News Feed Search

Results for search query: 'security'

Page 1

Iraqi expert on armed groups shot dead in Baghdad

Weeks before his death, al-Hashimi had told confidantes he feared Iran-backed militias were out to get him.

Al-Hashimi was a well-connected security analyst who appeared regularly on Iraqi television and whose expertise was sought out by government officials, journalists and researchers.

Gunmen on a motorcycle opened fire on Hisham al-Hashimi, 47, outside his home in the Zeyouneh area of Baghdad, a family member said, speaking on condition of anonymity for security reasons.

BAGHDAD (AP) - An Iraqi analyst who was a leading expert on the Islamic State and other armed groups was shot dead in Baghdad on Monday after receiving threats from Iran-backed militias.

Political analyst Ihsan al-Shammari, a colleague of al-Hashimi, said those who killed him wanted to “silence the voices that disagree with their opinion” and blamed the shooting on the proliferation of armed groups in the country.

added religion and belief security

Researcher Buys Axon Cameras On eBay, Finds They're Still Filled With Recordings

The Fort Huachuca Military Police were just apprised of this truism by Twitter user KF, who had purchased some used Axon body cameras on eBay.

And contained on those storage cards were a bunch of recordings (including audio) that hadn't been wiped by the MPs before the cameras ended up on eBay.

No one seems to know how the cameras ended up on eBay, but it's pretty amazing they ended up in the secondary market with their recordings still intact.

KF's site contains this amusing/scary security test of police in-car camera systems -- cameras the researchers were able to view live after discovering zero authentication was needed to access this stream.

Nor does there seem to be much concern that recordings might be improperly accessed by other personnel with access to the devices while the cameras were still being used by the Fort Huachuca police.

added media technology

Facebook, others block requests on Hong Kong user data

Likewise, Google said in a statement that it too had “paused production on any new data requests from Hong Kong authorities” and will continue reviewing details of the new law.

Twitter also paused all data and information requests from Hong Kong authorities after the law went into effect last week, the company said.

Facebook and its messaging app WhatsApp said in separate statements Monday that they would freeze the review of government requests for user data in Hong Kong, “pending further assessment of the National Security Law, including formal human rights due diligence and consultations with international human rights experts.”

HONG KONG — Social media platforms and messaging apps including Facebook, WhatsApp, Telegram, Google and Twitter will deny law enforcement requests for user data in Hong Kong as they assess the effect of a new national security law enacted last week.

Hong Kong’s government late Monday issued implementation rules of Article 43 of the national security law, which give the city’s police force sweeping powers in enforcing the legislation and come into effect Tuesday.

published data protection technology

How Twitter is shifting the power balance from companies to their employees

The conflict began with an investigation into the travel company Away in The Verge for which I served as an early editor; that story was written by Zoe Schiffer, my partner in bringing this newsletter to you every week; and the most recent controversy started after my friend Taylor Lorenz called attention to some comments that Korey, Away’s CEO and the subject of the original investigation, had made on Instagram.

Since the Google walkout in 2018, employees of venture-backed startups and public companies have become increasingly comfortable in speaking out — often using social media platforms to call out their employers.

But the Google walkout — which took place as much on Twitter as it did outside the company’s offices — showed workers that their stories would find a sympathetic audience on social networks.

And journalists often wind up criticizing tech companies from both sides of an issue — complaining that they both leave up too many bad posts and take down too many good ones, for example.

(Elizabeth Dwoskin / The Washington Post) Governing ⭐ Google, Facebook, and Twitter won’t process user data requests from the Hong Kong government amid concerns that a new security law could criminalize protests.

published media technology legal

The United Kingdom will remove Huawei equipment from its 5G networks by the end of 2020

The U.K.’s original plans to rely (at least in part) on Huawei-made equipment to flesh out its 5G network did not sit well with the U.S. Considering America’s ongoing trade war with China and continued efforts to stymie business dealings with Huawei, the U.K. may have felt pressured to rethink its roadmap for a 5G rollout.

In a surprising shift, reports from the United Kingdom state that the country will strip Huawei equipment from its 5G networks by the end of the year.

The shift in policy is based on a new report from British cybersecurity experts that fear Huawei may be forced to use untrusted technology as a result of recent sanctions put on the company by the United States.

Despite its 20-year reliance on Huawei-made telecom hardware, the United Kingdom has now decided to remove Huawei from its 5G infrastructure by the end of 2020.

Details on the plan are scant as of press time, but the U.K. now seems dead set on removing Huawei from its 5G telecom infrastructure over the next 6 months.

published national security technology

Benchmarking The Performance Overhead To LKRG 0.8 For Better Security - Phoronix

Back in March I benchmarked the Linux Kernel Runtime Guard (LKRG) as a means of achieving additional security safeguards for a ~5% performance hit.

With LKRG 0.8 having been released a few days ago, here is a fresh look at the LKRG performance compared to the stock kernel on Ubuntu 20.04 LTS.

LKRG adds runtime integrity checking to the Linux kernel and other runtime detection of security exploits.

LKRG 0.8 adds new safeguards as well as support for newer kernel builds, experimental 32-bit ARM and Raspberry Pi support, new tunables, and other changes.

For this straight-forward benchmarking, an Intel Core i9 9900K box was used with a fresh install of Ubuntu 20.04 LTS with its stock Linux 5.4 kernel.

Asus ZenFone Max Pro M1 gets third Android 10 beta with fixes for PUBG mobile and June 2020 security patch

Asus provided an Android 9 Pie update for the 2018 handset, and now is giving bold steps to roll out a stable Android 10 update.

Although the ZenFone Max Pro M1 wasn’t an Android One device, it received a decent treatment from the company’s developers.

However, it wasn’t an Android One smartphone, one of the first Asus devices to make a switch to pure Android.

Another interesting characteristic of this handset was its pure vanilla Android.

This is a big surprise for a 2018 phone, especially when the company doesn’t need to comply with Google Android One requests.

published software technology

The Google Pixel 4 and Galaxy S20 are the most secure Android phones

The Nokia 5.3 is part of Google's Android One program, meaning it's guaranteed to get two years of Android updates and three years of monthly security patches.

Android 10 out of the box The Galaxy S20 isn't the only Samsung phone that shows a new dedication to security, and if you're interested in a flagship that's a little cheaper, the Galaxy S10 fits the bill.

You don't get the official guarantee of updates that you do with Google's Pixel 4, but Samsung's recent performance in these regards has made us confident in the S20's overall security.

On top of this, Google releases updates to the security model at the beginning of every month for the people who build Android phones to apply to its software.

The Google Pixel 4 (and 4 XL) is the best Android phone when it comes to security.

published media technology mobile

France Has Nuclear Submarines That Could Kill Millions of People in Minutes

More From The National Interest: Russia Has Missing Nuclear Weapons Sitting on the Ocean Floor How China Could Sink a U.S. Navy Aircraft Carrier Where World War III Could Start This Year

France is one of the world’s preeminent missile powers — in addition to a wide array of conventional and nuclear missiles, France is also a permanent member of the United Nation’s security council.

The Hadès missile system was at one point a land-based component of French strategic deterrence — though only at the tactical, not strategic level, due to the system’s relatively short 480 kilometer, or about 300 mile range.

The missiles play a unique role in French deterrence, where their use would be considered a warning shot of sorts before the more widespread use of nuclear weapons would be used in a conflict.

Unlike the United States or Russia, who maintain a nuclear triad of land-based, submarine-launched, and air-launched missiles, France has a dyad of submarines that can launch nuclear ballistic missiles and a stockpile of air-launched nuclear cruise missiles.

published nuclear weapons security politics
Image of article 'UK set to phase out Huawei from 5G network in major U-turn'

UK set to phase out Huawei from 5G network in major U-turn

A report by GCHQ's National Cyber Security Centre has decided the US sanctions barring Huawei from using technology relying on American intellectual property has had a "severe" impact on the firm.

But a study set to be presented to Mr Johnson this week will declare that US sanctions on Huawei will force the company to use technology that is "untrusted", reports say.

The prime minister decided in January to allow Huawei to play a limited role in the UK's 5G network as he defied security concerns, particularly from the US, about the firm.

The UK is poised to end the use of Huawei technology in its 5G network as soon as this year over security concerns.

Swedish telecoms company Ericsson has said it would be capable of replacing all of the Huawei equipment in the UK's 5G network if the British government decides to ban the Chinese company.

published data protection technology

Chrome for Android upgrades to 64-bit in its latest few versions

However, their immediate predecessors, 83 and 84 (also termed Chrome Stable and Beta, and thus the most likely to be run by the general population of app-users) remained 32-bit for the blog.

Android Police has observed that the freshest forms of the app's Dev and Canary variants (builds numbered 85 and 86 respectively) have gone 64-bit.

Android had adopted a 64-bit architecture on migrating from its KitKat (4.4.4) to its Lollipop (5.0) versions.

Nevertheless, Chrome has finally shown signs of migrating to this platform, starting with its newest Dev and Canary versions.

They include potentially improved security and performance: for example, the blog breaking this story has noted that Chrome for Android 85 achieves "consistently" improved scores in Octane 2.0 benchmark scores compared to 83.

published media technology

Asus ZenFone Max Pro (M1) gets third Android 10 beta, fixes frame rate issue in PUBG Mobile

The Asus ZenFone Max Pro (M1) announced back in April 2018 with Android 8.1 Oreo picked up the Android 9 Pie update a year later, but it's yet to get the stable build of Android 10.

However, Asus has been working on Android 10 for the ZenFone Max Pro (M1) for a few months now and the company just released the third beta of Android 10 for the smartphone.

Asus ZenFone Max Pro (M1) The new beta build doesn't bring any new features to the ZenFone Max Pro (M1) but bumps up the Android security patch level on the smartphone to June 5, 2020 and comes with bug fixes listed below.

Fixed VOIP call silent issue after opening "OK Google" in the voice assistant.

Fixed NFC not working issue after upgrading to the Android 10.

published new product gadget mobile
Image of article 'Infosec community disagrees with changing 'black hat' term due to racial stereotyping'

Infosec community disagrees with changing 'black hat' term due to racial stereotyping

But these efforts to move away from offensive terms like master, slave, blacklist, whitelist started even before the Black Lives Matter protests.

After the Black Lives Matter protests erupted across the US and in some parts of Europe, several companies announced plans to stop using racially- and slavery-charged terms in their technical documentation.

Most security researchers pointed to the fact that the terms had nothing to do with racism or skin color, and had their origins in classic western movies, where the villain usually wore a black hat, while the good guy wore a white hat.

In his withdrawal announcement, Kleidermacher asked the infosec industry to consider replacing terms like black hat, white hat, and man-in-the-middle with neutral alternatives.

The information security (infosec) community has angrily reacted today to calls to abandon the use of the 'black hat' and 'white hat' terms, citing that the two, and especially 'black hat,' have nothing to do with racial stereotyping.

published media security technology

Funko tweets Five Nights At Freddy's Security Breach characters and hints of a possible release date

Funko tweets Five Nights At Freddy's Security Breach characters and hints of a possible figures are set to ship on characters from the next Five Nights At Freddy's game, Five Nights At Freddy's Security Breach, have appeared online courtesy of a promotional tweet from Funko advertising a new FNAF range of action figures and "mystery minis".

While these kinds of leaks typically come from premature social media campaigns and are usually deleted pretty sharphish, Funko's tweet appears intentional and while one of the preorder links included on the tweets doesn't take you anywhere yet, the Walmart page confirms they'll go on sale on 17th September, 2020 - perhaps to coincide with the game's release?

Manage cookie settings The tweet itself remains online, despite hundreds of complaints from fans disappointed that the tweet spoils the surprise of what characters will be appearing in the game, not least because we've yet to see any trailers or in-game footage.

Some fans are also disappointed by the characters themselves, too, and the fact the majority of the mystery minis are variants of just five characters.

Manage cookie settings Don't forget, Five Nights at Freddy's is also set to be adapted for film by Blumhouse Productions.

published media entertainment game
Image of article 'Google just banned 25 more Android apps, now you need to delete them from your phone'

Google just banned 25 more Android apps, now you need to delete them from your phone

Evina says it found the malicious code in 25 apps which were instantly deleted once reported to Google at the end of May.

READ MORE Android users must delete these apps today as threats DOUBLE for millions This well-produced fake login page is almost impossible to spot and users are easily tricked into entering their user names and password which is sent to hackers to use at a later date.

The shocking malware was discovered by French cyber-security firm Evina who has confirmed that the apps were able to infiltrate devices by offering genuine functionality.

Just last month, Google ditched more than 50 apps from its Play Store over concerns the software could fill devices with annoying adware and leave Android users with a phone that's constantly being bombarded with unwanted adverts.

Super Wallpapers Flashlight • Padenatef • Wallpaper Level • Contour Level wallpaper iPlayer iWallpaper • Video Maker • Color Wallpapers • Pedometer Powerful Flashlight • Super Bright Flashlight • Super Flashlight Solitare Game • Accurate scanning of QR code • Classic card game Junk file cleaning • Synthetic Z • File Manager • Composite Z Screenshot Capture • Daily Horoscope Wallpapers • Wuxia Reader • Plus Weather Anime Live Wallpaper • Health Step Counter If you think you may have downloaded one of the apps listed above then it's a good idea to delete it from your phone immediately and change your Facebook password.

published software technology
Image of article 'Microsoft just made it easier to get the latest Windows 10 features before anyone else'

Microsoft just made it easier to get the latest Windows 10 features before anyone else

Microsoft Principal Program Manager Lead, Amanda Langowski said: “As we continue to evolve the way we’re building and releasing Windows 10 in the future, we may introduce new channels for new experiences for Insiders.”

If you're already a member of the Windows Insider program and would now like to change your tier, head to Settings Update Security Windows Insider Program to change between the Windows 10 Dev Channel, Beta Channel, and Release Preview Channel.

If you want to sign-up to become a Windows Insider, you can register for a place on the scheme by heading to

published software technology

An old piece of Android malware is back and more dangerous than before

The current iteration of FakeSpy is also said to be more powerful and sophisticated than the original version, which is to say Android users should be particularly vigilant about avoiding suspicious messages.

FakeSpy, which was first discovered by security researchers nearly three years ago, is a particularly nasty piece of malware designed to steal a user’s text messages, financial data, bank login information, app data, contact lists, and more.

The malware spreads via a text message that seemingly comes from a local post office and instructs users to download an app disguised as a legitimate post office app.

An old piece of Android malware called FakeSpy has resurfaced and is now targeting users across the United States and Western Europe.

While it should go without saying at this point, Android users should remain suspicious of any text message that comes from an unfamiliar life long Mac user and Apple enthusiast, Yoni Heisler has been writing about Apple and the tech industry at large for over 6 years.

published media technology

10 Thrilling Audio Dramas to Transport You to Other Planes of Existence

Rabbits Much like The Left Right Game, Rabbits tells the story of a young woman who comes across a strange game while looking for her missing friend.

Within the Wires is an anthology podcast told in an “epistolary fiction” style, meaning as a series of letters, tapes, or videos.

The Left Right Game QCode’s adaptation of the infamous creepypasta story is compelling from scene to scene, partially thanks to Tessa Thompson’s voice work as a reporter investigating a strange (and possibly supernatural) experience called the “Left/Right Game.”

VAST Horizon VAST Horizon is another survival story, this time about an agronomist named Dr. Nolira Eck whose mission to set up agriculture in a new solar system is derailed when she wakes up on a drifting colony ship.

QCode’s The Edge of Sleep takes on a similar fear, focusing on a security worker who finds that anyone who goes to sleep will die.

published entertainment (general) technology
Image of article 'Languishing lodash library loophole finally fitted for a fix: It's only taken since October to address security bug'

Languishing lodash library loophole finally fitted for a fix: It's only taken since October to address security bug

The problem, as one developer observed on Hacker News, is that "There is essentially one (unpaid) person who has power to release lodash, a library that a huge majority of reasonably-sized javascript projects now depend on."

There have been two pull requests – lines of corrected code – to fix the security flaw, both of which have been waiting around for about two months to be merged into the lodash project code so an update can be released.

It was disclosed to bug bounty service Hacker One in October last year and John-David Dalton, the creator and primary maintainer of lodash, appears to have been notified in early December, 2019.

A lingering vulnerability in lodash, a popular JavaScript helper library distributed through package manager npm, has prompted developers to kvetch about the fragile state of security.

In June, via Twitter, he put out a call for volunteers to help him maintain lodash and other projects he has, promising maintainer status for those who respond.

published library and museum programming

Automating Incident Response - Free eBook

Claim your complimentary free eBook today, before the offer expires.

With automated incident response and security orchestration, your team can: Complete and verifiable information is required in order to receive this offer.

If you have previously made use of these free offers, you will not need to re-register.

That's OK, there are other free eBooks on offer you can check out here, but be aware that these are all time-limited offers.

Complete and verifiable information is required in order to receive this offer.

published personal data collection technology
Image of article 'Google Nest Security Cameras and Smart Locks Discounted for 4th of July'

Google Nest Security Cameras and Smart Locks Discounted for 4th of July

What’s more, this deal is bundled with the Nest Connect, a device that connects the Nest x Yale smart lock to the internet and extends the range of your Google Nest Secure alarm system so you can install your Google Nest sensors farther away (if you have any, of course).

The Nest x Yale smart lock is a stylish and elegant digital deadbolt that boasts plenty of advanced security features.

The Nest Hello smart doorbell allows your visitors to ring the buzzer so that you’ll let them in, but it also sends to your phone a notification and a live video feed of the person at the door, whether you’re at home or elsewhere.

The Nest Cam Outdoor is way ahead of the security camera pack thanks to its terrific rugged design, strong day and night picture quality, and an easy-to-use mobile app.

As the Independence Day approaches, along with it comes the biggest deals and discounts of the year, including big savings on the Nest Cam Outdoor, Nest Hello Smart Doorbell, and Nest x Yale Smart Lock.

published media technology smarthome
Image of article 'V Shred data leak exposes PII, sensitive photos of fitness customers and trainers'

V Shred data leak exposes PII, sensitive photos of fitness customers and trainers

CSV file containing substantial PII was removed, but the rest of the bucket is still public and accessible.

TechRepublic: How to protect your remote desktop environment from brute force attacks At first, the team member said that the bucket was only used to store web assets, CSS, and media files, adding that if the resources were made non-public, members would not be able to download their meal or training plans.

ZDNet verified the open bucket and at the time of writing, many resources remain open and accessible, ranging from company materials to diet guides, workout plans, and user photos.

Combined, the files contained names, home addresses, email addresses, dates of birth, some Social Security numbers, social media accounts details, usernames and passwords, age ranges, genders, and citizenship status, among other data points.

CSV files of particular note; one that appeared to be a lead generation list, another a client email list, and a trainer list.

Image of article 'TikTok’s Indian Alternative Mitron Hits 1.7 Crore Downloads On Google Play Store'

TikTok’s Indian Alternative Mitron Hits 1.7 Crore Downloads On Google Play Store

India’s government banned TikTok and other 58 Chinese apps over privacy and security concerns.

SEE ALSO: India bans TikTok after deadly military conflict, accuses app of 'stealing' data Mitron’s development team has also decided to hire new tech talent to make the app available for a larger Indian user base.

Mitron had earlier quickly gained popularity for being a ‘Made In India’ app, a time when TikTok’s rating had dropped low on the Play Store.

Irfan Sheikh, founder and chief executive of Qboxus, had mentioned back then that people were calling Mitron an “Indian” app although the developers had not changed anything at all in its interface.

SEE ALSO: Mitron App Is Not 'Made In India'; Was Purchased From A Pakistani Company: Report Apart from Mitron, Chingari is another TikTok’s Indian alternative that hit over 2 million downloads on the Play Store, soon after the ban on these Chinese apps was announced.

published telecommunication service technology