VPN services like Online Shield 365 can help you protect your identity by creating an encrypted connection to prevent anyone from listening in. By tunneling your connection to a secure server, it will not only protect your online passwords but can also help maintain your Internet privacy. Keep credit card data and other financial information safe while you shop or bank online. Steganos can also protect you while you connect to risky networks, i.e. public hotspots at cafes, airports, schools, or hotels. With a click of a button the new SOS 365 provides continuous protection while you surf the … Read more
Another person with access to your computer can see your Google Chrome saved passwords through a simple series of steps. Should you be worried?
The security flaw was highlighted in a blog posted Tuesday by software developer Elliot Kember. In his blog, Kember described how your saved passwords in Chrome can be revealed in plain text, a process that any Chrome user can replicate.
In Chrome, click on the Settings icon, and then click on the Settings command from the pop-menu. In the Settings screen, click on the link to Show Advanced Settings. In the Passwords and Forms section, confirm … Read more
With the goal of avoiding a massive cyberattack on U.S. infrastructure, the White House has proposed a handful of incentives to get power plants, water companies, and transportation networks to join a national cybersecurity program.
"The systems that run our nation's critical infrastructure such as the electric grid, our drinking water, our trains, and other transportation are increasingly networked," the White House wrote in a blog post Tuesday. "As with any networked system, these systems are potentially vulnerable to a wide range of threats, and protecting this critical infrastructure from cyber threats is among our … Read more
Imagine that the NSA and the U.K.'s GCHQ opened their databases and tools to public volunteers to aid them in the search for terrorists. Tom Scott, who is described as a British geek comedian, programmer, and presenter, produced a video, "Oversight: Thank you for volunteering, citizen," that imagines ordinary citizens accessing the databases of everything about everyone to assist governments in their surveillance activities.
Scott's "Oversight" program lets ordinary citizens click on potential threats as they are logged, such as an e-mail with the words "blowing things up" in it; view … Read more
LAS VEGAS -- It used to be that the playful Defcon contest of "Spot the Fed" gave hackers and the government agents tracking them a chance interact in a less serious manner.
Hackers who found a government agent among the conference attendees would wear with pride T-shirts that read, "I spotted the Fed." The agent would be given a shirt that read, "I am the Fed." And by flipping the cat-and-mouse dynamic for at least one weekend a year, the two groups more or less came to a greater understanding of each other.
The … Read more
LAS VEGAS -- More major brand-name Wi-Fi router vulnerabilities continue to be discovered, and continue to go unpatched, a security researcher has revealed at Defcon 21.
Jake Holcomb, a security researcher at the Baltimore, Md.-based firm Independent Security Evaluators and the lead researcher into Wi-Fi router vulnerabilities, said that problem is worse than when ISE released its original findings in April.
The latest study continues to show that the small office and home office Wi-Fi routers are "very vulnerable to attack," Holcomb said.
"They're not a means to protect your network and your digital assets,&… Read more
LAS VEGAS -- The Onion Router's popularity as a Internet traffic anonymizing network that can be used just about anywhere belies some of its limitations. To combat those, one security researcher at Black Hat 2013 here figured out a way to make Tor more palatable.
And to the consternation of people who hate food names and metaphors, it's called Tortilla (download).
"People couldn't easily anonymize their Internet traffic," Jason Geffner, Tortilla's inventor, told CNET after his presentation. "This opens a whole realm of opportunities for them."
Geffner developed the free, open-source, and … Read more
LAS VEGAS -- Tensions were high as the National Security Agency's Gen. Keith Alexander took the stage here in front of a packed room of security industry professionals and hackers of all stripes.
The general at the forefront of the surveillance scandal currently enveloping the NSA walked up to the podium in the conference center at Caesar's Palace amid audience murmurings that he was going to avoid the issue.
Instead, it was the focus of his keynote speech.
"How do we protect our civil liberties and privacy?" he asked the 3,200 people filling the room … Read more
Documents declassified on Wednesday by Director of National Intelligence James Clapper describe the National Security Agency's data snooping, aka "Bulk Collection Program," carried out under the Patriot Act.
A 2009 document confirms the controversial program under which the NSA has the authority to collect from telecom providers such information as the date, time, and length of a call.
The document says that the actual call content is not collected, while any information gathered is not protected by the Fourth Amendment. The court orders served to telecom companies require them to turn over the records for any call … Read more
No search warrant is required if law enforcement wants to track your whereabouts through your cell phone records.
At least, that was the ruling handed down by the Fifth U.S. Circuit Court of Appeals in New Orleans on Tuesday, according to The Wall Street Journal. Overturning an order by a federal judge in Houston, the Appeals Court found that your cell phone records actually belong to your carrier and are not protected by a probable cause standard as outlined in the Fourth Amendment.
Authorities must still get a court order to carry out a search of cell phone records. … Read more