Maybe Better If You Don’t Read This Story on Public WiFi
By Maurits Martijn, from De Correspondent
Translated from Dutch by Jona Meijers
Illustrations by Kristina Collantes In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly…
Dropbox account passwords posted online and millions more might follow
If you haven't activated two-factor authentication on Dropbox yet, you may want to do so now, just in case you end up finding your credentials posted on the internet. A document posted on pastebin earlier contains 400 Dropbox usernames and passwords, which the poster claims are just a tiny fraction of a massive hack that compromises up to 7 million accounts. The poster has been asking for Bitcoin donations in exchange for more accounts, and by the looks of it, he got enough money, at least, to post another batch of log-in credentials within the same day. At the moment, it's still unclear how the hacker(s) got a hold of the usernames and passwords, but the cloud service told Engadget that Dropbox itself has not been hacked.
Update: Dropbox again stated that it has not been hacked, this time in a blog post, and says security measures are in place to detect accounts compromised with log-in info stolen from other sites.
‘Hostile to privacy’: Snowden urges internet users to get rid of Dropbox
Edward Snowden has hit out at Dropbox and other services he says are “hostile to privacy,” urging web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
Google and Apple Won't Unlock Your Phone, But a Court Can Make You Do It
Silicon Valley's smartphone snitching has come to an end. Apple and Google have promised that the latest versions of their mobile operating systems make it impossible for them to unlock encrypted phones, even when compelled to do so by the government. But if the Department of Justice can't demand that its corporate friends unlock your phone, it may have another option: Politely asking that you unlock it yourself, and letting you rot in a cell until you do.
Apple's Patriot-Act-detecting "warrant canary" dies
It's been less than a day since the company published its new, excellent privacy policy — but Gigaom has noticed that the latest Apple transparency report, covering Jan 1-Jun 30…
Feds haven’t reached out about massive password cache – IT firms struggle t
IT firms struggle to fix busted Web padlock — Black Hat’s big idea: U.S. should buy zero days — Beijing says it won’t buy Apple products
So Google scans email for dodgy images - should we be worried about scannin
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on …
How to recover files from a CryptoLocker attack, without paying!
Boffins have created a free service to help anyone has fallen foul of the notorious CryptoLocker ransomware that encrypts computer files and demands a ransom be paid for the decryption key.
For people worried about identity theft and privacy, the discovery by Hold Security of a giant database of stolen data is highly personal. But there are steps everyone can take to minimize the hackers’ impact.
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t \[…\]
BitTorrent Inc., the company behind the popular file-sharing client uTorrent , unveiled its serverless chat client today. BitTorrent Bleep allows users to communicate via text or voice, fully encrypted and without the need for central servers.
'Signal' for iOS Lets Users Make Encrypted Voice Calls for Free
Open source software group Open Whisper Systems today released a new encrypted phone app called Signal, which is designed to allow its users to make...
How to better protect your iPhone and iPad against 'backdoors' and other se
Security and convenience are perpetually at war. There will always be errors, compromises, and oversights that put our privacy at risk. Old ones will get fixed but new ones will get discovered. So wha
Leave your ring of cut-brass secrets unattended on your desk at work, at a bar table while you buy another round, or in a hotel room, and any stranger---or friend---can upload your keys to their online collection.