A sophisticated cyber-crime campaign is leaving millions of people vulnerable to having malware installed on their computers simply by visiting high profile websites.
The campaign is using the fast-growing method of 'malvertising' to spread a pernicious form of malware called ransomware, which encrypts all the files on the hard drive of a victim's computer, and if the victim doesn't pay a ransom by deadline, those files are lost forever. The researchers were even able to estimate how much money the criminals were earning on a daily basis as the ransoms are charged in bitcoin, meaning all payments are traceable via the public blockchain.Read more
A secret and scrappy court battle that Yahoo launched to resist the NSA’s PRISM spy program came to an end in 2008 after the Feds threatened the internet giant with a massive $250,000 a day fine if it didn’t comply and a court ruled that Yahoo’s arguments for resisting had no merit.
The detail of the threat became public after 1,500 pages worth of documents were unsealed in the case, revealing new information about the aggressive battle the Feds fought to force the company to bow to its demands. Yahoo fought to unseal the case documents to provide better transparency about the government’s data collection programs.Read more
Malicious advertisements have popped up on websites such as YouTube, Amazon and Yahoo, part of a sophisticated campaign to spread malware, Cisco said Monday.
When encountered, the malicious advertisements cause a person to be redirected to a different website, which triggers a download based on whether the computer is running Windows or Apple’s OS X, wrote Armin Pelkmann, a threat researcher. The network has been nicknamed Kyle and Stan due to those names appearing in subdomains of more than 700 websites the attackers have set up to distribute the malware, Pelkmann wrote.Read more
Google’s handling of “right to be forgotten” requests from European citizens will come under fire from the continent’s privacy watchdogs on Thursday, after the search engine restricted the removal of Internet links to European sites only.
European data protection authorities are meeting representatives of Google, Microsoft, which operates the Bing search engine, and Yahoo to discuss the implementation of the landmark ruling from Europe’s top court upholding people’s right to request that outdated links be removed from Internet search results. European Union privacy watchdogs have several concerns on the way the ruling, which has pitted privacy advocates against free speech defenders, is being implemented, particularly by Google, according to a person familiar with the matter.Read more
Blink, a mobile messaging application that lets users share self-destructing messages, has been acquired by Yahoo. The app competed in an increasingly crowded space alongside Snapchat, of course, but also newer entrants like Frankly, Confide, Wickr, and others. Terms of the deal were not disclosed.
All seven Blink team members, including the founders, will now be joining Yahoo. Blink is a product of Meh Labs, a company founded by ex-Googler Kevin Stephens and Michelle Norgan. Originally, the startup had been focused on a location-based service called Kismet which grew popular around the time of SXSW 2012, when apps like Highlight and Banjo were starting to take off.Read more
Apple has the technical ability to disclose a wide range of information about a user upon the request of the authorities – from the person’s name and contact information to their photos and e-mail content.
This refers to the new company policy of cooperation with the law enforcement agencies. If there is a valid search warrant and the serial number of the iPhone, iPod touch or iPad the Cupertino-based company may extract some types of data, even if the device has a password.
In particular, this refers to the user files created with proprietary applications. These include SMS-messages, photos, videos, contacts, and call history records. In case if the iOS-device is password-protected, the Apple cannot disclose the contents of the e-mail, calendar plans or the data of the third party applications.Read more
LAST year, I spent more than $2,200 and countless hours trying to protect my privacy. Some of the items I bought — a $230 service that encrypted my data in the Internet cloud; a $35 privacy filter to shield my laptop screen from coffee-shop voyeurs; and a $420 subscription to a portable Internet service to bypass untrusted connections — protect me from criminals and hackers. Other products, like a $5-a-month service that provides me with disposable email addresses and phone numbers, protect me against the legal (but, to me, unfair) mining and sale of my personal data.
In our data-saturated economy, privacy is becoming a luxury good. After all, as the saying goes, if you aren’t paying for the product, you are the product. And currently, we aren’t paying for very much of our technology.Read more
The revelations of Edward Snowden keep on coming. The Guardian reports on a hacking program of the British Government Communications Headquarters (GCHQ) codenamed Optic Nerve. The program intercepted Yahoo webcam chats collecting and storing images of millions of users, even when individual users were not suspected of wrongdoing.
The leaked documents revealed that GCHQ secret files date from 2008 till 2010 and in the first 6 months Optic Nerve collected the still images from 1.8 million users globally. One of the files estimated till 11% of the content categorised as "undesirable nudity”.Read more
Facebook, Microsoft, Yahoo and Google on Monday began publishing details about the number of secret government requests for data they receive, hoping to show limited involvement in controversial U.S. surveillance efforts.
The tech industry has pushed for greater transparency on government data requests, seeking to shake off concerns about their involvement in vast, surreptitious surveillance programs revealed last summer by former spy contractor Edward Snowden. The government said last month it would relax rules restricting what details companies can disclose about Foreign Intelligence Surveillance Act (FISA) court orders they receive for user information.Read more
Representatives of Obama‘s Administration continue to insist that spying on Americans is not a violation of constitutional rights of citizens and carried out exclusively in the interests of national security.
However, Chris Kitts, the father of beforeitsnews.com, believes that the obtained information is used not only for security purposes.
According to Chris Kitts, Washington creates “The machine for the implementation blackmail. Now they have access to the emails of people who are in the data store in Utah.Read more