You are here
Computing Featured Mobile 

Carrier IQ and mobile (in)security

Back in October, a story ran on XDA Developers about software running on HTC Android phones called Carrier IQ (CIQ) that appeared to be collecting a fair amount of data about your device and not doing a good job of storing it securely. Beyond your device ID, it collected phone numbers, geo-location and account names. Since that initial discovery, there’ve been reports of it being even more invasive, leading Carrier IQ to issue a Cease and Desist letter and denying what it does.

Read More

Playstation Network still down, personal information ‘compromised’

Last Wednesday Sony took both the Playstation Network and Qriocity offline after an external intrusion, taking them a couple of day sto communicate this with the public. It’s now the following Tuesday, bringing the outage to day six, with little official word until now. In an update to the Playstation Blog, Sony has confirmed that there has been a “compromise of personal information”.

Read More

Router exploit leaves millions vulnerable

One of the biggest problems with computer security has to do with password protection.  Although it took a few years, most users are now smart enough to make sure they have proper password protection both on their computers and their WiFi, but a new variation of an old exploit appears to leave a wide range of consumer grade routers vulnerable to attack The exploit, reported by Ars Technica, and to presented at the Black Hat security conference as “How to Hack Millions of Routers”, is a new take on an…

Read More

The boogie-man that is internet cloud security vulnerabilities

After participating in a recent online discussion about security vulnerabilities in internet clouds, I was a bit surprised at how many people still seem to think that using publicly-exposed internet clouds are less secure than clouds or networks sitting behind private firewalls. It’s important not to be distracted by buzz words, a cloud is a large network of servers. The servers are set up to talk to each other to share the load. This has been something that’s been around for many years.

Read More