Latest

Next on Samsung’s security feature list: retina scans

Samsung Retina Scan
361
by 1 week ago
26

Mobile devices are increasingly becoming personal and ubiquitous — which means you’re probably carrying more personal information on your smartphone than your wallet. This comes with a host of security issues, of course. If you lose your smartphone or tablet, then whoever picks it up might be able to glean a lot of information about you, to the extent that your device can be a potential threat to the security of your identity. You lock your phone anyway, you say? But a Consumer Reports survey done earlier this year indicates that only a third of Americans bother to lock their…

China deems the iPhone a national security threat

iphone-china
822
by 1 week ago
46

On Friday, China’s state run China Central Television (CCTV)  deemed Apple’s iPhone a national security threat. The threat is due to Apple’s “Frequent Location” feature that is a part of Location Services on the iPhone. According to the Wall Street Journal, the fear is based around the information contained within this feature that would, in essence, enable anyone who had this information to know of China’s secrets. Apple has not commented on the report, but according to their support page, the feature can be customized or turned off in the device settings. Apple also claims that the information collected is only…

‘SSL added and removed here’ – Google mocks NSA in crypto code easter egg

NSA Spying Logo
542
by 1 month ago
9

ConsciousLifeNews It’s an open secret that the NSA is keeping tabs on Internet users through various means. Whistleblower Edward Snowden’s revelations suggest that the agency does not even have to take an active role in eavesdropping, as it’s the Internet and tech companies that do this for them. Case in point: Vodafone recently published a transparency report, indicating the means and methods through which governments are spying through telecom networks. Google is actually one of the companies that have been used by spy agencies in their data mining efforts. In particular, the movement of information between datacenters can be the chink in…