Should you be worried about the Superfish security issue?

Should you be worried about the Superfish security issue?

When Lenovo shipped some of their notebook products worldwide last year, some users discovered they came with a piece of pre-installed tracking software. The software, Superfish, was created by a company of the same name, which apparently paid Lenovo “very minor compensation” to be able to install the software on their computer models.

Why is this a big deal?
Superfish pushes ads on the laptop owner’s browser. While this is mildly annoying, that’s not the problem. The big issue in the words of one of the first users who discovered the adware:
“[Superfish] will hijack ALL your secure web connections (SSL/TLS) by using self-signed root certificate authority, making it look legitimate to the browser.”

The gadgets that spy on your phone – and you

The gadgets that spy on your phone – and you

It’s no secret that many governments have been keeping tabs on their citizens through controversial surveillance methods. Different agencies shell out millions of dollars on complex machines developed by tech companies – and with customers this demanding and lots of money, it’s no wonder why this particular sector of the tech industry is booming.

Take Harris Corporation, for example. For the past couple of years, it has sold a wide range of clandestine mobile phone surveillance technologies to different government agencies (which, yes, includes the National Security Agency). According to ArsTechnica.com, the company has earned over $40 million since 2004, all thanks to spy technology sales.

Here are some of the surveillance gadgets that have been used in the country over the decade.

The 411 on dealing with online identity theft

The 411 on dealing with online identity theft

What is online identity theft? It’s when someone collects your personal information to open your online accounts, using whatever they find there for their own personal gain (or amusement). An identity thief can be anyone – it could be someone from a different country or even someone close to you. Identity thieves have different motives as to why they attack, from wanting to steal your credit card information to the desire to ruin somebody’s reputation and everything beyond and in between.

Prevent hackers from stealing your personal info through your smartphone

Prevent hackers from stealing your personal info through your smartphone

Since our smartphones are now an integral part of our social and professional lives, they have become a gold mine of personal information and a storage bank that contains important data about how we live our daily lives. It contains invaluable information about ourselves, from our schedules and credit card information, to our private conversations, the apps we use, our social media profiles, and e-mails. In short, the kind of information you don’t want anyone else to access, but is precisely what hackers are targeting.

Security expert says 500 million android phones are infected due to flashlight apps

Security expert says 500 million android phones are infected due to flashlight apps

Alarming information has been brought forward this month that the top 10 flashlight apps on Google Play store are malware. Gary Miliefsky, CEO of Snoopwall, estimates over half a billion Android devices globally are unknowingly infected and sending personal information to China, India, and Russia.

Gary goes on further to say the only way you can be sure to uninfect your Android device is with a full factory reset. Apple iOS users are safe from this issue. Here is a link to the Snoopwall Flashlight Apps Threat Assessment Report. The report goes on to list these flashlight apps:

Protect your WiFi home network today

Protect your WiFi home network today

Let’s face it, having wireless Internet in our home has become a necessity. As with just about everything in our digital age, the convenience does come with security and privacy risks. Here’s a roundup of common security pitfalls and the initial steps you can take today to make your network more secure.