fbpx
File photo. (REUTERS/Kacper Pempel ) Any car owner with a keyless entry and ignition system, be warned: Chinese security researchers have proven that with equipment costing about $25, hackers could easily open car doors remotely from up to 1,000 feet away, start the cars' engines and drive away. Sec...
I just watched “The Circle”, a thriller about a computer company which uses internet connectedness to eradicate privacy in the name of “transparency” and “democracy”. The film is fictional, but the conflict between privacy and internet capitalism is real. The giants of the computer world...
  • Saturday, 13 May 2017 12:06
  • By:
Robocalls flooding your phone? Here’s how to stop them – or get a bit of revenge An unfamiliar number appears on your cellphone. It is from your area code, so you answer it, thinking it might be important. There is an unnatural pause after you say hello, and what follows is a recording telling y...
An exterior view shows the main entrance of St Bartholomew's Hospital in London, one of the hospitals whose computer systems were affected by a cyberattack, Friday, May 12, 2017.(Matt Dunham/AP Photo) A global cyberattack leveraging hacking tools widely believed by researchers to have...
The computers are watching. Imagine if you lost your keys and instead of fishing around in the couch cushions, you could just pull out your phone and search for them. Just a quick, textual query with a quick response that they're on your desk, you doofus. This is not only possible; it's possible now...
Security flaws smash worthless privacy protection Analysis To protect mobile devices from being tracked as they move through Wi-Fi-rich environments, there's a technique known as MAC address randomization. This replaces the number that uniquely identifies a device's wireless hardware with rando...
Net neutrality, the idea that internet service providers must treat everything equally, has been described as ‘the first amendment of the internet’. Photograph: Juice/REX/Shutterstock US campaigners rejoiced in 2015 when ‘net neutrality’ enshrined the internet as a free and level playing fie...
  • Friday, 12 May 2017 12:16
  • By:
How private is your iPhone, and the personal data stored on it? We examine the iPhone's built-in privacy measures, explain how to protect your iPhone privacy, and argue that Apple is more deserving of your trust - and your data - than Google. Latest: iMessage's end-to-end encryption has been improve...
Original Story, 5/9/17 at 4:11 p.m: For serious Starbucks go-ers, their mobile app makes paying for your Grande iced coffee easy as can be - but users who chose to link their Starbucks account to their banks are finding themselves victims of a major scam. A reporter at Buzzfeed explained that l...
The job posting was for a personal assistant. It paid $350 a week and would involve picking up mail, dropping packages off at the post office and some shopping. Kaya was 31, had just returned to Toronto after working overseas and was desperate to make some money, so she replied to the Craigslist pos...
Recently I handed over the keys to my email account to a service that promised to turn my spam-bloated inbox into a sparkling model of efficiency in just a few clicks. Unroll.me’s method of instant unsubscribing from newsletters and junk mail was “trusted by millions of happy users,”...
The infamous hacktivist group Anonymous has released a chilling new video — urging people across the globe to “prepare” for World War 3 — as the US and North Korea continue to move “strategic pieces into place” for battle....
Listen to computer virus pioneer John McAfee speak on the potential lack of security that comes from cameras and microphones on cell phones. USA TODAY DENVER — Computer security pioneer John McAfee pulls out his cell phone to stare at a notification on the screen. “It says something changed...
  • Wednesday, 10 May 2017 08:13
  • By:
The new malware emerged exploiting vulnerabilities that a researcher reported in March Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.   The malware, called Persirai, has been found i...
Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, according to a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to ...
A decade-old vulnerability in Intel chips has been discovered, leaving thousands of Windows computers susceptible to hijacking and remote takeovers. Intel disclosed the critical bug last week and the weakness appears to be in the Active Management Technology (AMT) feature used by IT administrators t...
Back in February, we learned from a security researcher that various iOS apps can secretly leak login data and other personal information to hackers that know how iOS works, and how to take advantage of various flaws. Three months later, it looks like many of these apps, including mobile b...
One of the most popular passwords in 2016 was "qwertyuiop," even though most password meters will tell you how weak that is. The problem is no existing meters offer any good advice to make it better—until now. Researchers from Carnegie Mellon University and the University of Chicago have just unve...
An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday.   The worm — which arrived in users' inbo...
Achieving internet privacy is possible but often requires overlapping services It’s one of the internet’s oft-mentioned 'creepy' moments. A user is served a banner ad in their browser promoting products on a site they visited hours, days or months in the past. It’s as if the ads are following ...
President Trump will be watching and listening. Time to batten down the hatches. Protecting individual privacy from government intrusion is older than American democracy. In 1604, the attorney general of England, Sir Edward Coke, ruled that a man’s house is his castle. This was the official d...
Google has no single authority metric but rather uses a bucket of signals to determine authority on a page-by-page basis. Google’s fight against problematic content has drawn renewed attention to a common question: how does Google know what’s authoritative? The simple answer is that it...
A decision earlier this year by the U.S. Congress to overturn rules adopted by the Federal Communications Commission that would have prevented internet service providers from collecting user information without permission has given people a new reason to be concerned about their online pri...
Security researchers have found a music player app in the Google Play Store, which has already been downloaded by thousands of users, to be riddled with malicious malware. Going by the name "Super Free Music Player", the app was uploaded to Google Play on 31 March and has already garnered between 5,...
A FEW HOURS after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel. It soon trained its built-in camera on its target, a desktop computer’s tiny blinking light inside a third-floor office nearby. The pi...

AOFIRS

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media