Ah, the plethora of passwords that we have to remember for all of the websites that have inevitably become a part of our lives. Social media, emails, blogs and forums, photo hosting sites, and what ever else – there are dozens of them. Thank goodness for Chrome auto-fill settings, right?Yeah, sure, but there are probably at least a couple of login credentials that you don't feel comfortable to have automated by Chrome. Some users give in to the convenience of being able to enter said sites with just a tap, but there's usually a constant dread hanging over their heads whenever they leave their phone unsupervised. Others disable auto-fill for said places, but then are stuck with having to log in manually every time. By now, a lot of users have their important passwords set to something really long, so the latter method can be a pain.Well, how about utilizing that fingerprint sensor you have on your phone? Yes, yes you can. With an app called LastPass, you can keep all of your login … [Read more...] about How to use your fingerprint scanner to log in any website (Android)
How to apply social security disability
Imagine a criminal using your nanny cam to watch your house or to scream at your child—or even to post footage of your home on a crime boss’s website. And suppose your refrigerator were spewing spam e-mail, enraging people you’d never even met. The Internet of Things has been touted as many things. But what you haven’t heard is that it could be your worst enemy. Yet all of these incidents have actually occurred, according to news reports. And it’s likely that even more disturbing transgressions have been taking place unbeknownst to homeowners. For example, researchers have discovered that in some cases, they can hack the Internet of Things to intercept each document you print and divert it to a remote site, use your smart TV to bug your house, and even control the traffic light on the corner outside your home. For although the Internet of Things offers great convenience by linking our gadgets—an estimated 50 billion of them worldwide by 2020—it … [Read more...] about How to Build a Safer Internet of Things
Although it hasn’t made a huge dent in the tablet market yet — or perhaps we should call it the iPad market — Google’s Android operating system has been the top-selling smartphone platform for a while. That also means it’s a top target for scammers and malware developers eager to steal data and money from unsuspecting Android users. Last year brought some dire statistics, with security firms like McAfee and Lookout claiming sharp rises in Android malware, and even that three in ten Android devices will run into malware. Juniper Network famously reported a 472 percent increase in Android malware between July and November 2011, and Google has been pulling malicious apps from the Android Market (now Google Play) and just rolled out Bouncer, a new tool that attempts to automatically screen out bad apps before they hit the market. Still, new threats seem to arrive regularly, whether they’re malicious apps that record phone calls or pose as banking apps to … [Read more...] about The ultimate Android malware guide: What it does, where it came from, and how to protect your phone or tablet
It’s no secret that Facebook’s been busy whittling away the privacy you previously enjoyed within the site. That’s the deal we’ve made to continue being users, but every so often the scourge of a new feature or policy update sends us heading for our account settings, madly trying to understand how to protect ourselves. That, or you give up, give in, and give it all over to Facebook. The latest launch that has made it easier than ever to dig into your personal data is Graph Search. Though fun and incredibly revealing (for better or worse), we haven’t totally understood the potential and magnitude of this tool – until now. A little something called FBStalker has been developed, and it can find out what your weaknesses are and how to exploit them, all using Graph Search as well as information culled from your friends. If that doesn’t scare you just a little, it should. Here’s what you need to know. The FBStalker tool … [Read more...] about Everything you need to know about a little app called FBStalker
Also check out Best iPad apps for kids and Best iPhone apps for kids.Keeping your kids safe in this age of constant screen time is no easy feat. While kids are becoming more and more technically adept, their ability to discern the good from the bad in terms of content is a skill that must be developed. Going into dangerous or damaging waters can be as innocent as a simple spelling mistake (take the case of the 10-year-old girl who ventured into a content minefield by spelling the word “rapper” with only one ‘p’).Education, vigilance, communication, and precautionary measures can go a long way toward keeping your child safe — whether he’s opening YouTube videos on a smartphone or researching a history paper online.Have the “other” talkEducation is your first line of defense as a parent, and having the “other” talk should be a rite of passage. When your child begins using the Internet or computer, it’s important to sit … [Read more...] about Safety on the Internet: How to protect your children
By now, you’ve surely heard about the pathetic, anti-Islam video, “The Innocence of Muslims,” which reportedly lead to the death of a U.S. ambassador and three members of his staff last Wednesday, and has since sparked violent protests throughout much of the Muslim world. The situation is a ghastly catastrophe on all fronts, sparked by the most disastrous viral video in the Web’s short history.While the “Innocence” fiasco unearths a slew of human and political problems, the issues of censorship and free speech in an age of global connectivity may be the most pressing for the average Web user. In today’s hyper-connected world where barriers between countries seem more permeable than ever, Google increasingly plays gatekeeper to what you should and shouldn’t see.YouTube censorshipSoon after the attack in Libya, YouTube made the 14-minute video “temporarily unavailable” to users in Egypt and Libya. (The governments of both … [Read more...] about State of the Web: Online speech is only as free as Google wants it to be
It's open season on Windows Vista for hackers, crackers and virus and malware propagators.As any IT manager will recall, malware incursions and zero-day exploits of Windows, Internet Explorer and Office applications were all too common in 2006.Therefore, security providers and IT staff across organizations large and small have continued to vet, test and analyze Vista to uncover possible security weaknesses."There are many Vista security enhancements, but only time will tell if they are effective," Kaspersky Lab Senior Technical Consultant Shane Coursen told TechNewsWorld. "For the short term, we can assume that all will be effective to a certain degree. For the long-term, we know that malicious hackers are never satisfied to sit back and admit defeat.""The primary reason for our taking as long as we did to develop and release Vista is security," Jonathan Hatchuel, Business Group Executive for Windows Clients at Microsoft South Africa, told TechNewsWorld. "We focused on trying to … [Read more...] about How Tough Is Vista’s Defensive Lineup?
When Russian authorities nabbed the alleged master hacker behind the Blackhole malware kit last week, they sent a shockwave through the digital underground.As soon as news spread that Blackhole's author, known as "Paunch," and his partners had been arrested, the malware apparently began to suffer. Blackhole, typically updated once or twice a day, wasn't updated for four days.What's more, the service used to encrypt the Blackhole kit went offline almost as soon as the first tweet about the pinch of Paunch hit Twitter."Paunch is a big deal," Mikko Hypponen, chief research officer at F-Secure, told TechNewsWorld."According to our statistics, Paunch has been the biggest provider of exploit packs for the past two years," he said."Blackhole and Cool Exploit Kit -- both from Paunch -- have fueled the underground economy," added Hypponen. "Now that Paunch is off the market, we're probably going to see a fight on who will take his place."Paunch's departure likely will hurt the Blackhole … [Read more...] about SPOTLIGHT ON SECURITY ‘Paunch’ Arrest Puts Blackhole Hackers on Data Diet
With so many cybersecurity pros drowning in an ever-rising tide of hack attacks on their computer systems, an emerging approach to defending those systems may be the life preserver they've been looking for.The approach doesn't involve beefing up perimeter defenses, carefully scrutinizing network traffic, or applying analytics to employee behavior -- but it's aimed at the biggest security threat to all organizations: the Internet."Every security vendor in the world tries to figure out if something is good or bad," explained Kowsik Guruswamy, CTO of Menlo Security. "If it's good, we let it through. If it's bad, we try to block it."However, that approach -- as the day-to-day reports of data breaches show -- hasn't been working."We need something very different -- something that will take the malware problem off the table," Guruswamy told TechNewsWorld.One approach is essentially to isolate an organization's systems from the Internet, as Menlo does. Its Menlo Security Isolation Platform … [Read more...] about SPOTLIGHT ON SECURITY Is Isolating the Internet Key to Bulletproof Security?
A zero-day flaw in Oracle's Java programming language could make as many as 100 million computers connected to the Internet vulnerable to attack by cybercriminals.The threat posed by the Java vulnerability was considered so serious that the U.S. Department of Homeland Security urged computer users to turn off Java on their machines.The vulnerability discovered last week by security researchers exploits a flaw in version 7 rev. 10 and has already begun appearing in major kits used to create malware packages. It can be exploited to plant malware on PCs.Of the 3 billion devices running Java, about 13 percent are running the flawed version of the software, said Bogdan Botezatu, senior e-threat analyst with Bitdefender. Of those systems, he estimates some 100 million are running Microsoft Windows and are connected to the Internet."Given the next patch cycle for Java is scheduled for February 15th, there's a large window for end users to be unprotected," Botezatu told TechNewsworld.Oracle … [Read more...] about SPOTLIGHT ON SECURITY 100 Million Systems Vulnerable to Java Flaw