Are millennials keeping their data safe?

[section_tc][column_tc span=’12’][h_tc type=’2′] Norton reports one in three millennials use the same password for all accounts; 53 percent have shared passwords with friends or family. By DECCAN CHRONICLE [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] While the awareness level in millennials is high about the latest trends in technology and gadgets, it is alarming to see how the knowledge is not being translated well into practice, making them an easy prey for…

Surely we can find, and stop, high-tech spies

[section_tc][column_tc span=’12’][h_tc type=’2′] It’s rumored that the U.S. intelligence community has commissioned The Eagles to rewrite some of their[nbsp_tc]famous lyrics[nbsp_tc]to serve as a deterrent to Russia and China. The hope is that this new song will stop the apparently unabated espionage activities occurring in the National Capital Region, known as the NCR. It’s called “You Can’t Hide Your Spyin’ Eyes.” BY MORGAN WRIGHT [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] Concerns about…

TEEN FINDS HIDDEN CAMERA IN LOCKER ROOM DURING ITALIAN TOURNAMENT

[section_tc][column_tc span=’12’][h_tc type=’1′] A disturbing scandal has recently rocked Italy‘s youth volleyball circuit. A cellphone belonging to a referee was found hidden with its camera turned on inside an arena’s locker room. The event happened during an international tournament involving 250 youngsters from six European countries. The cellphone was found by a player from a Lithuanian team, who immediately went to his coach with the device. The police was called,…

New LTE attacks open users to eavesdropping, fake messages, location spoofing

[section_tc][column_tc span=’12’][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit design flaws in the communications protocol and unsafe practices employed by the stakeholders and can be used to achieve things like impersonating existing users, spoofing the location of the victim device, delivering fake emergency and warning messages, eavesdropping…

This smartphone cuts off your camera and microphone so no spy agencies can watch you

[section_tc][column_tc span=’12’][ul_tc timing=’linear’ duration=’1100′ delay=’0′][li_tc icon=’el-el_stop’ icon_color=’#cdad00′] Cybersecurity firm DarkMatter has unveiled its first smartphone [/li_tc][li_tc icon=’el-el_stop’ icon_color=’#cdad00′] Katim is designed to stop spy agencies listening to you [/li_tc][li_tc icon=’el-el_stop’ icon_color=’#cdad00′] It is an Android smartphone with a 5.2-inch display and strong encryption [/li_tc][li_tc icon=’el-el_stop’ icon_color=’#cdad00′] One security feature called “shield mode” disconnects power from the microphone and camera on the device, so nobody can spy on your conversations [/li_tc][/ul_tc]…

Copyright © 2019 Shapestones Ltd. All Rights Reserved