mSpy now selling phones pre-loaded with spyware
You used to have to get your hands on somebody's gadget to eavesdrop on them like a creepy stalker, but no more! Now, you can just buy your target a boobytrapped bugging device-cum phone, wrap it up...
View ArticleFacebook fake poses as Prince Harry to con Austrian tradesman
A Facebook user posing as Prince Harry has conned an Austrian floor fitter out of thousands of euros after 'offering' the tradesman a one million pound contract to renovate the parquet floors at...
View ArticleUK gov wants to censor legal but "unsavoury" YouTube content
The UK government wants the power to pull "unsavoury" content - with an eye trained on terrorist material in particular - regardless of whether it's illegal or not.
View ArticleSecurity Essentials: What is PCI DSS?
Many of us know what PCI DSS stands for, but we haven't actually read through the standard. John Shier was one of them - so he decided to put things to rights...
View ArticleGoogle sued for data-mining students' email
The suit charges the company with surreptitiously building profiles of students by scanning their email in order to target advertising at them.
View ArticleWhatsapp's Jan Koum says privacy won't suffer with Facebook acquisition
Jan Koum, co-founder and CEO of Whatsapp, has responded to concerns that have surfaced since the company was acquired by Facebook.
View ArticleAdvice on getting the most from Windows XP, courtesy of the Google Play Store
Google Play just recommended some technical books I might like. To help me get the most out of Windows XP...
View ArticleMorrisons employee arrested in connection with staff payroll breach
100,000 employees' bank details were breached last week in what the company suggested was an insider job. A Morrisons employee has been arrested in Leeds.
View ArticleFirefox 28.0 takes on the PWN2OWN attacks already
Firefox 28.0 was released on 18 March 2014, just five days after four exploitable bugs in the browser were disclosed at the PWN2OWN competition. Paul Ducklin looks at what was fixed...
View ArticleSextortionist who preyed on Miss Teen USA and 150 others sentenced to 18 months
Jared James Abrahams, 20, a college student studying computer science, was sentenced to 18 months in federal prison on Monday - only the latest in a string of sextortionists to face jail time in...
View ArticleThree indicted over $15 million identity theft spree
Three men have been indicted in a New Jersey court, charged with participating in an identity theft conspiracy which could have cost its victims upwards of $15 million.
View ArticleNSA can record 100% of another country's telephone calls
The National Security Agency has the ability to record every single one of a foreign country's telephone calls and then play the conversations back up to a month after recording, according to a report...
View ArticleWhatsApp and privacy - will Facebook make things better, worse, or both?
WhatsApp, the super-popular SMS replacement acquired by Facebook for $19 billion, continues to wrestle with a thorny problem. How can it tame the public's attitude to its own attitude to privacy?
View ArticleUS DHS digs out 27,000-member child abuse ring buried on Tor
The child predators targeted children as young as 3 years old. More than 40 terabytes of data were seized, 15 men have been arrested, 251 child or teen victims have been identified.
View ArticleSSCC 139 – PWN2OWN, browser updates, Target alerts, PCI DSS and phishing...
Is a browser less secure if more people like to hack it? Is it OK to ignore alerts simply because you get too many? Do you back yourself to spot every single phish? And just how smart is the Google...
View ArticleRevenge-porn ‘scumbags’ slapped with $385,000 judgment
They had a racket wherein one site posted sexually explicit photos without permission of subjects. When victims panicked and asked for the photos to come down, they got sent to another site that...
View ArticleHootsuite suffers DoS attack, reassures users
Social media management tool Hootsuite has recovered from a denial of service (DoS) attack which left users unable to use the system for some time yesterday.
View ArticleApple users: Try these five tips for better Mac security
Security for Macs is often a hotly-debated topic, perhaps because Apple has a reputation for security that is based more on a brand promise than reality. Don't panic. Here are five simple tips to help...
View ArticleMicrosoft admits reading blogger’s Hotmail as part of leak investigation
Microsoft has admitted that it had read a former employee's email to confirm he had leaked confidential company information. While the search is considered legal, the company's actions have drawn...
View ArticleGoogle switches Gmail to HTTPS only
Google is now using an always-on HTTPS connection and encrypting all Gmail messages moving internally on its servers.
View Article