The Supreme Court, last week, gave the FBI permission to hack into any computer anywhere in the world with the stroke of a single pen. Ignoring, for the moment, whether other countries are going to think this gives them permission to hack into any computer in the U.S., this could be problematic. What is at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Motherboard is reporting that over 7 million user accounts belonging to the Minecraft community “Lifeboat” are for sale. Security researcher Troy Hunt is loading the data onto his web site “Have I been Pwned?” so that people can check if there data was in hacked group. Lifeboat runs servers for custom multiplayer editions of Minecraft […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As could be expected, the Wendy’s data breach saga continues. A proposed class action lawsuit was filed by a credit union in Pittsburgh representing all banks who were affected by the breach. As reported by Brian Krebs in March, credit unions said that they saw a rise in fraudulent credit card use that was greater […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Blackberry CEO John Chen said that tech companies must balance customer privacy with lawful government interests. The translation of this is “we have given the Blackberry keys to a variety of governments”. And we only THOUGHT that Blackberrys were secure. One point that is important to understand is that for companies that have their own […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the U.S. has Snowden, The Brits have Privacy International. As part of a lawsuit, Privacy International obtained formerly secret files regarding the extent of British surveillance. The data the Brits are hoovering up includes private medical records, correspondence with your doctor or lawyer, financial data and other information. And the government admits that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Foreign Intelligence Surveillance Court or FISA Court has affirmed that the Feds do not need a warrant to search your email. Of course, if that email is encrypted – not like GMail, but with real encryption – then while they may have the FISA court’s permission to look at it, they will have to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]