flip phone
Continue Reading

Phone Number Reputation (“PhoneID Score”) Being Created Based on Two-Factor Authentication

It’s time to worry about your phone number reputation and mobile identity. The company that provides two-factor authentication for the users of sites such as Google and Facebook has been quietly amassing the phone numbers of those users, and is now assigning a phone number reputation, which it calls a PhoneID Score – or your Mobile Identity – to all of those phone numbers being used for two-factor authentication and, it seems, any other phone numbers the data for which they have access.

Continue Reading

Adobe Hacked, Sends Notice to Millions to Reset Passwords

While the news broke a few days ago, many Adobe customers didn’t realize that Adobe was hacked – correction – Adobe was massively hacked, until they got the “Adobe Hacked” email that Adobe sent out to millions of customers just yesterday. “Important Password Reset Information” said the email, that no doubt went into countless spam folders. Which is why we are telling you here, as well.

The Internet Patrol default featured image
Continue Reading

Apple Fingerprint Recognition Scanner Technology on the iPhone Already Cracked – But Does it Really Matter?

Mere days after Apple released the iPhone 5s, with its new “Touch ID” fingerprint identity sensor scanner, the Chaos Computer Club announced that it had “successfully bypassed the biometric security of Apple’s TouchID using easy everyday means”. But does this mean the fingerprint recognition technology is useless? We say not.

The Internet Patrol default featured image
Continue Reading

McAfee Names Most Dangerous Celebrity Searches Likely to Infect Your Computer

Do you know who Lily Collins is? Neither did we, but don’t search the Internet to find out! That’s because McAfee, the Internet security software company, has determined that in 2013, searches for Lily Collins were the #1 celebrity searches most likely to cause your computer to be infected with a virus or other malware. In other words, Collins, who, it turns out, is the daughter of rocker Phil Collins, the lead actess in The Mortal Instruments: City of Bones, and recently was on People’s World’s Most Beautiful Women list, is the most dangerous celebrity for whom to search right now.

The Internet Patrol default featured image
Continue Reading

Mark Zuckerberg’s Facebook Page Hacked to Prove Security Hole

Palestinian security researcher Khalil Shreateh tried to warn Facebook – he really did. He did everything that he could think of to alert Facebook’s security and engineering folks to the fact that he had discovered a security flaw that allowed anyone to post to anybody else’s timeline, whether they were connected as friends or not. But they didn’t take him seriously (in fact they told him that it was not a security bug). So after all else failed, he posted a note on Mark Zuckerberg’s wall. And that did the trick.

The Internet Patrol default featured image
Continue Reading

Cryptographers, Hackers, Security Experts Warn of Cryptopocalypse

As the Edward Snowden situation continues to be at the fore of many a security expert’s mind, cryptographers and other self-styled crypto experts, along with security experts, and hackers – many of whom were at the Black Hat security conference recently – warn of a coming cryptopocalypse (crypto apocalypse ).

The Internet Patrol default featured image
Continue Reading

It’s Possible to Makes Copies of Keys from Pictures with Sneakey Key Cloning Software

Posting pictures that include images of your keys can be a serious security risk, as it is possible to make copies of keys from pictures. Software that allows people to clone a key from an image has been around for several years.

The Internet Patrol default featured image
Continue Reading

Concerns Voiced Over Possibility that Russians and Chinese May Already Have All of the Secrets that Edward Snowden Has in His Possession

Experts think that it is entirely possible that the Russians and the Chinese have already accessed the most confidential information that Edward Snowden has on his laptops.

The Internet Patrol default featured image
Continue Reading

How the HR Industry’s Candidate Management Systems Might Not Be Working For Everybody

More and more in an economy that’s squeezing the number of jobs — and relying heavily on the online resume submission — jobs sites and employers alike are using candidate management software to screen applicants. Gone are the days of people-intensive metrics as keywords, buzz words, and software dominate the way resumes are processed with talent management software. Is it a trend that’s not really working the way applicants and employers would like?

The Internet Patrol default featured image
Continue Reading

Rickrolling: The Benign Form Of Phishing That’s Never Gonna Give You Up While It Teaches Online Security

What is rickrolling? Well, if you’ve never been rickrolled, the best description is a zesty combination of an imaginative but harmless phishing technique, 80’s pop sensation Rick Astley, and a fun but cautionary lesson in taking care before you click ANY link online.

The Internet Patrol default featured image
Continue Reading

Loyalty Frequent Shopper Card Programs Gaining Access to Your Facebook Profile for Cross-Referencing Your Purchases and Shopping Preferences

Once again Facebook, your friendly social media hotspot, is the target of marketers wanting and gaining access to your personal data — as a loyalty frequent shopper card program can use that data to cross-reference your likes and interactions to target your pocketbook. And all of it is correlated to you, personally, without so much as a choice to opt-in.

The Internet Patrol default featured image
Continue Reading

National Intelligence Estimate on Cyber Espionage Leads to New Breed of Services

The new National Intelligence Estimate (NIE) on Cyber Espionage (the first NIE ever to address cybersecurity specifically), which is compiled by the office of the Director of National Intelligence (currently James R. Clapper), concludes that the United States is the target of a “major espionage campaign”, and fingers China as one of the leading offenders. This is providing a marketing opportunity for a new breed of services: organizations that will go out on the offensive for your company, basically hacking the hackers on your behalf, and essentially striking back at those attacking your network with a counter-strike. In fact, one such company calls itself “CrowdStrike”.

The Internet Patrol default featured image
Continue Reading

Windows XP Users Can’t Connect to Internet After Latest Kaspersky Anti-Virus Update

If you are a Windows XP user running Kaspersky anti-virus and you can’t connect to the internet from your computer, you are not alone. The latest update to the AV software is preventing many users from being able to connect to the internet, causing users to swarm to the Kaspersky forum to grumble.

The Internet Patrol default featured image
Continue Reading

Yes, Twitter was Really Hacked, and You May Have to Change Your Password

As many as 250,000 Twitter accounts have been hacked and compromised, according to Twitter. According to Twitter, the attack “was not the work of amateurs,” in fact, says Twitter, “the attackers were extremely sophisticated.” Twitter users whose accounts were compromised in the attack have been sent the following email, advising them to change their password.

The Internet Patrol default featured image
Continue Reading

Google Reveals Law Enforcement Requests

Google is making clear how they will be handling warrants and subpoenas for users’ personal information. With January 28th being Data Privacy Day, Google Senior Vice President and Chief Legal Officer, David Drummond, shared three initiatives on the Google blog, which detail how Google plans to protect user privacy when faced with a warrant or subpena to hand over private user information.