Microsoft were bought under severe criticism after it was found that in 2012 the company had peeked inside the Hotmail account of an employee suspected of leaking Windows 8 trade secrets. Within 24 hours of the revelations, the company thought it would be expected it to “provide additional context and describe how we are strengthening our policies.” But the “strengthened” …
Claim Against Facebook, Says They Scan The Facebook Private Messages
On December 30, a lawsuit was filed against Facebook alleging that the company scans the messages containing links and targets with the tailored advertisements. The lawsuit was filed with the U.S. District Court in the Northern District of California on behalf of two named plaintiffs, Matthew Campbell and Michael Hurley, claiming that Facebook mines private data contained in messages for …
Facebook Allowing Under 18 Users To Share Post Publicly
Earlier, users aged 13 to 17 were not allowed to share post publicly, instead only able to share posts with “friends of friends” on the site. Now, Company decided to move parallel with other social networking sites like twitter, as it allows users to post publicly by default. This change also means that teenage users will be given a default …
Ministry Of Defense Plans To Work With Big Contractors To Face Cyber-Attacks
Alongside international terrorism, Cyber-attacks are one of the top four threats to UK national security. The British government assigned the protection of computer networks as one of the country’s most important national security priorities, back in 2010. Defense companies, in UK, face cyber-threats almost daily, mostly from nations wanting to steal sensitive information about new technology and weapons. The UK government has …
Bluebox Discovers A Critical Vulnerability In Android
Bluebox Security has revealed a loophole in Android’s security model, which can potentially affect up to 99 percent of Android devices in existence. The vulnerability is claimed to have existed since Android 1.6 (Donut), which allows malicious app developers access to modify the code of a legitimate APK, all this without having to break its certified cryptographic signature, which could …
- Page 1 of 2
- 1
- 2