The use of so-called drones - unmanned aircraft - for domestic security purposes, surveillance of citizens and putative criminals and organizations raises many legal and ethical concerns particularly with regard to the Fourth Amendment to the US Constitution, Council of Europe instruments, and the EU Data Protection Framework, according to a research paper. ...
Democratic movements can flourish online, but just as easily get censored. A group of researchers is developing solutions to the vulnerabilities and privacy problems with using big social media platforms like Facebook and Twitter. ...
Gimmicky contest ads and flashy free-prize messages may be an instant turnoff for mobile users, according to researchers. In a study, a tempting offer of a free prize drawing for registering on a mobile website led users to distrust the site. ...
In January and April 2014, Oracle has released critical Java software security updates. They resolve vulnerabilities that affected the "Java Secure Socket Extension" (JSSE), a software library implementing the "Transport Layer Security" protocol (TLS). TLS is used to encrypt sensitive information transferred between browsers and web servers, such as passwords and credit card data, for example. ...
Computer scientists have found a flaw in the way that secure cloud storage companies protect their customers’ data. The scientists say this weakness jeopardizes the privacy protection these digital warehouses claim to offer. Whenever customers share their confidential files with a trusted friend or colleague, the researchers say, the storage provider could exploit the security flaw to secretly view...
A revolutionary new method of encrypting confidential information has been patented by scientists inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other. ...
An ultra-high security scheme that could one day get quantum cryptography using Quantum Key Distribution into mobile devices has been developed and demonstrated. Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected...
Scienitists have managed to create an entanglement of 103 dimensions with only two photons. The record had been established at 11 dimensions. The discovery could represent a great advance toward the construction of quantum computers with much higher processing speeds than current ones, and toward a better encryption of information. ...
A new article reviews developments in quantum cryptography and describes how we can keep our secrets secret even when faced with the double challenge of mistrust and manipulation. ...
Company says it cracked open the Hotmail account of an unnamed blogger involved in a Windows 8 espionage case in part because he was selling Windows Server activation keys. ...
Company's legal department determined it had the right to go through private email account, citing leak of proprietary Microsoft code. ...
The company's legal department determined that it had the right to go through a private email account, citing a leak of proprietary Microsoft code. ...
Board member Michael Brown will serve as interim CEO while maker of Norton antivirus software hunts for its second chief executive in two years. ...
In a he-said she-said scenario, it's unclear who or what is responsible for the sustained blackout. ...
There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way to keep intruders away from private networks. Now, a new study reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be...
The tech giant announces the creation of services to help corporations use big data in the battle against white-collar crime. ...
While criticizing US surveillance activities as a threat to democracy, the Google CEO says more sharing could also save hundreds of thousands of lives. ...
The study claims consumers will spend $25 billion, and waste a collective 1.2 billion hours, fixing problems created by malware on pirated software. ...
Nevermind the vociferous denials from tech titans like Google, Microsoft, and Apple. They knew the government was collecting their user data, the NSA's general counsel says. ...
One of the game maker's servers is breached -- allowing hackers to create a phony Apple log-in screen that prompts users for personal information. EA says it now has the situation under control. ...