fbpx
Tuesday, May 11, 2021
How law enforcement gets around your smartphone’s encryption

How law enforcement gets around your smartphone’s encryption

0
Enlarge / Uberwachung, Symbolbild, Datensicherheit, DatenhoheitWestend61 | Getty Images Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better…
COVID data manager investigated, raided for using publicly available password

COVID data manager investigated, raided for using publicly available password

0
Enlarge / Florida's apparently being a little too welcoming at the moment. Florida police said a raid they conducted Monday on the Tallahassee home of Rebekah Jones, a data scientist the state fired from her job in May, was part of an investigation into an unauthorized access of a state emergency-responder system. It turns out,…
Pardon the Intrusion #32: When an exploit becomes a work of art

Pardon the Intrusion #32: When an exploit becomes a work of...

0
Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we explore the wild world of security. Google Project Zero‘s elite team of bug hunters needs no introduction. The white-hat hackers have been adept at finding flaws in Android and iOS, but this impressive new…
Pardon the Intrusion #31: Stop using “123456” as your password

Pardon the Intrusion #31: Stop using “123456” as your password

0
Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we explore the wild world of security. And the yearly ritual continues. The list of worst passwords for 2020 is here, and it’s every bit awful as you would expect. According to an analysis of…
Zoom lied to users about end-to-end encryption for years, FTC says

Zoom lied to users about end-to-end encryption for years, FTC says

0
Enlarge / Zoom founder and CEO Eric Yuan speaks before the Nasdaq opening bell ceremony on April 18, 2019, in New York City as the company announced its IPO. Zoom has agreed to upgrade its security practices in a tentative settlement with the Federal Trade Commission, which alleges that Zoom lied to users for years…
Pardon the Intrusion #30: Your data is up for sale

Pardon the Intrusion #30: Your data is up for sale

0
Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we explore the wild world of security. During the first wave of COVID-19, contact tracing apps were touted as THE BIG SOLUTION to tackling the pandemic. Most countries rolled out their own versions, and later…
Apple’s T2 security chip has an unfixable flaw

Apple’s T2 security chip has an unfixable flaw

0
Enlarge / The 2014 Mac mini is pictured here alongside the 2012 Mac mini. They looked the same, but the insides were different in some key—and disappointing—ways. A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access. The flaw is one…
Inside FIDO Alliance’s vision of a future free of passwords

Inside FIDO Alliance’s vision of a future free of passwords

0
Most services you use on your phone or laptop, from email providers to food delivery providers, require you to have a password. With so many services and websites, it’s hard to come up with unique passwords and remember all of them. So, a lot of people end up using the same password for multiple services…
Google Assistant’s new Guest Mode is ‘incognito mode’ for your voice commands

Google Assistant’s new Guest Mode is ‘incognito mode’ for your voice...

0
Google announced today that it’s introducing a new Guest Mode in the Google Assistant to pause recording your conversations. This is essentially an “incognito” mode which won’t record any of your queries. While this use case might be useful for queries you don’t want the company to record, it can also come in handy when…
Pardon the Intrusion #27:

Pardon the Intrusion #27:

0
Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we explore the wild world of security. Let’s face it. We all have too many online accounts and too many passwords to remember. Password fatigue is real — but password managers or single sign-ons (SSO)…

Recent Posts