Entries in Internet Security News
The recent revelation that the National Security Agency was able to eavesdrop on the communications of Google and Yahoo users without breaking into either company’s data centers sounded like something pulled from a Robert Ludlum spy thriller. How on earth, the companies asked, did the N.S.A. get their data without their knowing about it? The most likely answer is a modern spin on a century-old eavesdropping tradition.
The current cybersecurity model isn’t extensible across the proliferating spectrum of devices — providing protection to a heterogeneous world of connected devices requires a fundamentally new approach to security. McAfee and Intel Corporation are joining forces to tackle the next generation cybersecurity issue which impacts everyone and anything connecting to the Internet.
Since the slow introduction of internet monitoring systems around the world began, more and more people have attempted to preserve their privacy by signing up for VPN services like the Pirate Bay’s Ipredator and Pirate Party offering Relakks. But it turns out that there’s a gaping security flaw in these services that allows individual users to be identified.
Criminals are increasingly using open sources such as the internet, social networking sites such as Facebook or Twitter and births and deaths registers. Phishing is another weapon, when criminals try to get your PIN through setting up fake websites, or sending emails and letters posing as your bank.
It appears that a properly encrypted VPN provides complete protection against online data threats. If the VPN’s service provides real 128 bit or 256 bit encryption, the data is effectively off limits to third parties trying to scan, sniff or steal data packets.
As for addressing the security issues that allowed the breach, he wrote in a follow-up e-mail that the company is doing “a full security review on all access points to Twitter. More immediately, we’re strengthening the security surrounding sign-in. We’re also further restricting access to the support tools for added security.”