Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Question

    How does zero knowledge encryption work?

    Posted July 18, 2013 - 3:50 pm

    How secure is zero knowledge encryption?
  • Question

    How could someone take over your webcam?

    Posted July 9, 2013 - 10:49 am

    I see anecdotal stories about some creep taking over the webcam of some poor unsuspecting virtuous individual, and then viewing the hapless and unaware victim in what they think is a private setting. I’ve never heard of it happening to anyone I know, so I assume it is a rare occurrence. How could someone actually gain control over your webcam?
  • Question

    What to do about “master key” security flaw in Android?

    Posted July 5, 2013 - 1:59 pm

    Apparently a significant security risk has been found in Android devices going all the way back to version 1.6. According to the folks at Bluebox security that found it, the flaw can be used to completely take over your Android phone, access passwords, and do lots of other unsavory things.
  • Question

    Is an outbound firewall necessary?

    Posted July 5, 2013 - 12:59 pm

    I didn’t realize until today that Macs don’t have an outbound firewall. Is this something to be concerned about for a personal use machine?
  • Question

    Does Microsoft Security Essentials provide good protection, or is third party antivirus software necessary?

    Posted June 28, 2013 - 4:44 pm

    How good is Microsoft Security Essentials? Is that all you need to adequately protect a PC, or should other antivirus software be installed?
  • Question

    Can you encrypt data on an Android phone?

    Posted June 27, 2013 - 12:40 pm

    Is there a way to encrypt data on an Android phone, and if so, how do you do it?
  • Question

    What is the most secure form of online communication?

    Posted June 18, 2013 - 10:52 am

    Emails are considered fair game by law enforcement, and after 6 months the current practice is to read/seize any that are wanted without a warrant. I think this is pretty terrible. Why do I have suddenly no right to privacy when my emails are concerned after 180 days have passed?
  • Question

    Will reports of how easy it was for GCHQ to intercept BlackBerry devices hurt the company?

    Posted June 17, 2013 - 1:11 pm

    One of the recent revelations from Edward Snowden was that British spies intercepted G20 delegates’ BlackBerry messages and calls in real time at the 2009 summit.
  • Question

    How does one hack a system to steal information?

    Posted June 14, 2013 - 3:28 pm

    Let me state first: I’m not looking for a how-to guide to become a cybercriminal. I simply have garnered some concerns because of recent stories that surfaced in the media. One concern comes from the recent ‘whistleblowing’ action by Edward Snowden who blew the cover off the NSA operation.
  • Question

    Do people care that all of their cell phone records may have been seized by the NSA?

    Posted June 6, 2013 - 4:49 pm

    I ask this because I’m extremely angry about it. Glenn Greenwald broke the story in The Guardian that Verizon was giving the NSA complete records of its business plan customers' activity - who they called, when they called them, where they were, etc.
  • Question

    How to configure Chrome browser to delete cookies on exit?

    Posted June 5, 2013 - 4:49 pm

    How do you set up Chrome to delete cookies when you exit the program? I always have Internet Explorer configured to do this under tools>internet options, but I can’t find the same setting for Chrome.
  • Question

    What is the greatest security threat for Android phones and tablets?

    Posted June 4, 2013 - 12:58 pm

    I’ve heard conflicting advice about Android security, for example: anti-virus app is essential vs. anti-virus app is worthless or virus are everywhere vs. viruses are rare. What actually is the biggest security threat for Android users?
  • Question

    What are the main security risks of Bluetooth?

    Posted May 24, 2013 - 4:38 pm

    Bluetooth is nearly ubiquitous these days, but it is one potential attack vector that I haven't put much though into. What are the main things to worry about when it comes to Bluetooth security? I would think they would be limited due to the inherent short range of the signal.
  • Question

    How do you prevent default script attacks?

    Posted May 8, 2013 - 2:44 pm

    What steps should be taken to make websites secure against default script attacks?
  • Question

    How can I tell if someone has been logging into my gmail account?

    Posted April 26, 2013 - 2:46 pm

    Is there a way to see log-in history for your gmail account? I suspect that someone I know has, and I've already changed the password, but I'm not sure and I don't want to mention it if they aren't guilty.
  • Question

    How to avoid malware on Android devices?

    Posted April 17, 2013 - 4:46 pm

    Like any other operating system that becomes popular, Android is a target of individuals that want to install malware on devices. Earlier this week, Google removed thousands of apps from Google Play, although many of them were junk apps, and not specifically malware.
  • Question

    What could cause a pop-up warning that says "files being copied...."?

    Posted April 8, 2013 - 1:48 pm

    I was on my laptop, and a command prompt box popped up with "files being copied........". I closed my browser, disconnected from WiFi, and ran a fresh virus scan after making sure my anti-virus (AVG) was up to date. I couldn't find any problems, and nothing came up on my scans. Any ideas what caused this?
  • Question

    Fake article posted on Facebook - Can it cause a virus?

    Posted April 7, 2013 - 2:38 am

    I clicked on a supposed article my friend posted on Facebook via my IPhone 4s, and realized that it was not legit. I have then received failure Demon notifications in my yahoo mail account. I'm guessing it's a virus?? How do I remove this? I only ever access my email through my iPhone. I'm a bit worried that security gas been compromised.
  • Question

    How to prevent SQL injection attacks?

    Posted April 4, 2013 - 12:12 pm

    What do you to prevent SQL injection attacks beyond simply not allowing raw SQL to be passed to your database?
  • Question

    How can a DDoS attack on a single company slow down the entire internet?

    Posted March 27, 2013 - 4:20 pm

    The news wires have been reporting the largest DDoS attack in history is taking place today against a company called Spamhaus. I haven't noticed much of an impact, but the news reports suggest that the effect is being felt by companies including Netflix. How can a single attack have such a wide impact?
  • Question

    Are criminal penalties for hacking excessive?

    Posted March 19, 2013 - 1:00 pm

    This week Andrew Auernheimer was sentence to 41 months (!) in prison for exposing an AT&T security flaw.
  • Question

    what is the best free antivirus for 2013 ???

    Posted March 19, 2013 - 9:27 am

    Recently I had some problems with my pc. My keyboard stopped working properly. pc started doing things on it's own and it is slower than it should be.I have windows 7.
  • Question

    How to use Google 2-step verification with an older smartphone?

    Posted March 18, 2013 - 12:18 pm

    I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo.
  • Question

    Could wearable authentication tokens replace passwords?

    Posted March 12, 2013 - 1:17 pm

    I saw that Google is testing a ring that acts as an authentication token. Obviously, a fair number of businesses use physical authentication tokens, but as far as I know they haven't been adopted for individual private use. Ok, I'm sure there are a few people out there using them, but I've never met them.
  • Question

    What are "hashed and salted" passwords?

    Posted March 4, 2013 - 4:20 pm

    I was one of the millions of Evernote users who had to reset their Evernote password this morning due to a security breach, but it seemed like most of the articles I saw about it downplayed the risk because passwords were "hashed and salted." While it sounds like a great breakfast order for WaffleHouse, what does hashed and salted mean regarding
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question