Tracking the FREAK ATACK, a huge SSL security flaw

  Called Freak, Factoring attack on RSA-EXPORT Keys, the security breach exists on high-profile websites. It is supossed that seven hours is all it takes to crack the encryption that is in place on some supposedly secure websites. Browsers can be hijacked and tricked into accessing websites using legacy encryption.  There was

Superfish: Lenovo is only the tip of the iceberg

  Security experts from G Data SecurityLabs analyzed Superfish adware. In this process, analysts have encountered in program, a technology component,  called SSL digestion. It uses a root certificate which is poorly secured and has extensive rights on the computer. SSL Digestor intercept safe HTTPS connections which can be decrypted.

Samsung Galaxy S6 and S6 Edge unveiled at MWC

Samsung has presented this Sunday the Galaxy S6, and a sister smartphone, the Galaxy S6 edge, at  Mobile World Congress in Barcelona. Samsung will sell this two versions, one of which has a screen that curves round its sides. Both devices feature a 64-bit processor which is designed to be

A faster and better standardized Web: Google renounce to SPDY in favor of HTTP / 2

The SPDY protocol was announced by Google in November 2009 and implemented for the first time a year later. SPDY protocol aimed to optimize the old HTTP by implementing compression technologies, multiplexing and encryption. Although it is currently implemented in most browsers, the protocol has not received wide

Uber database breach exposed 50000 drivers

Uber released a statement on Friday announcing that it suffered a data breach in 2014 that affected 50 000 Uber drivers across the United States. The Uber’s database was accessed by an unauthorized third party. Uber says that 50 000 driver partner names and driver’s license numbers

Federal Communications Commission approve net neutrality rules

  The Federal Communications Commission on Thursday voted to approve new rules on how the internet should be governed. New rules will prohibit internet service providers from discriminating against content producers. “Who determines how you use the internet? Who decides what content you can view and when? Should there

Google warns Blogger users over porn: clean up or the content will be made private

  Google has warned users of its Blogger platform: “content which contains sexually explicit images and videos will be made private in one month. We will not delete the blogs, but they will no longer be publicly visible”, the tech giant says. The new rules require any blog with “sexually explicit or

Android phones can be tracked just with battery power alone

  We all know that a phone uses more power the further away it is from a cell tower as it tries to connect. So, an Android phone can be tracked by studying their power use over time, without using their GPS or wi-fi/data usage. Extra power is used by

PwC: cyber attacks caused damage to companies estimated at 2.7 billion. dollars

  Number of cyber security incidents detected in companies in 2014 increased by 48% over the previous year, reaching 42.8 million global events, apparent from an analysis performed by PwC – The Global State of Information Security Survey 2015, based on the responses of 9,700 managers responsible

Father of the Internet, Vint Cerf, warns of upcoming “Digital Dark Age”

In the past two years, big names oftech entrepreneurs and scientists who actively participated in the digital era evolution have expressed concern about the evolution of technology, whether we talk about about the risks involved out of control artificial intelligence or about things less “SF”. Vint Cerf, known as the