Bad luck if you have one of the vulnerable Seagate wireless drives.
An undocumented backdoor allows malicious hackers to access files, just by using the username “root” with the password of “root”.
Grab the fix if you’re affected.
Eris Industries says it simply cannot engage in business if it is forced to incorporate cryptographic backdoors that can be accessed by MI5 and GCHQ.
The first of many?
The UK government’s plans for a Snooper’s Charter and backdoors on secure messaging applications don’t prove popular with one technology company.
China and the United States are at loggerheads over Beijing’s plan to force technology companies to share their encryption keys, and put backdoors into their software, if they wish to sell into China.
After all, that would never be proposed by a Western government, would it..?
Earlier this week, I appeared on BBC Radio Five to discuss David Cameron’s plans to snoop on secure messaging services.
It became a rather “heated discussion” with someone who advises the government on national security issues. Listen for yourself.
A data forensics expert and jailbreaker has discovered what he claims to be a undocumented “backdoor” in the iOS operating system used on iPhones and iPads that could be exploited by the NSA and other law enforcement agencies.
Read more in my article on the Intego Mac Security blog.
A new malware attack is targeting Mac computers with a Python-based backdoor Trojan.
And Windows computers aren’t getting away scot free either.
A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a boobytrapped Word document.
New variants of the latest Mac malware – the Tsunami backdoor Trojan – have been discovered.
The sky is not falling, and Mac users should not panic. But it may still be prudent to ensure your computers are protected against this and other Mac threats.
Mac users have once again been reminded not to be complacent about the malware threat, with the discovery that cybercriminals have enhanced an existing Trojan horse to disable the rudimentary anti-virus protection Apple has built into Mac OS X.
Was the R2D2 Trojan used by German law enforcement agencies to spy on citizens?
Read our FAQ, and learn more about this unfolding case.
A Trojan horse allegedly created by the German government to spy on citizens’ online activity and Skype conversations has been discovered.
Sit back, eat your popcorn, and get ready for the political storm if this proves to be true.
Mac users are once again being reminded to keep their anti-virus software up-to-date, following the discovery of a Trojan horse that poses as an update to Adobe Flash.
Would you be interested in a PowerPoint presentation demonstrating different sexual positions from the Kama Sutra?
Watch what you do with your mouse – you could be leading to a malware infection.