SECURITY

Is Dropbox authentication insecure by design? How and why users should secure Dropbox data

Dropbox
Dropbox security bug that allowed users to login to the system without using any password has lead to a serious debate on whether the data stored in Dropbox is secure even if the authentication was through a proper password. Dropbox uses a host key system, so your password is not stored anywhere on your system. The key is your authentication details. If the key is compromised, you can easily remove that particular host/key from your account and it will revoke access
More news
IBTimes Logo

U.S Government: Hackers to face stricter sentences

In the wake of the revelation that both the U.S. Senate and CIA's websites were hacked, the White House has called for stricter sentences for any hacker caught breaking into a government's private computer networks.

LulzSec teams up with Anonymous; announces 'Operation Anti-Security'

Maybe we have seen just the tip of the iceberg. Leaving behind some rather bitter moments between other hacker groups, including Anonymous, LulzSec announced its decision to team up with Anonymous. To increase efforts, we are now teaming up with the Anonymous collective and all affiliated battleships. The hacker group wreaking havoc across corporations and government agencies among other organizations announced Operation Anti-Security moments ago in a post uploaded on Pastebin.
Sega hacked, LulzSec offers help

Sega confirmed 1.29 million data breach, LulzSec the Dreamcast lover will hunt down the hackers

Sega, the latest victim of hackers, has confirmed on Saturday that personal data of 1.29 million customers was stolen. Just a day before, Sega announced that they had identified that unauthorized entry was gained to their SEGA Pass database, accessing customers' names, e-mail addresses, dates of birth and encrypted passwords. Sega immediately isolated the location of the breach to protect the data, and launched an investigation.
IBTimes Logo

Chinese software company placed security holes in its products; US issues warning

A Chinese software company is alleged to have placed security holes in its products sold to chemical defense and energy companies in Europe, the Americas, Asia, and Africa. Beijing-based Sunway ForceControl makes SCADA (Supervisory control and data acquisition) software which is used in computer systems that control and monitor manufacturing plants and equipment used by different industries.
Facebook has attempted to downplay privacy concerns after the company quietly switched on technology that automatically identifies people in photographs.

Facebook helps in retrieving stolen bike

Simon Mulhall, a resident of Banbury in UK, made good use of social networking site Facebook to retrieve his stolen bike. The incident gained wide attention after it was reported by the BBC.
Six Out of Ten People With Dementia Go Undiagnosed: New £2m Ad Campaign Launched

In Reversal, AARP Backs Social Security Cuts

The American Association of Retired Persons has announced it is open to cutting Social Security benefits, a change of course for the politically influential organization that could bolster efforts for entitlement reform.
IBTimes Logo

House data breach bill may be tightened

A congresswoman may strengthen a data breach bill to quell concerns it would do too little to force companies to alert customers of data breaches promptly.
IBTimes Logo

Seoul launches cyber security plan

South Korea said on Tuesday it was drawing up a cyber security master plan after a wave of hacking attacks against global agencies and companies but some other Asian governments appeared to have no blueprint for tackling the threat.

LulzSec: Some love them, others loathe, yet others don't care about them

It has been a quite successful run for the anonymous hacker group Lulz Security, responsible for the security breach of corporations and government agencies including PBS, Sony, Nintendo, Fox, FBI affiliate Infragard, US Senate, and Bethesda Softworks among its high profile targets. The group still manages to tweet and communicate through Pastebin and their own website without a domain-seize threat from federal agencies. The virtually connected members of the group with the face of a caricature,...

Pages

IBT Spotlight

We Help Businesses Find B2B Service Providers They Can Trust.