Apple relents, lets you “depurchase” that U2 album you never bought in the first place
Apple has listened! The company has come up with a free Album Removal Tool that allows you to “unbuy” the U2 album that recently showed up in your iTunes account…more…
Apple relents, lets you "depurchase" that U2 album you never bought in the first place
Apple has listened! The company has come up with a free Album Removal Tool that allows you to “unbuy” the U2 album that recently showed up in your iTunes account…more…
NSA reform bill stalled with Congress headed toward fall recess
The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break. read moremore…
Electronic Theses and Dissertations (eTD)/Honor Theses (eHT) interruption, 9/18/2014
There will be a brief interruption of Electronic Theses and Dissertations (eTD) and Honor Theses (eHT) during the 5-7 a.m. (EDT) maintenance window on Thursday, September 18th.more…
Is a remote-wipe policy a crude approach to BYOD security?
While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security. read moremore…
Why do Apple’s security questions still suck?
It’s been two weeks, so why do Apple’s security questions still suck? Here’s an example of questions you’ll be asked when you create an Apple ID: And here’s the full list… Security Question 1: • What is your favorite children’s book? • What is your dream job? • What was your childhood nickname? • What was the model of your first car? • Who […]more…
New NSA-funded programming language could close long-standing security holes
Wyvern securely rolls five programming languages into one. read moremore…
Court throws out $368.2 million patent award against Apple
A U.S. appeals court has thrown out a US$368.2 million award against Apple in a patent infringement case brought by patent-holding and software company VirnetX. read moremore…
Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […]more…
"Shocking" Android browser bug could be a "privacy disaster": here’s how to fix it
The Metasploit crew is calling this Android Browser bug a “privacy disaster.” Here’s what you can do to avoid trouble…more…
“Shocking” Android browser bug could be a “privacy disaster”: here’s how to fix it
The Metasploit crew is calling this Android Browser bug a “privacy disaster.” Here’s what you can do to avoid trouble…more…
Many Android devices vulnerable to session hijacking through the default browser
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites. read moremore…
Just how much information can be squeezed from one week of your metadata?
Thanks to a Dutch man who volunteered to let researchers snoop on his mobile phone, we now have a glimpse of the type of information that can be squeezed from what officials would have us believe is “just” metadata. Toss in a list of exposed passwords hints courtesy of Adobe, and analysts also got access […]more…
AppLock Vulnerability Leaves Configuration Files Open for Exploit
We have previously discussed about certain file locker apps that fail to do hide files properly. We recently came across yet another file locker app, AppLock, which has the same issue. However, the vulnerability concerning this app goes beyond improperly hiding files—the vulnerability can allow other apps to manipulate the app’s configuration files. The configuration […]more…
Man buys old servers, accuses Ernst & Young of data breach
Mark Morris claims he picked up some old servers for $300 and recently found out they’re full of customer data. Ernst & Young wants the data deleted or just to get the servers back, but Morris says whoa, not so fast – time is money!more…
Apple Watch under scrutiny for privacy by Connecticut attorney general
The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch's handling of consumers' health information. read moremore…