Skip to main content

Privacy

South Korean data breach results in 220m records stolen

posted onAugust 27, 2014
by l33tdawg

 Personal details, relating to half of South Korea's population, have been stolen by hackers, including full names, account names, passwords and resident registration numbers.

The hack was revealed after 16 people were arrested for stealing data from a number of online game and movie ticket sites. They are said to have set up targeted attacks on registration pages of the sites to siphon off the personal details.

Berlin privacy start-up ZenMate expands service to mobile

posted onAugust 27, 2014
by l33tdawg

Berlin privacy start-up ZenMate today announced it has expanded its online privacy tool to mobile.

The service, previously only available as a web-based Google Chrome plug-in, is now available to download on the Android and iOS platforms. 

ZenMate allows users to hide their IP address by changing their virtual location to somewhere else in the world. The company said the mobile app is able to encrypt and secure all internet traffic on a user’s smartphone whatever their connection.

Breach of Homeland Security Background Checks Raises Red Flags

posted onAugust 26, 2014
by l33tdawg

Background check records of 25,000 undercover investigators and other homeland security staff were exposed in the breach at US Investigations Services (USIS) this month, unnamed officials told Reuters Friday. USIS has said the incident had "all the markings of a state-sponsored attack." What agency officials have said about the incident--and what they haven't said about it--are raising questions about the breach's ultimate impact and about inadequate measures for ensuring that third-party government contractors properly secure classified data.

NSA built 'Google-like' search engine for metadata

posted onAugust 26, 2014
by l33tdawg

The National Security Agency built a "Google-like" search engine to give domestic and international government agencies access to details of billions of calls, texts and instant messages sent by millions of people, according to The Intercept.

The search engine, called ICReach, had behind it roughly 850 billion pieces of metadata in 2007 on calls made largely but not exclusively by foreign nationals, the report said.

UPS now the third company in a week to disclose data breach

posted onAugust 21, 2014
by l33tdawg

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.

In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems.

Think crypto hides you from spooks on Facebook? THINK AGAIN

posted onAugust 20, 2014
by l33tdawg

Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption.

The researchers from the Universities of Padua and Rome have found that for activities like posting messages on a friend's Facebook wall, browsing a profile on a social network, or sending an e-mail, there's no need to decrypt an encrypted data flow.

British spy agency attempts mammoth hack

posted onAugust 20, 2014
by l33tdawg

Britain's Government Communications Headquarters (GCHQ) has been scanning every public-facing server in 27 countries for several years to find any weak systems in waht some have described as a 'gargantuan scale' hack.

The agency's so-called 'Hacienda' program, revealed by German publication Heise, started in 2009 when GCHQ decided to apply the standard tool of port scanning against entire nations.

Why would Chinese hackers want US hospital patient data?

posted onAugust 19, 2014
by l33tdawg

The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.

Already this year, around 150 incidents of lost or stolen personal data -- either due to hacking or ineptitude -- have been reported by medical establishments to the U.S. Department of Health and Human Services.

A portable router that conceals your Internet traffic

posted onAugust 15, 2014
by l33tdawg

The news over the past few years has been spattered with cases of Internet anonymity being stripped away, despite (or because) of the use of privacy tools. Tor, the anonymizing “darknet” service, has especially been in the crosshairs—and even some of its most paranoid users have made a significant operational security (OPSEC) faux pas or two. Hector “Sabu” Monsegur, for example, forgot to turn Tor on just once before using IRC, and that was all it took to de-anonymize him. (It also didn’t help that he used a stolen credit card to buy car parts sent to his home address.)