Security News, Page 10 ▼

Proposed Bill Could Force Tech Companies To Provide Backdoor Access

01/13/2016, So far tech companies like Apple and Google have been successfully battling the US government in terms of denying them backdoor access to their customer information, as well as devices. This isn’t so much about them not co-operating with the government,...

LG’s Factory Reset Protection Bypassed In Minutes

01/13/2016, When someone steals your phone, the first thing they’ll do is wipe your data. This is ensure that whatever security measures you had, like Find My iPhone, will be reset so that it is treated like a brand new device, meaning that you won’t be able to...

Dutch Police Claim To Have Cracked PGP BlackBerry Phones

01/12/2016, If there is one thing that BlackBerry is known for, it would be their security. This is why despite BlackBerry losing ground to the likes of iOS and Android, there are still many companies, governments, and individual users out there who remain loyal to...

Touch ID Support For Notes Added In iOS 9.3

01/11/2016, We have to admit that we find it odd that after all these years, Apple has not added the option to make the Notes app more secure. It is possible that Apple is assuming that you would have locked your phone and that if you unlocked your phone, it means...

Lenovo’s 2016 Moto Flagships Will Feature Fingerprint Scanners

01/11/2016, According to a rumor last month, it was suggested that 2016 could see the return of fingerprint scanners to Motorola phones (or “Moto by Lenovo” phones, as the brand is being phased out). Turns out the rumors were right because a report from Tech Sina...

Dutch Government Wants Stronger Encryption, Slams Backdoor Requests

01/04/2016, While the US is trying to convince tech companies like Apple and Google that giving them backdoor access is in the interest of national security, other countries like the UK and China have already enacted laws that would basically give them more access...

Thinga Is A Search Engine Designed For Kids

01/04/2016, You can search for all kinds of things on Google, ranging from things that are perfectly innocent, all the way to the weird and mind-boggling, things that children really shouldn’t be searching for or seeing on the internet. However the good news for...

Microsoft Will Warn Users If They Are Targeted By Government Hackers

12/30/2015, As if it wasn’t bad enough the regular hackers are trying to break into our systems and steal our information, there are also state-sponsored hackers who are out targeting systems as well, although in the case of the latter it is presumably done for the...

Your Smartwatch Can Apparently Reveal What You Are Typing

12/30/2015, A lot of attention has been paid to security on mobile devices like smartphones and tablets. However what about wearable tech? Shouldn’t security for such devices be just as important? If you think that stealing information about how many steps you’ve...

Samsung Launches GAIA, Makes Their Smart TVs Harder To Hack

12/30/2015, In recent times when connected objects are starting to become more ubiquitous, some security analysts have criticized such products not so much for their functionality, but for their security because as it stands, there is no standard security protocol to...

John McAfee Wants To Do Away With The Password As Well

12/29/2015, Passwords are used to protect our accounts, but as hacking technology has improved and with people less willing to come up with complex passwords that are less prone to being guessed, an alternative needs to be found. So far we have seen tech companies...

AVG’s Chrome Extension Security Flaw Left Millions At Risk

12/29/2015, It seems that if you have been using AVG’s Web TuneUp Chrome extension, there is a good chance that you could have been exposed. For those who don’t use or who are unfamiliar with the Web TuneUp extension, basically what it does is it basically flags...

Your Windows 10 Encryption Key Could Be Stored In The Cloud

12/29/2015, One of the ways that tech companies like Apple and Google have changed the privacy game is by giving you, the end-user, the keys to your own encryption, much to the dismay of law enforcement officials who believe that they should be given a key as well in...