Uncategorized

Hackers infiltrated White House network

by Pierluigi Paganini According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, according to the media an unclassified computer network used by the US government was infiltrated by hackers. The New York Times reported that an […]

Hackers infiltrated White House network Read More »

Verizon Wireless and it’s Privacy Issues

The provider adds cookie-like tokens to alert advertisers to users’ interests. by Robert Lemos Cellular communications provider Verizon Wireless is adding cookie-like tokens to Web requests traveling over its network. These tokens are being used to build a detailed picture of users’ interests and to help clients tailor advertisements, according to researchers and Verizon’s own documentation.

Verizon Wireless and it’s Privacy Issues Read More »

Google launches first FIDO-compliant 2FA key

Warwick Ashford Google has launched a USB security key as a simpler, stronger alternative to the six-digit,one-time passcodes (OTPs) used by its 2-Step Verification facility. Until now, second-factor authentication has relied on OTPs by text message, but this approach has several challenges, such as when users lose their mobile phone. Hackers have also adapted to

Google launches first FIDO-compliant 2FA key Read More »

With This Tiny Box, You Can Be Anonymous Online

BY ANDY GREENBERG Editors’ note: Updated below with clarifications about Germar’s claims of Anonabox using “custom” hardware. No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required

With This Tiny Box, You Can Be Anonymous Online Read More »