CNET

About CNET

This author has not yet filled in any details.
So far CNET has created 141 blog entries.

10 Million Android Smartphones Hit With HummingBad Malware – Is Yours One?

SAN FRANCISCO - A malicious app called HummingBad has taken hold of about 10 million Android phones around the world, and it collects your personal data, plus makes it act like you’ve clicked on ads that, well, you haven’t. Fortunately, there are steps you can take to see if HummingBad has roosted with you and

By |2016-07-07T17:56:40-04:00July 7th, 2016|Cyber Defense|

U.S. Senate Could Give FBI Power To View Your Internet Activity Without A Warrant

WASHINGTON DC - Everything you view on the Internet, from websites to how long your browsed a particular page, could be viewed by the FBI without the need for a warrant in terrorism and spy cases, if this legislation is enacted this week in the U.S. Senate. At stake is access to your personal "electronic

By |2016-06-09T15:39:29-04:00June 9th, 2016|Cyber Defense, News, Politics|

Apple Kills iPhone Diagnostic App That Reveals If Device Infected By Malware

CUPERTINO - A new iPhone diagnostic app - aimed to reveal if your device had been infected by malware - has been given the cold shoulder by Apple. Released little more than a week ago, an app dubbed System and Security Info aimed to deliver core details about your iPhone, including your CPU, memory and

By |2016-05-20T07:50:54-04:00May 19th, 2016|Cyber Defense, Mobile MI, News|

Change Your Password If You Have LinkedIn Account – Hackers May Have It

SAN FRANCISCO - LinkedIn announced Wednesday that more than 100 million members' email and password combinations stemming from a 2012 data breach have been posted online, residual fallout from hackers stealing and publicly releasing a separate set of 6.5 million encrypted passwords. "Yesterday, we became aware of an additional set of data that had just

By |2016-05-19T20:18:13-04:00May 19th, 2016|Cyber Defense, Featured|

FCC, FTC Ask Mobile Phone Makers, Wireless Carriers Why Security Fixes Take So Long

WASHINGTON DC - US regulators want to know how mobile phone makers and wireless carriers handle security vulnerabilities and why fixes seem to take so long. The Federal Communications Commission and the Federal Trade Commission on Monday sent letters to fourteen companies, asking for details about how they release security updates. The FCC sent letters

By |2016-05-12T21:35:57-04:00May 12th, 2016|Cyber Defense, Mobile MI, Politics|

Twitter Stops US Law Enforcement, Intelligence Services From Analyzing Tweets

WASHINGTON DC - Microblogging platform Twitter has stopped US law enforcement and intelligence services from using a data analytics service that can process and analyze the platform's tweets and messages. On Sunday, a senior US official and other people close to the matter told the Wall Street Journal that Twitter's move, while not made public,

By |2016-05-12T21:45:32-04:00May 12th, 2016|Cyber Defense|

Houses Unanimously Approves Email Privacy Act – Senate Expected To Do Same

WASHINGTON DC - Who says Congress can’t work together? Well   certainly so when it comes to email privacy. On Wednesday the House of Representatives voted 419-0 to approve the Email Privacy Act, an update to a 30-year old law privacy advocates say is long overdue. The bill essentially fills a loophole in the 1986

By |2016-04-28T19:21:38-04:00April 28th, 2016|Cyber Defense, Featured, Politics|

Secret Code For Smart Devices To Keep Black Hats Out Of Internet Of Things

SAN FRANCISCO - Everyone knows that all these smart devices plugging into today’s homes - part of the exploding Internet of Things - also provide black hats with a golden opportunity to hack computer networks. On Wednesday, Samsung and Thales e-Security announced a new system for smart devices that manufacturers can plug into a refrigerator

By |2016-04-28T18:43:20-04:00April 28th, 2016|Cyber Defense|

Uber Publishes Report That Says Government Agencies Demand Access To Records Affecting 11.6 Million Riders

SAN FRANCISCO - Uber, the ride hailing company, has had its file of requests by government agencies demand user data, a report contends, some 33 regulatory requests for trip data that affected 583,000 drivers and 11.6 million riders. Uber released its first-ever transparency report on how it has complied with requests for user data by

By |2016-04-14T19:31:56-04:00April 14th, 2016|Cyber Defense|

U.S. Senators Push Encryption Bill Opponents Say Pits National Security V Cybersecurity

WASHINGTON DC - U.S. Sens. Diane Feinstein and Richard Burr are pushing an encryption bill, opponents say, furthers a fight that pits national security against cybersecurity. Feinstein and Burr’s bill gives law enforcement and government investigators access to encrypted devices and communications. Opponents like Chris Doggett, senior vice president of cybersecurity company Carbonite, argue the

By |2016-04-14T19:14:25-04:00April 14th, 2016|Cyber Defense|