Internet security

Stories 41 - 60 | << Prev   Next >>

Security Site Tots Up What You're Worth to Hackers

Symantec aims to raise cybercrime awareness

(Newser) - A rising number of cybercriminals make their living selling other people's online identities to thieves. Now a new security tool helps you calculate what yours is worth on the black market—and your risk of losing it, IT World reports. The Norton Online Risk Calculator aims to raise awareness of...

New Software Can Delete Emails Permanently

Software scatters encryption keys among temporary BitTorrent nodes

(Newser) - Email is inherently insecure, because it has a long shelf-life—even deleted messages can be stored infinitely on the email service of the sender or recipient. Now a team of scientists is poised to unveil software later this month to make them disappear for keeps, reports the Economist. “Vanish”...

Facebook Streamlines Clunky Privacy Settings

(Newser) - Facebook is starting a pilot program to test a more user-friendly version of its sprawling privacy controls, CNET reports. The 40 different settings now occupy six separate pages, and are so complicated that many users ignore them completely. “These can add up and pile up and not be as...

Computer Virus Phobia Leads to ... Computer Viruses

(Newser) - Fear of computer viruses is now one of the major reasons people are getting them in the first place, Reuters reports. According to Microsoft, seven of the 25 top threats come in the form of fake security programs, which users terrified of malware like Conficker are installing indiscriminately. Losing market...

Hackers Breach Monster.com

4.5M compromised in UK; jobs site unsure how many of 75M worldwide may be affected

(Newser) - Hackers have illegally accessed Monster.com and stolen personal details from an uncertain number of its 75 million users, Bloomberg reports. The hackers snatched user IDs, passwords, contact information and more, though resumes weren’t accessed. Users should be on the lookout for bogus e-mails that appear to come from...

Virus Helps Violate 500K Bank, Credit Accounts

Infects computers through 'drive-by downloads"

(Newser) - A computer virus has stolen log-in information for over 500,000 bank accounts and credit and debit cards. The Sinowal Trojan virus has infected computers around the world through “drive-by downloads” that install it without users' knowledge when they visit Web sites running the virus code. Individuals can best...

Facebook Getting Aggressive With 'Wall Spam'
Facebook Getting Aggressive With 'Wall Spam'
ANALYSIS

Facebook Getting Aggressive With 'Wall Spam'

Service starts playing tough, removing posts

(Newser) - “Wall spam” has gone from minor annoyance to publicity problem for Facebook, and it seems the social-networking giant is getting more aggressive in its attempts to combat it, reports Caroline McCarthy in CNET. Within 2 hours of receiving a spam post yesterday, McCarthy found it had been deleted by...

Tips for Candidates on Cyber Security
 Tips for Candidates 
 on Cyber Security 

OPINION

Tips for Candidates on Cyber Security

Next president must find right balance of regulation for internet safegaurds

(Newser) - Noting that both candidates have plans to ensure our collective cyber security, Bruce Schneier, in Wired, lays out some essential policy advice for the next president:
  • Use the government’s enormous purchasing power to make security software producers do better. Make security requirements for government software high, and those improvements
...

'Every Network Is at Risk' Thanks to Bug

Security expert says DNS flaw could cause Internet-wide chaos

(Newser) - Security researcher Dan Kaminsky outlined what he calls the biggest Internet security hole since 1997 to a gathering of experts yesterday, and it's a lot worse than had been understood, Wired reports. “Every network is at risk,” Kaminsky said at the Black Hat conference in Las Vegas. "...

High-Tech 'Trolls' Stalk the Internet, Harrass for Fun

Web subculture has disdain for just about everything

(Newser) - They gleefully wreak havoc online, tormenting the parents of a teen suicide victim, for example, or causing the website of an epilepsy foundation to flash brilliantly to trigger convulsions. These so-called trolls seek "lulz," or laughs, for their deeds and test the limits of free speech online. One...

Domain Name Bug Worries Web Providers

Firms race to fix flaw in Internet's architecture before crooks find it

(Newser) - ISPs worldwide are racing to patch a flaw in the design of the Internet that could allow criminals to steal personal and financial details of Web users by diverting them to fake sites. The flaw resides in the procedures of the Domain Name System, which translates URLs into numerical Internet...

Yahoo Partners With McAfee to Make Search Safer

Security upgrade part of wider trend in protecting computers from Web's ills

(Newser) - Yahoo search will now label risky sites, including spyware and virus hosts and spammers, thanks to an exclusive deal with McAfee SiteAdvisor, the companies said today. It also will omit sites entirely that attack visiting computers, reports CNet. Yahoo sees millions of clicks through to some such sites daily, a...

Among New Browsers, Firefox Bests Safari and IE

Safari isn't good enough vs. spyware and IE is still in development

(Newser) - Mozilla, Apple, and Microsoft are in the final stages of developing new versions of their Web browsers, and Firefox 3 is the winner over spyware-susceptible Safari 3.1 and work-in-progress IE 8. The new Mozilla product has outstanding memory management and speed, boasts great groundbreaking bookmark features, and is impressively...

Malware Threats Skyrocketed in 2007

Symantec mulling new security approach

(Newser) - Last year saw an explosion in malware threats that has Symantec considering a new approach to Internet security—“whitelisting” legitimate computer code rather than blacklisting known threats. Of 1.1 million threats the company has discovered in over 25 years, it uncovered almost two-thirds of them in 2007, Computerworld ...

Personalized Security Protects Laptops

New software adjusts to individuals' behavior

(Newser) - A new laptop security system in development at Intel learns to adjust to you—that is, the user—getting to know your pattern of Internet use in order to provide more personalized protection. The software, called Proteus, is meant for companies that provide laptops to many employees, normally equipping all...

Renegade Geek to Head Cyber Security

DHS taps outsider as Silicon Valley ambassador

(Newser) - Outre tech entrepreneur Rod Beckström will top the White House’s new secretive cyber security initiative, the Wall Street Journal reports, to the surprise of many Washington insiders. Beckström is a Silicon Valley transplant without security experience, but he has developed a cult following in the security and...

Website Offers Post-Mortem Security
Website Offers Post-Mortem Security

Website Offers Post-Mortem Security

Departed users can leave wills, photos, passwords to family

(Newser) - Think of it as a safe deposit box for the dearly departed: A website in California allows subscribers to store digital versions of important stuff—wills, photos, credit card numbers, bicycle lock combinations, you name it—so beneficiaries don't have to scramble after the funeral, the San Francisco Chronicle reports....

Free Tool Offers Web Security
Free Tool Offers Web Security

Free Tool Offers Web Security

Former Microsoft employees run startup Haute Secure

(Newser) - A new free system designed to protect Web surfers from dangerous code is taking on the software security giants, reports the Wall Street Journal. Developers say Haute Secure, the brainchild of ex-Microsoft security experts, blocks Web pages embedded with malicious code. The public can download the program free, and companies...

Do We Need A New, Safer Internet?
Do We Need A New, Safer Internet?
OPINION

Do We Need A New, Safer Internet?

Patrick Dempsey thinks so, but Ars Technica says no

(Newser) - Online debate exploded after former FBI agent Patrick Dempsey said Wednesday that a second, safer Internet is needed. "The same positives that the Internet provides for information sharing, also create negatives in terms of ‘bringing to task' those that wish to use the Internet for illicit purposes,"...

Data Encryption Isn't So Secure, After All

Researchers find easy method to steal protected information

(Newser) - Accessing encrypted data can be as simple as chilling a computer memory chip, according to a Princeton research group. The researchers were able to break through encryption in Windows, Macintosh, and Linux operating systems, reports the New York Times, calling into question the security methods that companies, government agencies, and...

Stories 41 - 60 | << Prev   Next >>