It doesn’t take a coding genius to steal your Social Security number, but you can be smarter than identity thieves.
Source: Steer clear of low-tech hacks: How to keep your information safe – CNET
It doesn’t take a coding genius to steal your Social Security number, but you can be smarter than identity thieves.
Source: Steer clear of low-tech hacks: How to keep your information safe – CNET
White-hat hacker demonstrates “OwnStar” on video
Source: Car Hacker Working With GM To Fix OnStar Vulnerabilities | Popular Science
Company agreed that a closed source module wasn’t a good fit for an open source browser.
Source: Not OK, Google: Chromium voice extension pulled after spying concerns
The NSA and its British counterpart the GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks,” according to the latest…
Source: NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users | TechCrunch
If you’re the type of person to upload photos to Facebook in huge batches, you know just how useful automatic tagging can be. But Facebook’s constantly improving its facial recognition,…
Source: Facebook is getting so good at recognizing people it doesn’t even need to see your face anymore
A privacy advocacy group is urging federal regulators to investigate Uber’s planned changes to its privacy policy.
Source: Feds Urged to Investigate Uber’s Plan to Track Users – NationalJournal.com
Your computer is leaking information. It’s not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor
Source: The $300 ‘PITA’ steals encryption keys with radio waves
Researchers sneak password-stealing app into Apple Store to demonstrate threat.
Source: Serious OS X and iOS flaws let hackers steal keychain, 1Password contents