Stories by Jeremy Kirk

Google+

How three small credit card transactions could reveal your identity

Just three small clues -- receipts for a pizza, a coffee and a pair of jeans -- are enough information to identify a person's credit card transactions from among those of a million people, according to a new study.

New Chrome extension spots unencrypted tracking

A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet.

'Ghost' vulnerability poses high risk to Linux distributions

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.

Your typing style could better protect your accounts

A new type of keyboard could make it irrelevant if your password is divulged, providing a much higher level of computer security.

Sharp rise seen in attacks using stolen credentials

Organizations are seeing a sharp increase in attacks using stolen account credentials, with crooks using new techniques to beat fraud detection systems, according to Gartner.

Users get more control over data in latest Firefox beta

Mozilla is adding new capabilities in the beta version of Firefox 36 to give users and website owners more control over what data, if any, is sent to other websites during browsing.

Alleged Silk Road 2.0 'key assistant' charged

A 26-year-old man has been charged with three counts of conspiracy for his alleged role in running Silk Road 2.0, which launched shortly after the demise of the first iteration of the infamous underground market.

HealthCare.gov sending personal data to Twitter, Yahoo and Google

Information entered into the U.S. government's health insurance website is being passed to companies such as Twitter, Yahoo and Google, according to a report from the Associated Press.

This tool may make it easier for thieves to empty bank accounts

Banks and payment services are in a constant fight to detect account fraud, employing sophisticated ways to detect abnormal activities. One of those ways is "fingerprinting" a Web browser, or analyzing its relatively unique software stamp.

Report: Inside North Korea's network, NSA saw signs of Sony attack

The U.S. National Security Agency has had a secret foothold for years in North Korea's networks and saw signs of the Sony Pictures Entertainment attack but only in retrospect grasped its reach and depth, The New York Times reported Sunday.

Email accounts exposed in Verizon My FiOS mobile app

Verizon fixed a serious vulnerability in its My FiOS mobile application that allowed unfettered access to email accounts, according to a developer who found the problem.

Advertising company Turn will stop using Verizon's mobile tracking ID

Online advertising company Turn said Friday it will stop using a controversial tracking method by early next month that aids serving targeted advertisements to Verizon's mobile customers.

How to protect yourself against Verizon's mobile tracking

The Electronic Frontier Foundation has published a list of tools that can block online advertising companies from collecting web browsing data in ways that privacy advocates contend are deceptive.

How much trust can you put in Telegram messenger?

Messaging programs are a closely watched application category, with experts scrutinizing how communications are protected from government surveillance dragnets and hackers. The primary defense invariably involves encryption, but just saying an application uses encryption by no means ensures it's secure.

Google nixes widespread malvertising attack

Google has stopped a widespread malicious advertising attack that bounced Web surfers to dodgy sites hawking weight loss and skin care products.