inserthtml.com - Archives (septembre 2015)

Web design and development blog providing you with knowledge and inspiration.

Le: 30 09 2015 à 13:42 Auteur: Navi

Following a report of a hack in Amazon’s EC2 platform that would allow attackers to steal the cryptographic keys, the company issued a patch to solve the issue while pointing out that researchers are performing hacks with rare and unlikely conditions. “I’d point out that this research shows Amazon EC2 continues to strengthen its built-in, base level security measures, even…

Le: 30 09 2015 à 13:20 Auteur: Navi

A new report says that the passwords we use on a daily basis should require a supplemental step. With e-mail, Facebook, Twitter, Instagram and all of the other passwords tech users are required to remember things can get pretty complicated, especially if you have ever used “password” as your actual password. “It’s time for a change. Passwords alone can’t hack…

Le: 29 09 2015 à 15:11 Auteur: Navi

Multiple sites have begun reporting a cyber-war between India and Pakistan following a Pakistani hack on the Kerala Government’s official website. India has responded with a hack of their own and it’s all getting very interesting. “Late Saturday night, the official website of the Kerala Government: kerala.gov.in, was hacked by a person identifying himself as Faisal Afzal aka ‘Faisal 1337′ for…

Le: 29 09 2015 à 15:10 Auteur: Navi

The hacks just keep coming and this time Apple’s iPhone is highlighted. iPhone’s users can have their photos and contacts accessed and the hacker doing so won’t even need the passwords to get to them. “The hack reportedly works on iOS version 9.0.1, which Apple released Wednesday, although some people say they are unable to reproduce it,” according to Arstechnica. “The…

Le: 28 09 2015 à 15:51 Auteur: Navi

The U.S. and China have engaged in a back and forth over cybersecurity issues after the large U.S. Federal hack that exposed millions of employees personal information. All fingers were pointed at China who continued to deny involvement. However, the two countries are now vowing to denounce an involvement in cyber espionage for commercial gain purposes. “President Obama said during…

Le: 28 09 2015 à 15:31 Auteur: Navi

The first stage of Blackphone came with a few flaws especially in the usability department, however, Silent Circle, the company that developed the Blackphone, has returned with a second device that has a promising security infrastructure. Not to mention, the usability is much better, according to recent reports. “The new Silent OS adds updated security functionality, better management for enterprise users,…

Le: 25 09 2015 à 13:03 Auteur: Navi

Cyber security is one of the hottest topics in mainstream news and the internet. Following the U.S. federal government breaches and the Ashley Madison breaches, the amount of stolen personal information floating around the cyber black market is extensive. Google intends on helping crackdown on the cybercrime economy. Google’s team of researchers from their fraud and abuse groups came up with…

Le: 25 09 2015 à 13:02 Auteur: Navi

In the U.S. the amount of freedom on the net is taken for granted. Users are able to access almost anything they can imagine without having to worry about the government controlling what they can and cannot see. In Thailand the Internet was pretty much the same aside from a ban on pornography and slander of government officials. However, censorship…

Le: 24 09 2015 à 15:17 Auteur: Navi

Your identity may be worth the world to you but it’s being shopped around for less on the Dark Web. According to new reports, your identity is being old for as little as $1. “When it comes to PII, sales are conducted on a per-line basis of approximately $1. Each line of data contains a name, a full address, a…

Le: 24 09 2015 à 15:16 Auteur: Navi

Your fingerprint is essentially one of the most personal forms of identification you hold outside of your DNA. That’s why OPM’s admission of 5.6 million fingerprints lost in the U.S. federal employee breach is so scary. If you’re a victim of identity theft everything is copesthetic; it’s easy to get your info back. Your fingerprint on the other hand, is…

Le: 23 09 2015 à 15:41 Auteur: Navi

When Apple’s App Store saw an influx of XcodeGhost Apps the company, once known for their seemingly impenetrable security, seemed to have finally had a weakness exploited. While the infected apps aren’t “security-invading malware,” the problem seems to be more plentiful that originally reports suggested. “XCodeGhost seems to be far more widespread than initially assumed,” researchers from security firm Appthority…

Le: 23 09 2015 à 15:23 Auteur: Navi

New reports are suggesting that a security flaw in SAP AG’s Afaria mobile management system could allow hackers to wipe mobile devices; an action that’s only taken by companies for consumers who have lost their devices or had them stolen. “Ordinarily, system administrators send a signed SMS from an Afaria server to lock or unlock a phone, wipe it, request…

Le: 22 09 2015 à 15:42 Auteur: Navi

Drones are seemingly very easy to get your hands on but government drones contain a level of secrecy and ingenuity that your regular market can’t provide. However, the big question here is how are government drones being used? A group of hackers looks to spy on drone with a balloon that will be launched as far as the stratosphere. “One…

Le: 22 09 2015 à 15:26 Auteur: Navi

In attempts to crack down on cybersecurity, the Indian Department of Electronics and Information Technology created a legislation which includes banning users from deleting information stored on their devices before a 90 day period. “Almost every Internet-based method of communication uses some level of encryption. This means that deleting messages that are less than three months old from widely used…

Le: 21 09 2015 à 15:38 Auteur: Navi

China and the U.S. are in talks to come up with a deal that may limit cyberweapon attacks which could lead to “the first-ever arms-control deal for cyberspace,” according to new reports. China and the U.S. has been in talks over the future of cybersecurity following a large breach on the U.S. Federal Government exposing millions of federal workers personal…

Le: 21 09 2015 à 15:19 Auteur: Navi

Apple is hot off another fresh OS update with iOS 9, however, things got a little tricky when a counterfeit version of Apple’s Xcode developer program was discovered. The Counterfeit Xcode was being used to create and infect apps with malware for iOS and Mac system software. “According to security firm Palo Alto Networks, which initially reported the breach, 39 apps…

Le: 18 09 2015 à 15:03 Auteur: Navi

iOS 9 adapters seemed to be more excited about being able to have an ad-blocking capability than a multitasking one according to a recent report which shows, Ad-Blocker’s among the top apps in the Appstore. “One of the better features in this week’s newly released version of Apple’s mobile operating system, iOS 9, is the ability for users to block ads…

Le: 18 09 2015 à 15:03 Auteur: Navi

US technology companies are now being encouraged to sign a pledge that will “comply with Chinese information security policies. However, it could also give China backdoor access to the companies. “The terms of the pledge, which the New York Times reports requires companies to ‘promise they would not harm China’s national security and would store Chinese user data within the country,’ are similar…

Le: 17 09 2015 à 16:06 Auteur: Navi

It’s hard to imagine having to play dual roles in your profession especially ones that may require going back to school or added training that takes time and money. Developers are becoming more frustrated by having to depend on designers for feedback or direction and designers are constantly frustrated with the results and having to work back and forth. So,…

Le: 17 09 2015 à 15:45 Auteur: Navi

The political malware attacks that have plagued numerous governments and other organizations within them has been uncovered as a cyber-espionage group, operating out of Russian and by the command of the Russian government, according to new reports. “In a report issued today, researchers at F-Secure provided an in-depth look at an organization labelled by them as ‘the Dukes,’ which has been active since…

Le: 16 09 2015 à 16:07 Auteur: Navi

Today the iPhone iOS 9 software update will be made available to countless consumers and with it comes a serious security update that can protect users from a bluetooth iPhone attack. For those who can’t stop using their phones, there is also added battery life coming as well. “On Wednesday, Australian security researcher and consultant Mark Dowd revealed that iOS…

Le: 16 09 2015 à 15:40 Auteur: Navi

Other than the vicious hack that is locking up Android devices and demanding $500 in exchange for unlocking the device, there is another Android hack that is lurking. Password protected Android devices are now easily being targeted and hacked without too much energy being expended. “A security analyst at the University of Texas’s information security office in Austin has discovered…

Le: 15 09 2015 à 15:54 Auteur: Navi

There has always been a divide between web-developers and web-designers. There are countless articles online such as “6 Ways Designers and Developers Can Work Together,” as if it is an impossible task. So, who is really at fault here? Well, Francis Onwumere suggests a simple solution might be for designers to learn how to code. “Aesthetic experience is defined as…

Le: 15 09 2015 à 15:34 Auteur: Navi

It’s not very often that an online privacy tool lasts too long before competition causes it to fold. The Tor anonymity software however, has become one of the most globally used pieces of privacy software and it only seems to be growing. “The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on…

Le: 14 09 2015 à 16:01 Auteur: Navi

The Ashley Madison hack was without a question one of the most clever and harmful ones because of it’s potential to tear seemingly happy marriages apart, if they haven’t already. Previously we reported about the amount of simple and easy passwords used by Ashley Madison but more analysis shows that some passwords might have a direct correlation when it comes…

Le: 14 09 2015 à 15:40 Auteur: Navi

Whenever you had an iPhone migrating carriers was practically an impossible task which kept you in the clutches for years if you were a constant iPhone consumer. Now, reports are claiming that the iPhone 6S and 6S Plus from Apple is doing away with that practice slowly but surely. “When Steve Perlman looks at the latest iPhones, he doesn’t see the…

Le: 11 09 2015 à 15:42 Auteur: Navi

The Android ransomware that has been demanding money from users just got a bit more annoying. The malicious ransomeware is now changing the lock pins on users phones forcing them to use a factory reset method to remedy it. “Malicious apps that disable Android phones until owners pay a hefty ransom are growing increasingly malevolent and sophisticated as evidenced by…

Le: 11 09 2015 à 15:25 Auteur: Navi

The hacking days are by no means behind us all and absolutely nothing seems to be safe from hackers. Over 10 million health records were exposed thanks to the hackers who breached Excellus BlueCross BlueShield and a partner company’s security. However, it is not the only medical breach this year. “The hack of Rochester, New York-based Excellus follows not just…

Le: 10 09 2015 à 15:53 Auteur: Navi

This year the automotive industry learned that adding technology to automobiles means there can be no lapse when it comes to properly securing it as well. GM is one of the companies that learned it the hard way after their OnStar system was hacked by researchers who pointed out serious security flaws in the system. Researchers were able to hack…

Le: 10 09 2015 à 15:35 Auteur: Navi

What the Ashley Madison security breach and countless other hacks this year have taught big businesses is that they need to up the ante on cybersecurity for their companies. That’s where Okta comes in. It’s a company that believes it can be the savior for big businesses who might be living in cyber fear. “Investors are putting their faith in…

Le: 09 09 2015 à 15:54 Auteur: Navi

Companies like Microsoft and Apple are becoming a bit more stern when it comes to government requests for data from consumers devices. However, a new report is showing that Apple may have a flaw in the way their entire iMessage encryption system is set up, which could allow for easy wiretapping. “This centralized approach to key management isn’t necessarily a…

Le: 09 09 2015 à 15:32 Auteur: Navi

Hackers are so good at what they do that they can sometimes go undetected for years before anyone notices them tampering with or stealing information. It’s now 2015 but according to a new report, a Russian Spy Group called Turla has managed to secretly hack satellite IP addresses since 2007. “If you’re A state-sponsored hacker siphoning data from targeted computers, the…

Le: 08 09 2015 à 15:51 Auteur: Navi

If you’re a celebrity this would probably be awesome news, as a new report claims that Chinese hackers can be paid to delete news stories that you may not have enjoyed. However, it looks like some of those hackers are already being caught dead in their tracks. “Clients—government officials, business executives, celebrities, anyone looking to rid themselves of unwanted publicity—would…

Le: 08 09 2015 à 15:32 Auteur: Navi

Ashley Madison customers are now receiving e-mails demanding a specific amount of money or bitcoins in exchange for not having their information exposed. However is this really going to prevent customers from having their information exposed for their family and friends to see? “In the wake of the recent Ashley Madison e-mail dump, some customers have gotten demand e-mails,” according Arstechnica.…

Le: 04 09 2015 à 15:31 Auteur: Navi

If the federal law enforcement decides they are going to keep surveillance on your cell phone they will need a warrant to do so. The US Department of Justice has introduced the new policy that will make it somewhat harder for law enforcement officials to tap into your cell phone for surveillance purposes. “The devices, called cell site simulators for…

Le: 04 09 2015 à 15:17 Auteur: Navi

The automotive world began featuring the technological underworld when Chrysler vehicles were hacked to prove that their UConnect system had a serious case of security flaws that could allow a hacker to take control of your vehicles transmission and brakes. Now, Chrysler is facing some criticism from the way they chose to handle the patching of the devices. “Six weeks…

Le: 03 09 2015 à 15:36 Auteur: Navi

If you’re an Android user and you’ve gotten a strange message from the NSA demanding money in return for a decryption of your personal files, chances are you had a run in with an intelligent Ransomware that isn’t smart enough to realize that using PayPal as a method of paying a fine is a bit too fishy. “The updated version…

Le: 03 09 2015 à 15:17 Auteur: Navi

It might sound like something out of a horror film like Insidious, however, some of the video-streaming baby monitors might be vulnerable to hackers giving parents an unwanted watchful eye over their children. The devices aren’t taking all of the blame either, a report pointed the finger towards poor/unsafe security in household networks. “The research, conducted by cybersecurity company Rapid7 and…

Le: 02 09 2015 à 15:42 Auteur: Navi

Mac’s password management system might be in jeopardy for some users as a Genieo Innovation adware has been caught accessing the Mac Keychain without user’s permission. The password management system is responsible for saved passwords and other information that users would like to keep safe from the hands of attacks or people who like to snoop around on their computers.…

Le: 02 09 2015 à 15:24 Auteur: Navi

Google’s decision to changes it’s logo has been an enigmatic story in design news however, the Wired breakdown of the new logo shares a bit of insight into the font that the company used and possible motives behind the change. “The bold new logo preserves the old logo’s most recognizable element—the famous blue-red-yellow-blue-green-red color sequence—but presents the company’s name in a bespoke typeface called…

Le: 01 09 2015 à 21:24 Auteur: Nicole

The United States Energy Department is actively seeking someone who can design a new logo for its plug-in electric vehicles (PEVs) program and is willing to pay up to $5,000 for the finished product. The “DOE is looking for a new logo that ‘can evoke through imagery ideas of: Electricity, the ‘fun’ factor of PEVs, PEVs’ cost savings, environmental sustainability …

Le: 01 09 2015 à 15:55 Auteur: Navi

While Windows 10 proved to be one of the best operating systems that Microsoft has released in some time, new reports are saying that it’s not enough to make up for parts of their previous platforms that may have contained spy features. “Windows 8 included many of the same online features as are now raising hackles around the Internet. While…

Le: 01 09 2015 à 15:34 Auteur: Navi

The investigation behind the alleged Chinese hackers who performed a slew of data breaches on the U.S. may have gone on long enough. The U.S. is now considering hitting China with economic sanctions as a mode of getting back at companies who benefitted from the data breach. “In particular, the sanctions would be ‘against Chinese companies and individuals who have…