Privacy

The United States' Central Intelligence Agency for years has been working to break iOS security, according to a report published Tuesday. The allegations are based on documents provided by NSA whistle-blower Edward Snowden. Researchers working with the CIA have presented their tactics and achievemen...

Microsoft on Thursday issued a security advisory acknowledging a vulnerability in all versions of Windows that could allow FREAK exploits. Windows systems previously were thought to be immune to FREAK attacks. "The vulnerability could allow an attacker to force the downgrading of the cipher suites u...

China should change its tune on new rules for purchases from American high-tech companies if it wants to do business with the U.S., President Obama has warned. China reportedly is planning to ask U.S. high-tech firms to hand over their encryption keys and install security backdoors to allow surveill...

Twitter last week announced actions to further protect users of its network -- but it left them vague. The company is rolling out unspecified improvements to its reporting process for content issues including impersonation, self-harm, and the sharing of private and confidential information, aka "dox...

Citizenfour, a film documenting interviews director Laura Poitras conducted with whistle-blower Edward Snowden, won the Oscar for best documentary Sunday. The talks took place as Snowden blew the lid off the United States National Security Agency's surveillance activities. The award highlights the d...

The United States' National Security Agency and British spy agency GCHQ have hacked into the internal computer network of Gemalto, the world's largest maker of SIM cards, and stolen the cards' encryption keys, according to information in files leaked by whistle-blower Edward Snowden. Gemalto makes a...

Samsung Smart TV owners, already shaken by news earlier this week that their TVs can transmit voice commands and other private data to third parties, have been hit by another revelation -- that the devices sneak ads into movies they're watching without the owner's knowledge or consent. A user on the...

Owners of Samsung smart TVs need to watch what they say if they've activated the voice recognition feature on these devices. The feature may transmit some voice commands, together with information about the device, to a third-party service that converts speech to text, Samsung's global privacy polic...

Hackers broke into the databases of Anthem Inc., the second-largest health insurer in the U.S., and stole up to 80 million customers' personal information. The data includes current and former customers' names, birthdays, medical IDs, social security numbers, street addresses, email addresses and em...

Canada's spy agency, the Communications Security Establishment, has been eavesdropping on 102 free file upload sites, including Sendspace, Rapidshare and Megaupload, which has been shut down. A CSE program called "Levitation" lets analysts access information on 10-15 million uploads and downloads of...

Google may have contributed to violating the First Amendment rights of three journalists working for WikiLeaks two and a half years ago, when it turned over to the FBI all their email, subscriber information and metadata. Google informed the journalists about its actions last month. "We are astonish...

UK Prime Minister David Cameron, who is standing for re-election, has vowed to ban personal encrypted communications apps such as WhatsApp if he is voted in. He also will allow UK government security agencies to monitor communications, with warrants signed by the Home Secretary. "The first duty of a...

SPOTLIGHT ON SECURITY

Sony Sortie’s Smoking Gun Still Missing

Recent research from security firm Cloudmark has raised doubt about the purported connection between North Korea and last November's intrusion on Sony Pictures Entertainment's computer networks. The FBI last week continued to press its case that North Korea was behind the cyberattack, pointing to an...

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternrau...

Privacy's future appears muddy at best, judging from a survey released Thursday by the Pew Research Center and Elon University's Imagining the Internet Center. More than 2,500 Internet experts and analysts were narrowly divided on whether policy makers and technology innovators would create a secure...

Technewsworld Channels