Mattel's new "Hello Barbie" has more tricks up her sleeve than just saying hello. With the press of a button, Barbie's embedded microphone turns on and records the voice of the child playing with her.
The recordings are then uploaded to a cloud server, where voice detection technology helps the doll make sense of the data. The result? An inquisitive Barbie spy who remembers your dog's name and brings up your favorite hobbies in your next chitchat. The doll has privacy activists demanding its removal. The Campaign worries that the toy leaves children entirely vulnerable to sneaky advertorial efforts from the giant toy company.Read more
Google and Core Security are at odds over the severity of a vulnerability affecting a number of Android mobile devices, details of which were released by the security vendor today.
The issue was reported to the Android security team and in subsequent communication between the two parties, the severity of the vulnerability was debated, culminating with Core’s disclosure. Google three times acknowledged Core’s report and request for a timeline on a patch, and each time Google said it did not have one. The flaw is a remotely exploitable denial-of-service vulnerability in Wi-Fi-Direct, a standard that allows wireless devices to connect directly.Read more
As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives.
With an emphasis on intuitive collaboration and enhanced productivity, initiatives such as BYOD encourage this sort of working behavior. From a security perspective however, it also heightens the level of risk in a company. In light of the changes to how we work, a new research conducted a global study which revealed the working habits of professionals around the world, and their attitudes towards online data protection.Read more
A leading internet activist has tricked Swedish security and defense experts into joining an open Wi-Fi network he set up to challenge digital surveillance. He discovered some of them were using Skype and looking at eBay while working.
The hacker created the Wi-Fi network at a conference earlier this week. Given the network was not encrypted, he managed to monitor the sites people visited, along with emails and text messages of up to 100 delegates, politicians, journalists and security experts among them. The security establishment was in Sälen pushing for more surveillance, but then leading figures go and log on to an unsecure Wi-Fi network.Read more
It was written about the dangers that public Wi-Fi hotspots pose to users time and time again, but today let's talk about threats that come specifically from home wireless networks. Many wireless router users do not consider them to be threatening, but we are here to shed some light on this unfortunate reality.
This guide is by no means complete, but several of these great tips can help you improve your home network security. One of the most serious mistakes often made is using the default, out-of-box, admin password. Combined with some non-critical remote vulnerability or an open wireless connection, this might give criminals full control over the router.Read more
Internet-connected households in the United Kingdom are at risk of getting attacked through their wireless router. Unsecured routers create an easy entry point for hackers to attack millions of home networks in the UK.
The vast majority of home routers aren’t secure. If a router is not properly secured, cybercriminals can easily gain access to an individual’s personal information, including financial information, user names and passwords, photos, and browsing history. One of the biggest risks on any Wi-Fi network is DNS hijacking. Malware is used to exploit vulnerabilities in a user’s unprotected router and surreptitiously redirects the user from a known site.Read more
Data released from a consumer security risks survey found that nearly a third of participants are casual when making online transactions. This action leads to security vulnerability of financial data at risk and poses problems for banks and e-payment systems if they have to refund their clients’ losses.
The study was conducted through an online survey from May to June this year with users from 23 countries. Though users are worried about cyber threats, they still do little to protect themselves. Shocking data shows that children are the most vulnerable Internet users, which poses as a danger for parents.Read more
Cyberespionage is the weapon of choice in the 21st century. Even a seemingly harmless mobile app is able to find out quite a few secrets that a careless user might reveal, let alone full-scale surveillance campaigns specifically targeted at representatives of major businesses and government organizations.
This autumn’s newest revelation is the discovery of a spy network, dubbed ‘Darkhotel’, which had been active for seven years in a number of Asian hotels. Furthermore, smart and professional spies involved in this long-running operation created a comprehensive toolkit consisting of various methods that can be used to break into victims’ computers.Read more
Computers housing the world’s most sensitive data are usually isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers.
All of this is done to keep important data out of the hands of remote hackers. But these security measures may be futile in the face of a new technique researchers in Israel have developed for stealthily extracting sensitive data from isolated machines — using radio frequency signals and a mobile phone. The attack recalls a method the NSA has been secretly using for at least six years to siphon data in a similar manner.Read more
Do you know the weakest link in the security chain that protects your personal data, banking files and other kinds of critical information? It’s you. For years there was one great threat that no security system could truly stand against: the human factor.
Nowadays, IT pros from security departments answer the question of what to allow and disallow: prohibit too much and employees will start to ignore rules or they will not be able to work efficiently. Give them too much freedom and you risk critical corporate information and their precious personal files draining away at data signaling speed. There will never be a balance until we learn that we are responsible for the data leakages that we cause.Read more