Computer, Internet Security

Chrome to Flag More HTTP Pages ‘Not Secure’

Chrome to Flag More HTTP Pages ‘Not Secure’

Google began in January flashing warnings in the Chrome address bar that a page was “Not Secure” if password or payment card data fields were present. “Since the change in Chrome 56, there has been a 23 percent reduction in the fraction of navigations to HTTP pages with password or credit card forms on desktop, and we’re ready to take the next steps,” said Emily Schechter of the Chrome...

Protecting Your Computer from Getting Compromised and Becoming Part of a Botnet

Protecting Your Computer from Getting Compromised and Becoming Part of a Botnet

In the latest episode of The New York Daily News' exclusive webshow "World War E," national security expert Mike Rogers explains not only how botnets function but also how they can be used to launch crippling cyber attacks. Here's how to make sure you and your PC aren't part of the problem: 1) Digital Diagnosis: Main characteristics can include your computer being particularly sluggish or...

Are You Aware of Where Your Old Email Addresses Are?

Are You Aware of Where Your Old Email Addresses Are?

Whenever old email addresses get killed off, even ones you’re done with altogether, you may nevertheless end up in trouble if you are in the habit of “autoforwarding” your old addresses whenever you switch to a new provider, rather than explicitly shutting those old addresses down. You could end up in serious trouble if you leave an old email address set up as the password recovery...

Surprise! Your Online Banking Password Might Not Be as Sound as You Believe

Surprise! Your Online Banking Password Might Not Be as Sound as You Believe

It turns out several leading US banks do not require case-sensitive passwords, which could make it easier for someone to access your account. "Case-insensitivity by itself doesn't have to be much of a security problem," said Per Thorsheim, a password expert and security researcher. "Case-insensitivity does make things easier for hackers, but there's a lot of other factors that must be part of the...

  • More at ZDNet
  • |
  • |
How to Safeguard Your Digital Assets

How to Safeguard Your Digital Assets

Despite the volume of traffic on the internet, anything you send online is susceptible to hacking. You need to use encryption and not just any kind -the kind that even the fastest computers or networks won't be able to crack. If you have something digital that needs protection, take a look at these tips: 1) Encrypt Gmail: A free Chrome Extension called CryptUp can be used for end-to-end...

How a Man’ Life was Destroyed Due to a Typo in IP Address by Police

How a Man’ Life was Destroyed Due to a Typo in IP Address by Police

You probably remember Amazon’s engineer whose typo messed up the entire AWS (Amazon Web Service). But what happened in the United Kingdom ruined a man’s life. The man in question is Mr. Nigel Lang, a UK resident who in 2011 got arrested at his home because, according to the police, he was a suspect for keeping child pornographic content on his electronic devices. That’s when his nightmare...

Kids’ Toys Have Serious Privacy Issues

Kids’ Toys Have Serious Privacy Issues

Let’s analyze a couple of examples to understand the nasty surprises smart toys can hold. 1) Spying: In December 2016, privacy advocates filed a complaint with the US Federal Trade Commission against Genesis Toys, producer of Cayla dolls and i-Que toy robots. The plaintiffs were quite clear from the start: “This complaint concerns toys that spy.” 2) Insecurity: Spiral Toys’ CloudPets are...

Virtual Assistants Hear Everything, so Watch What You Speak

Virtual Assistants Hear Everything, so Watch What You Speak

The law of unintended consequences is once again rearing it’s ugly head: Google, Apple, Amazon and others now make virtual assitants that respond to commands, and recordings can trigger them. Those deploying virtual assistants are asking for a lot of trouble. Not only do recordings become the crux of litigation, but the safety and security guards are all but missing. There is no regimen, no...

Amazon Intros Tools to Assist Parents Monitor Tablet Use of Kids

Amazon Intros Tools to Assist Parents Monitor Tablet Use of Kids

Amazon is introducing new tools to help parents see what their kids are doing on the company's Fire tablets. As a bonus, the e-commerce giant says its service will also help spark discussions about the books kids read and the videos they watch. Parents first have to sign up with Amazon's FreeTime service, a set of tools for pre-approving how much time kids spend on a tablet and what they do with...

Travel Wi-Fi Routers: Are They Secure?

Travel Wi-Fi Routers: Are They Secure?

Last week at Kaspersky Lab’s Security Analyst Summit (the SAS) Jan Hoersch, an IT security consultant at Securai GmbH, talked on vulnerabilities he had discovered in connected Internet of Things (IoT) devices. During the 20-minute talk, four out of seven of the most flawed products mentioned were travel routers. Travel routers mainly get positive, even glowing, reviews on sites like Amazon, but...

Data Security Fears on Airline Loaned Devices Tackled

Data Security Fears on Airline Loaned Devices Tackled

After the ban on laptops by the US on flights originating primarily from airports in the Middle East, Emirates, Qatar and Etihad airlines offered to lend laptops and tablets to customers. With rampant security threats, there were fears malware could be spread via shared devices. However, experts contend that with proper security measures taken into consideration, the stop-gap measure should roll...

  • More at ITP
  • |
  • |
Microsoft Finally Divulges what Data Windows 10 Really Collects

Microsoft Finally Divulges what Data Windows 10 Really Collects

Microsoft is updating its privacy statement and publishing information about the data it collects as part of Windows 10. “For the first time, we have published a complete list of the diagnostic data collected at the Basic level,” explains Windows chief Terry Myerson in a company blog post. “We are also providing a detailed summary of the data we collect from users at both Basic and Full...

I can’t be Bothered Recalling Tricky Passwords. Will I be Hacked?

I can’t be Bothered Recalling Tricky Passwords. Will I be Hacked?

According to analysis of 10m passwords made public in data breaches in 2016, more than half were the same 25 passwords. The most used, accounting for nearly 17% – almost one in five – of results, was “123456”. Rounding out the top four were “123456789”, “qwerty”, “12345678”, and “111111”. Among the sites to be hacked last year were MySpace, LinkedIn, and the Russian social...

How Secure are VPNs?

How Secure are VPNs?

The original idea behind VPNs technology was to create a private connection between multiple people and devices across the Internet. VPNs typically allowed only authenticated remote access via tunneling protocols and other encryption techniques to prevent disclosure of private information. But, sensing an opportunity, the Joe Crooks of this world came to realize people like Average Joe might have...

An Essential Guide to Backing Up Your Critical Data

An Essential Guide to Backing Up Your Critical Data

Here’s a quick guide to the basics, with tips from experts at The Wirecutter, the product review website, and J. D. Biersdorfer, who writes the Tech Tip features for The New York Times: Backing Up Your Computer: An automated backup system can preserve all the essential files, even your iTunes library, that are stored on your computer. Microsoft includes File Recovery software with Windows 10,...

Improvements to the Google Safe Browsing’s Site Status Tool

Improvements to the Google Safe Browsing’s Site Status Tool

Google Safe Browsing gives users tools to help protect themselves from web-based threats like malware, unwanted software, and social engineering. They are best known for warnings, which users see when they attempt to navigate to dangerous sites or download dangerous files. They also provide other tools, like the Site Status Tool, where people can check the current safety status of a web page...

Read on to know the best tricks and tips for internet & computer security

This category provides expertly curated internet security news. Most of the people do not have a complete idea about what is internet security and why it is so important. The internet security is a branch of cyber security that mostly deals with the browser, software and other applications that connect to the internet. This category covers the latest news related to but not restricted to internet security systems, internet security software and internet security companies. Not only this, but to complete the loop we also cover the internet security reviews, internet security software reviews to provide our users a correct picture of what’s happening around, if the software they are using can protect them from the latest malware and vulnerabilities discovered. In short the news is aimed to help the user assess if he/she is following the gold standard for their internet security. This is highly important because one small breach and you might end up losing sensitive information like your credit card details, online banking credentials, social security number and other personal details which also puts you at a grave risk of the identity theft.