Cyber Security

Posts about Cyber Security. Subscribe to my newsletter to make sure you don't miss anything.
Instagram
“You agree that a business may pay Instagram to display your photos in connection with paid or sponsored content or promotions without any compensation to you.” That sentence was added to Instagram’s terms of service yesterday, sparking widespread outrage — the most panicked analysis claims Instagram just gave itself permission to sell everyone’s photos at Continue Reading →
Instagram
On Monday, Instagram said that it has the perpetual right to sell users’ photographs without payment or notification, a dramatic policy shift that quickly sparked a public outcry. The new intellectual property policy, which takes effect on January 16, comes three months after Facebook completed its acquisition of the popular photo-sharing site. Unless Instagram users Continue Reading →
Samsung Galaxy S III
Got a Samsung Galaxy SIII? Maybe a Galaxy Note? Well listen up because there’s a new boogeyman on the loose. According to a thread at XDA Developers, there’s an exploit out there that can let Android malware apps get at all your physical memory, for the purposes of stealing your data or deleting it or Continue Reading →
Facebook
We’ve all been there. Maybe you don’t use your Facebook account enough to make having a page worth it, or maybe you simply want to get off the grid altogether. Whatever your reason, there’s a way to delete your Facebook page for good. Here’s what you do: The first step is actually finding the link for Continue Reading →
Facebook
As surely as the sun rises, Facebook will keep revising its privacy settings in an effort to keep everyone from complaining. There’s a brand new method, and it’s simpler than ever before. But there are some catches. Easy shortcuts: The first thing you’ll notice is a simple, obvious means of hitting the main privacy concerns, Continue Reading →
Android
The old phrase often credited to the late P.T. Barnum, “there’s a sucker born every minute,” can definitely be used to describe some aspects of the mobile industry. As smartphone and tablet adoption continues to increase, hackers and scammers are finding new ways to take advantage of unsuspecting consumers. Things aren’t expect to slow down, Continue Reading →
Email
Think that clicking “delete” will actually delete your email? Think again. When a user “deletes” an email in the normal fashion, it becomes invisible to that user and is immediately a candidate to be overwritten. But until it is in fact overwritten, it exists. And it may persist longer on company servers. So, even if Continue Reading →
Twitter
Twitter users who have taken the time to set up Tweeting-by-SMS are putting themselves at risk of attacks where anybody can post to their account, according to a team of security researchers. The security flaw allows attackers to post to a user’s Twitter account with just the knowledge of the mobile number associated with the Continue Reading →
Cyber Attacks Ahead
Is the Internet facing “the cyber equivalent of the World Trade Center attack?” According to a former security chief, the U.S. has already received its “9/11 warning” for a cyber-attack that could take down the banks, power and ultimately cripple the economy. Former U.S. Intelligence Chief John “Mike” McConnell, who served under President Clinton, George Continue Reading →
Yahoo Mail
A new exploit being sold for $700 may put tens of millions of Yahoo Mail users at risk. Once victims click on a malicious email link, the exploit allows an attacker to steal and replace tracking cookies, while remotely controlling the victims’ browsing sessions. “After the victim clicks the link, he will be redirected to Continue Reading →

Get Briefed Every Day!

Subscribe to my daily newsletter featuring current events and the top stories in AI, technology, media, and marketing.

Subscribe