Stories by Jeremy Kirk


How three small credit card transactions could reveal your identity

Just three small clues -- receipts for a pizza, a coffee and a pair of jeans -- are enough information to identify a person's credit card transactions from among those of a million people, according to a new study.

By Jeremy Kirk | 30 January, 2015 12:36

Tags: security, Massachusetts Institute of Technology, privacy

New Chrome extension spots unencrypted tracking

A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet.

By Jeremy Kirk | 29 January, 2015 13:35

Tags: Citizen Lab, security, encryption, Open Effect, privacy

'Ghost' vulnerability poses high risk to Linux distributions

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.

By Jeremy Kirk | 28 January, 2015 11:04

Tags: security, Exploits / vulnerabilities, qualys

Your typing style could better protect your accounts

A new type of keyboard could make it irrelevant if your password is divulged, providing a much higher level of computer security.

By Jeremy Kirk | 23 January, 2015 13:58

Tags: Georgia Institute of Technology, security

Sharp rise seen in attacks using stolen credentials

Organizations are seeing a sharp increase in attacks using stolen account credentials, with crooks using new techniques to beat fraud detection systems, according to Gartner.

By Jeremy Kirk | 23 January, 2015 11:50

Tags: Gartner, security

Users get more control over data in latest Firefox beta

Mozilla is adding new capabilities in the beta version of Firefox 36 to give users and website owners more control over what data, if any, is sent to other websites during browsing.

By Jeremy Kirk | 22 January, 2015 11:00

Tags: applications, security, browsers, software, privacy, mozilla

Alleged Silk Road 2.0 'key assistant' charged

A 26-year-old man has been charged with three counts of conspiracy for his alleged role in running Silk Road 2.0, which launched shortly after the demise of the first iteration of the infamous underground market.

By Jeremy Kirk | 21 January, 2015 14:08

Tags: Criminal, no company, security, legal, cybercrime sending personal data to Twitter, Yahoo and Google

Information entered into the U.S. government's health insurance website is being passed to companies such as Twitter, Yahoo and Google, according to a report from the Associated Press.

By Jeremy Kirk | 21 January, 2015 12:29

Tags: Government use of IT, security, government, Electronic Frontier Foundation

This tool may make it easier for thieves to empty bank accounts

Banks and payment services are in a constant fight to detect account fraud, employing sophisticated ways to detect abnormal activities. One of those ways is "fingerprinting" a Web browser, or analyzing its relatively unique software stamp.

By Jeremy Kirk | 20 January, 2015 14:40

Tags: IntelCrawler, security, Tripwire

Report: Inside North Korea's network, NSA saw signs of Sony attack

The U.S. National Security Agency has had a secret foothold for years in North Korea's networks and saw signs of the Sony Pictures Entertainment attack but only in retrospect grasped its reach and depth, The New York Times reported Sunday.

By Jeremy Kirk | 19 January, 2015 16:06

Tags: security, U.S. National Security Agency

Email accounts exposed in Verizon My FiOS mobile app

Verizon fixed a serious vulnerability in its My FiOS mobile application that allowed unfettered access to email accounts, according to a developer who found the problem.

By Jeremy Kirk | 19 January, 2015 13:07

Tags: security, Exploits / vulnerabilities, Verizon Communications

Advertising company Turn will stop using Verizon's mobile tracking ID

Online advertising company Turn said Friday it will stop using a controversial tracking method by early next month that aids serving targeted advertisements to Verizon's mobile customers.

By Jeremy Kirk | 19 January, 2015 10:41

Tags: advertising, Turn, security, internet, Verizon Communications

How to protect yourself against Verizon's mobile tracking

The Electronic Frontier Foundation has published a list of tools that can block online advertising companies from collecting web browsing data in ways that privacy advocates contend are deceptive.

By Jeremy Kirk | 16 January, 2015 14:49

Tags: advertising, Turn, security, internet, Verizon Communications

How much trust can you put in Telegram messenger?

Messaging programs are a closely watched application category, with experts scrutinizing how communications are protected from government surveillance dragnets and hackers. The primary defense invariably involves encryption, but just saying an application uses encryption by no means ensures it's secure.

By Jeremy Kirk | 16 January, 2015 09:53

Tags: Telegram, security

Google nixes widespread malvertising attack

Google has stopped a widespread malicious advertising attack that bounced Web surfers to dodgy sites hawking weight loss and skin care products.

By Jeremy Kirk | 15 January, 2015 13:55

Tags: Google, security, Sucuri

Twitter Feed

Featured Whitepapers