Category: IT Security

Spähaffäre: Die Gesellschaft kann etwas gegen die Überwachung tun

http://www.spiegel.de/netzwelt/web/sascha-lobo-ueber-die-macht-der-oeffentlichkeit-in-der-spaehaffaere-a-974462.html

Spionage: 200 US-Geheimdienstler spionieren offiziell in Deutschland

http://www.spiegel.de/politik/deutschland/mehr-als-200-us-geheimdienstler-spionieren-offiziell-in-deutschland-a-975285.html

Gesichtserkennung: NSA soll täglich Millionen von Fotos sammeln

http://www.spiegel.de/netzwelt/web/nsa-sammelt-offenbar-millionen-von-fotos-fuer-gesichtserkennung-a-972715.html

“@DannyCrichton highlights the challenges of security with today’s Internet. It’s 2014. Do you know where your security is?” #ITSecurity

It’s The Security, Stupid!

“@CIO.com asked security companies, consultants and IT experts to discuss other potential flaws that are ripe for exploit. Please read full article to find out the five that should catch your attention.”#CIO, #ITSecurity

The Next Heartbleed: 5 Security Vulnerabilities to Watch

Is it still possible in today’s world to avoid having pictures of oneself online?

N.S.A. COLLECTING MILLIONS OF FACES FROM ONLINE IMAGES http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html

‘Interesting article from @DavidLinthicum on Cloud losing the PR war over security.’ #CloudSecurity

In the PR war over security, the cloud is losing

‘Hackers are using Find my #iPhone to Hold #iOS Devices for #Ransom.’ #iphonehijack

Apple devices ‘hijacked for ransom’ in Australia

‘How much privacy really remains?’ #Data, #privacy

How Urban Anonymity Disappears When All Data Is Tracked

‘How to give Open Source the support it needs…’ #OpenSSL, #Linux

OpenSSL and Linux: A Tale of Two Open-Source Projects

‘Critical Security Bug #Heartbleed Hits Up To 66 Percent Of The Internet.’

Here’s everything you need to know about the Heartbleed web security flaw

“Microsoft says it snooped on Hotmail to track leak giving us all a reason to quit Hotmail.” #microsoft #hotmail #privacy, #security

Microsoft sniffed blogger’s Hotmail account to trace leak

“@WIRED consulted with experts to compile this list of 10 measures tech companies should adopt to protect customer data, whether it resides on a distant corporate server or is making its way across the Internet.” #security, #privacy

Here is an excerpt from the Wired article. You can read the full article on: http://www.wired.com/threatlevel/2014/03/wishlist/  1) End-to-end encryption. This is the most important technological change. End-to-end encryption would help protect data through its entire journey from sender to recipient. Google and

“@the_intercept reports that top-secret documents contain new details about groundbreaking surveillance technology the #NSA has developed to infect potentially millions of computers worldwide with #malware “implants.” NSA & its counterparts use cookies from Google, Facebook, Twitter as surveillance “selectors.” #Internet

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

“In his keynote conversation at the SXSW Interactive conference this week, Edward Snowden emphasized that “Online security is only successful if every company does its part.” Do you think companies and individuals are making enough effort?” #Internet, #privacy

Online Security as Herd Immunity

“@forbes looks at four simple steps you can take to keep prying eyes away.” #Data Security, #Hacking

“Facing a real business threat from the fallout from the #NSA’s intelligence gathering, tech firms battle back.” #Cloud

Cloud Service Providers Fight Back, Challenge NSA

“OS X Mavericks still vulnerable, millions at risk of web hijacking” #ios, #osx

Update your iThings NOW: Apple splats scary SSL snooping bug in iOS Details about Apple SSL vulnerability and iOS 7.0.6 patch

“The list of router models affected by TheMoon worm is larger than previously thought” #Cyber Crime, #Malware

Exploit released for vulnerability targeted by #Linksys router worm

“Video shows how drive-by attacks turn healthy paranoia against their victims.” #IT Security

What a fake antivirus attack on a trusted website looks like