security Archives - Stuff

security

WhatsApp now lets you block people from adding you to groups

WhatsApp, the Facebook-owned instant messaging service will now give users the option to control who adds them to groups.

Fingerprint and face scanners aren’t as secure as we think they are

Despite what every spy movie in the past 30 years would have you think, fingerprint and face scanners used to unlock your smartphone or other devices aren’t nearly as secure as they’re made out to be. While it’s not great if your password is made public in a data breach, at least you can easily change it. If the scan of your fingerprint or face – known as “biometric template data” – is revealed...[Read More]

A secure relationship with passwords means not being attached to how you pick them

When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devi...[Read More]

Facebook ten year challenge: how our need to belong trumps our distrust of social media

When the ten year challenge began doing the rounds on social media, people rushed to post profile pictures of themselves from 2009, side by side with one from 2019, to highlight how much they had changed (or not) in the meantime. It is estimated that more than 5.2m social media users participated in this challenge.

You can now unlock WhatsApp with your face or your finger

Instagram and Messenger are expected to inherit the end-to-end encryption their stablemate WhatsApp enjoys, but in the meantime if you're using WhatsApp and an iDevice you can enjoy another layer of security: biometric authentication. Peeping significant others will soon need to find other ways to access bae’s messages.

Is your VPN secure?

About a quarter of internet users use a virtual private network, a software setup that creates a secure, encrypted data connection between their own computer and another one elsewhere on the internet. Many people use them to protect their privacy when using Wi-Fi hotspots, or to connect securely to workplace networks while traveling. Other users are concerned about surveillance from governments an...[Read More]

The quiet threat inside internet of things devices

As people increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and society as a whole. The problem is compounded by businesses radically expanding the number of sensors and remote monitors it uses to manage overhead lights in corporate offices and detailed manufacturing processes in factories. Governments, to...[Read More]

How Samsung Pay wants to replace your wallet

From drawing cash, to swipe, insert chip, and now tap-to-pay mechanisms — transacting in stores has evolved with the needs of humans. Now physical, plastic cards might become obsolete thanks to digital channels like Samsung Pay. Samsung Pay is the company’s digital payment platform, and aims to replace the wallet completely. How? By loading bank cards, as well as loyalty cards, into the Sams...[Read More]

The argument from cyberspace for eliminating nuclear weapons

At the height of the Cold War in 1982, American psychiatrist Robert Jay Lifton argued that the “central existential fact of the nuclear age is vulnerability.” That warning predated the proliferation of computers into almost every aspect of modern life, including nuclear weapons. Today, the destructiveness of nuclear weapons has been coupled with the vulnerability of computers to create new pathway...[Read More]

30 years ago, the world’s first cyberattack set the stage for modern cybersecurity challenges

Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how bigthe internet was – that is, how many devices were connected to it. So he wrote a program that would travel from computer to computer and ask each machine to send a signal back to a control server, which would keep count. The progra...[Read More]

Illuminating the ‘dark web’

In the wake of recent violent events in the U.S., many people are expressing concern about the tone and content of online communications, including talk of the “dark web.” Despite the sinister-sounding phrase, there is not just one “dark web.” The term is actually fairly technical in origin, and is often used to describe some of the lesser-known corners of the internet. As I discuss in my new book...[Read More]

As digital threats grow, will cyber insurance take off?

Cyberattacks cost the world more than natural disasters – US$3 trillion in 2015, a price that may climb to $6 trillion annually by 2021 if present trends continue. But most people – and even most businesses – don’t have insurance to protect themselves against this rising threat. Insurance against all kinds of risks – disease, disaster, legal liability and more – is extremely common. In the U.S., c...[Read More]

  • 1
  • 2
  • 7

Lost Password