Archive for Januari, 2014

This is how the United States and Britain stolen smartphone data – News about the use of the popular Angry Birds game application as a means of spying by the National Security Agency ( NSA ) and the Government Communications Headquarters ( GCHQ ) is enough to make people gasp .

In the information explained that by using these games , then both the national bodies of the two countries that can harvest personal data of mobile device users .

But how do the two national bodies that do it ?

Ini cara Amerika Serikat dan Inggris curi data smartphone

Quoted from the Telegraph ( 28 / 01 ) , in explanation of Edward Snowden , all the people who use mobile devices as a means for self publication on social networks can easily be stolen data.

Conjunction with the Angry Birds game is because the game is becoming popular and fame is very high in many countries in recent years .

As with any process inside a smartphone , every person who plays the game Angry Birds ( which is connected to the Internet ) will indirectly connected to the central server .

In the connection process , there is a special technique used by the NSA and GCHQ to ‘ intercept ‘ the data was on the way before getting to the central server .

Thomas Labarthe , Managing Director for Europe at mobile security firm Lookout , explains that most applications do not use encryption when transmitting information or just encrypt specific details such as a financial transaction .

Another reason might be the smartphone application ‘ leaky ‘ than any other platform is due to mobile device users are not too concerned with the security of their gadgets .

” When the user installs the application they will usually be presented with a warning message . Unfortunately , most people do not read the warning and immediately use the application , ” said Michael Darlington , Technical Director of the Global Cloud Security Company Trend Micro .

Adrian Culley , technical consultant at Damballa , a former member of the unity of the Computer Crime Unit at Scotland Yard , said that once an application has been granted access to personal information , users have little or even not be able to have the right to control over their information .

It is therefore the responsibility of the application developer is expected to protect the privacy of their customers by increasing the level of encryption used and devise a better way to make users know what information is accessible to an application and be able to know where the information will go away .

” Very simply , to protect your privacy , when an application requests access to personal information , it is wise to reject it . Advisable not to install the application in any way if it does not know the track record of the manufacturer, ” said Culley .

Danger, Google Chrome can tap our conversation! – Please be aware when surfing the internet using the Google Chrome browser . The reason , have found a bug that caused Chrome able to listen to our verbal conversation .

As reported by NBC News ( 23/1 ) , the Israeli IT security researcher , Tal Ater , discovered a problem with the voice recognition feature which is owned by Google Chrome . This feature turns out to record our voice even when not activated .

Bahaya, Google Chrome bisa sadap pembicaraan kita!

Ater themselves have reported this to Google . The matter was then taken seriously and are being handled by Google. Even so , in fact, Google itself has no intention of fixing the problem despite being warned by Ater since September.

The voice recognition feature mentioned still work even though Google Chrome is closed . Thus, users could unknowingly being tapped .

This problem itself is arguably a very fatal if it fell into the hands of malicious hackers . A hacker can listen to our conversation about it seriously and utilize it for their own interests .

For the moment himself , I suggest Chrome users to access sites with HTTP features . Because voice recognition will not work automatically face the HTTP site had .

We give billions of dollars to hackers who could burst Chrome OS – Google has just announced on its Chromium blog that the company will deliver a total prize of Rp 32.8 billion for hackers who can hack the operating system .

As reported by VR – Zone ( 28/1 ) , this event will be packed in a competition called Pwnium , a hacking contest that has become an annual event Google . In 2014 , the event Pwnium has entered its fourth year and will be held in March.

At the CanSecWest security conference in Vancouver , British Columbia , Google announced when the prize will be awarded to hackers who can exploit the Chrome OS as a whole . This includes a thorough explanation of all the bugs that are related to the operating system .

Google beri miliaran rupiah ke hacker yang bisa jebol Chrome OS

In addition , participants Pwnium 4 will also be given a choice between an ARM -based Chromebook hack HP or Acer Chromebook based on Intel Haswell microarchitecture .

Hackers will get the money of USD 110 thousand , equivalent to Rp 1.3 billion if he can come in and infiltrate the system Chrome OS browser . While nominal gifts to more than tens of billions can be obtained if hackers could infiltrate and dominate Chrome OS as a whole .

Based on these alerts , the event held Pwnium 3 years ago , there was a hacker known only by the codename ‘ Pinkie Pie ‘ successful entry into the system browser in Chrome OS and winning a prize of $ 40 thousand, equivalent to Rp 486 million .

Pwnium 4 Google held itself aims to eliminate the existing holes in the system and make Chrome Chrome OS Chrome OS and the browser becomes more secure .