Ad networks are surreptitiously using ultrasonic communications to jump from device to device. It should come as no surprise that this communications channel can be used to hack devices as well. Powered by WPeMatico
Category: adware
Auto Added by WPeMatico
Google’s new ways to violate your privacy and — more importantly — how to opt out. Powered by WPeMatico
In December, Google’s Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about some of the security measures his company has put in place post-Snowden, was: “If you have important information, the safest place to keep it is in Google. And I can assure … Read More “Everyone Wants You To Have Security, But Not from Them” »
It’s not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months, Lenovo PCs have shipped with an adware app called Superfish that man-in-the-middles TLS connections. Here’s how it works, and here’s how to get rid of it. And you should get rid of … Read More “Man-in-the-Middle Attacks on Lenovo Computers” »