-based taxi firm Uber is once again attracting the wrong type of headlines after exposing internal data on user accounts and phone numbers through its lost and found database.

According to Motherboard, the internal database was accessible online for around 5 hours on Monday before being replaced with a 404 error message.