Techmeme

Results 1 - 10 of about 59:

Mark Stockley / Naked Security:
Facebook fixes vulnerability reported by security researcher that could have allowed hackers to delete photos in all albums they have permission to view   —  How one man could have deleted any photo album he could see on Facebook  —  Facebook is probably the biggest database of photographs ever compiled.
Feb 12, 2015, 10:20 AMIn context
Lisa Vaas / Naked Security:
Disgruntled employees are increasingly e-sabotaging businesses, FBI says   —  Employees with an axe to grind are increasingly sticking it to their current or former employers using e-tools such as cloud storage sites or remote access to a company's computer network, the US Federal Bureau …
Sep 25, 2014, 10:45 AMIn context
Lee Munson / Naked Security:
FBI arrests alleged member of NullCrew, the group behind attacks on WHO, PBS, DHS, Comcast, Bell Canada, others   —  FBI arrests alleged NullCrew hacker  —  Federal prosecutors have arrested and charged a Tennessee man for allegedly conspiring to attack a number of businesses and educational organisations since the middle of 2012.
Jun 18, 2014, 7:50 PMIn context
John Zorabedian / Naked Security:
Viber images and videos were not encrypted during transit or storage, company says “issue has already been resolved”   —  Here we go again: Viber mobile messenger app leaves user data unencrypted  —  Viber, a mobile messenger app that allows users to make phone calls …
Apr 27, 2014, 11:45 AMIn context
Lisa Vaas / Naked Security:
Google sued for data-mining students' email   —  Google is in hot water for scanning millions of students' email messages and allegedly building “surreptitious” profiles to target advertising at them.  —  According to Education Week, a “potentially explosive” lawsuit is wending …
Mar 19, 2014, 1:55 AMIn context
Paul Ducklin / Naked Security:
Gaping admin access holes found in SoHo routers from Linksys, Netgear and others   —  For many home users, the router-slash-firewall at the edge of their network plays an vital security role.  —  It acts as a stockade to keep crooks on the internet at arms' length, typically blocking inbound network connections by default.
Jan 6, 2014, 1:20 AMIn context
Paul Ducklin / Naked Security:
Anatomy of a password disaster - Adobe's giant-sized cryptographic blunder   —  One month ago today, we wrote about Adobe's giant data breach.  —  As far as anyone knew, including Adobe, it affected about 3,000,000 customer records, which made it sound pretty bad right from the start.
Nov 5, 2013, 9:45 PMIn context
John Hawes / Naked Security:
US Army ignores shared PC login flaw, asks soldiers to keep quiet   —  A soldier was made to sign a non-disclosure agreement by the US Army after pointing out a security flaw which allowed accounts on shared PCs to be accessed without proper authentication.  —  The trivial login issue …
Sep 3, 2013, 1:50 PMIn context
Lee Munson / Naked Security:
Facebook vulnerability that allowed any photo to be deleted earns $12,500 bounty   —  An Indian electronics and communications engineer who describes himself as a “security enthusiast with a passion for ethical hacking” has discovered a Facebook vulnerability that could have allowed for any photo …
Sep 2, 2013, 3:35 PMIn context
Paul Ducklin / Naked Security:
Android random number flaw implicated in Bitcoin thefts   —  Bitcoin is often in the news, not least because it is somewhat controversial.  —  It's a digital currency, backed by cryptography, not by any central issuing authority.  —  Its “coins” are strings of bits, and anyone can generate one …
Aug 12, 2013, 11:20 AMIn context

Sponsor Posts

Microsoft:
Helping homeless parents forge their futures  —  Meet the Detroit nonprofit that's inspiring employees through on-the-job education and training.
eero:
“The eero Beacon is the perfect addition to its family of products”  —  See what TechCrunch had to say about the 2nd generation of eero WiFi systems.
Zoho:
18 Pro Tips to Growth Hack your E-commerce Business  —  It wasn't so long ago, in 2010, when Sean Ellis coined the term “growth hacking.”  He was the man most companies in the Silicon Valley turned to when they needed to scale their businesses.
Vantiv:
Join us for a webinar on Deploying payments technology in the cloud: Debunk the myths!  —  Tune in for a panel discussion hosted by Vantiv in collaboration with Microsoft where experts will be discussing the benefits …
Worldpay:
Don't miss our VR webinar tomorrow  —  Study consumer perception and user trends in VR & AR, and see what we're doing to facilitate new digital experiences.