Apple spams users to promote iPhone 6s

iphone_ad

Microsoft managed to irritate a lot of people with its heavy-handed pushing of Windows 10, and now Apple has taken a leaf out of the company's book. December may be the time when many people think about getting a new phone -- and Apple is likely to fare very well out of upgrades -- but some iPhone owners have been upset by the appearance of spam in the App Store.

We're not talking about a mass mail-out inviting people to upgrade to the latest iPhone, but ugly, unsolicited popup ads used to push Apple's mobile. Describing the iPhone 6s as 'ridiculously powerful' the ads have been seen by those running iOS 9.1 and 9.2. It's something that could be dismissed, but spamming is unchartered waters for Apple.

Continue reading

Connected toys and the IoT could be the next weapons of mass surveillance

I'm_watching_you

Just a few days ago, we heard about the potential for the web-enabled Hello Barbie to provide hackers with personal data. Numerous vulnerabilities open up the potential for data to be stolen, but this could be the start of a worrying trend. If you thought the surveillance activities of the NSA and GCHQ are disturbing, things could be about to get much worse.

There is a movement underway that sees every conceivable device being transformed into a connected device. This is more than just the Internet of Things -- security experts are warning that not only could any devices connected to the internet (including web-enabled toys) could be used to spy on users, placing children at risk.

Continue reading

Why not use open source encryption?

Data encryption

There’s a lot of talk about encryption these days. Often the issue arises when moving data to the cloud, using solutions like Dropbox or Box. We start to wonder if our information will be safe if it’s no longer stored locally on computers in our offices. We are confident that Dropbox and Box store everything in a secure way -- we have little reason to believe that they don’t, right?

Next, we think, "OK, what happens when information leaves or enters the cloud? Is our communication safe? Maybe that information should be encrypted, too". Actually, there’s no question about it. Data should be encrypted when it moves in and out of a network and when it’s stored in the cloud.

Continue reading

Hotel California and the Internet's future

Hotel-California

When the Eagles released "Hotel California" in 1977, they were singing about drugs and the grip that addiction can hold over people. "We are all just prisoners here of our own device" is a stark reminder of how our own actions can end up trapping us, from which "we can never leave". But in the 21st century, these lyrics have taken on a new meaning. Look around any crowded place nowadays and it’s quite clear that many of us have become prisoners of literally our own devices -- smartphones, tablets, laptops, anything and everything with an Internet connection. Our lifestyles practically require us to always be on and connected to everyone else.

The Internet is our digital drug, and while it has proven immensely useful as a communications utility and public good, it has also enabled a select handful of powerful companies to take advantage of that need by monopolizing the Internet and segmenting it -- and us with it -- into silos under their control.

Continue reading

Mozilla ditches Firefox ad tiles experiment

firefox_screenshot

It can be hard enough to avoid advertising online, and Mozilla has been experimenting with yet another way to pull in money. The Tiles experiment has been running for a few months and saw ads brought to the Firefox homepage via, funnily enough, tiles.

The company has decided that the experiment is a failure, and now wants to shift its focus to delivering "relevant, exciting and engaging" content to users instead. Mozilla has been scrambling to find way to make its browser bring in the pennies, but admits that "advertising in Firefox [...] isn't the right business for us at this time".

Continue reading

My fridge is listening to me

hal9K

It seems oddly fitting that this week -- a week scarred by the bizarre and violent mass murder in San Bernardino -- that I received a LinkedIn invitation to connect with someone who listed this as their job description:

Install, maintain, and repair GPS, Wi-Fi, and security camera systems on tour buses. In 2010, working with grant money from Homeland Security, I installed security systems on a fleet of tour buses and I have been maintaining those systems since then. In 2011, I helped install multi-language listening systems on tour buses and have been the lead maintenance technician. Currently, I am project manager for upgrading a fleet of 50 tour buses with new GPS systems using Homeland Security grant monies. This requires coordinating with engineers of service providers to solve unusual, complex problems.

Continue reading

JD Wetherspoon's customer details leaked after cyber attack

drinking_in_pub

Personal details of hundreds of thousands of JD Wetherspoon customers have been accessed and leaked following a hack of its database. The cyber attack affects more than 650,000 customers, the UK pub chain has announced.

The leaked data includes names, birth dates and email addresses, as well as the partial credit and debit card details of some customers who bought gift vouchers. Although the attack occurred back in June, JD Wetherspoon has only just gone public about it.

Continue reading

Barbie says hello to more security flaws

hello_barbie_PR

Hot on the heels of last Friday's news of the potential of the Wi-Fi enabled Hello Barbie doll to be hacked, new research has uncovered security issues with the mobile app associated with the doll and with its connections to cloud servers.

Application security specialist Bluebox working with independent researcher Andrew Hay has revealed that the app can be modified to reveal confidential information including passwords.

Continue reading

Facebook will stop tracking Belgian web users who shun the social network

facebook_phone_in_pocket_denied

Privacy issues in relation to Facebook make frequent appearances, but they tend to focus on instances of the social network using the browsing and account data of logged in users. However, a recent court case in Belgium highlighted the fact that the site was tracking people who accessed public Facebook pages either without a Facebook account, or without logging into one.

This change has a couple of implications for people. Firstly, it means that people who are trying to stay off Facebook's radar will be better able to do so, but it also means that previously accessible content will only be available to those willing to log into their account. Facebook is complying with the Belgian court order that was handed down last month, but the company is not happy about it and intends to fight back.

Continue reading

Mozilla's Glass House experiment reveals lax attitudes to online privacy

mozilla_glass_house_privacy

The discussion about online privacy is something that rumbles on. Those who know what is happening with personal information on the internet are aware of the inherent risks, but these are being joined by increasing numbers of the previously-technologically-illiterate who are coming to understand what being online means.

To highlight the implication of third party tracking and data sharing, Mozilla ran an experiment in Hamburg, Germany. As well as bringing the issue of privacy to people's attention in quite dramatic style, the experiment also aimed to educate people about security and privacy through expert discussions. Some of the public reactions are priceless.

Continue reading

EFF accuses Google of sneakily gathering data about students

child_with_laptop

The Electronic Frontier Foundation claims that Google is gathering data about school children, including their web searches. In a complaint to the Federal Trade Commission about the search giant, the EFF gives details of the deceptive usage tracking it says was uncovered while conducting research for its Spying on Students campaign.

The campaign, which launches today, aims to "spread the word about companies collecting students' data and launching a campaign to educate parents and administrators about these risks to student privacy". At the center of the controversy are Chromebooks and Google Apps for Education.

Continue reading

Some VPN services might expose your IP address

Virtual Private Network VPN

Just because you’re hiding behind a VPN (virtual private network), it doesn’t mean your real IP address cannot be traced. Those are the results summarised in a report by security firm Perfect Privacy, which says that it has found a vulnerability "in a number of providers".

The flaw, described as "port fail", affects virtual private network providers which offer port forwarding and do not have appropriate protection against the vulnerability.

Continue reading

Government enterprise surveillance demands drive BlackBerry to quit Pakistan

BlackBerry-closeup-web2_contentfullwidth

BlackBerry wants nothing more to do with Pakistan. The Pakistani government had demanded that it be permitted to monitor BlackBerry Enterprise Service emails and BBM messages. Unwilling to bow to these demands, the company has decided to pull out of the country entirely.

From the end of 2015, BlackBerry will no longer operate in Pakistan as the company says that it does not want to compromise its customers' privacy. Unwilling to comply with surveillance directives or show any sort of support for backdoors, BlackBerry has decided to cut its losses and run.

Continue reading

NSA stops bulk collection of phone metadata

nsa_gchq

The NSA's bulk surveillance and collection of phone data has come to an end. President Obama announced that the current surveillance program would stop by 11:59 pm EST Saturday, but this does not mean that phone surveillance has completely disappeared.

Instead of wide scale dredging of data, the NSA will now engage in more targeted surveillance programs -- something that privacy advocates have been calling for for some time. The scaling back of surveillance has not come out of the blue; it's became of a legal requirement earlier in the year that has now been implemented two and half years after Edward Snowden blew the whistle on NSA spying.

Continue reading

Wi-Fi Barbie could be putting your kids at risk

Hello Barbie

The latest Wi-Fi enabled Hello Barbie dolls could be putting your children at risk according to security researchers.

Using a combination of speech recognition technology and wireless connection Hello Barbie provides, "...an engaging and unique Barbie experience," according to manufacturer Mattel.

Continue reading

Load More Articles