Skip to content
Facebook page opens in new windowTwitter page opens in new windowYouTube page opens in new window
Monday – Friday 10AM – 3PM EST
$0.000

View CartCheckout

  • No products in the cart.

Subtotal: $0.00

View CartCheckout

Noraa Productions
Production Entertainment | Expansions
  • Home
  • Events
  • Blogs
  • Music Store
  • Terms and Conditions
    • Disclaimer
    • Return and Refund Policy
    • Privacy Policy
  • Contact Us
    • About Us
  • Shop
    • Cart
    • Checkout
    • Wishlist
    • My Account
  • Home
  • Events
  • Blogs
  • Music Store
  • Terms and Conditions
    • Disclaimer
    • Return and Refund Policy
    • Privacy Policy
  • Contact Us
    • About Us
  • Shop
    • Cart
    • Checkout
    • Wishlist
    • My Account

Author Archives: Lily Hay Newman

You are here:
  1. Home
  2. Article author Lily Hay Newman

Google Warns of New Spyware Targeting iOS and Android Users

Exploits, Security, Security / Cyberattacks and Hacks, Security / Security NewsBy Lily Hay NewmanJune 23, 2022

The spyware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.

The Ghost of Internet Explorer Will Haunt the Web for Years

Security, Security / Cyberattacks and Hacks, Undead TechBy Lily Hay NewmanJune 20, 2022

Microsoft’s legacy browser may be dead—but its remnants are not going anywhere, and neither are its lingering security risks.

How a Saxophonist Tricked the KGB by Encrypting Secrets in Music

Reverberations, Security, Security / National Security, Security / PrivacyBy Lily Hay NewmanJune 8, 2022

Using a custom encryption scheme within music notation, Merryl Goldberg and three other US musicians slipped information to Soviet performers and activists known as the Phantom Orchestra.

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

Lock and Keyphrase, Security, Security / Cyberattacks and Hacks, Security / Privacy, Security / Security NewsBy Lily Hay NewmanJune 7, 2022

MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.

An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

Open Windows, Security, Security / Cyberattacks and HacksBy Lily Hay NewmanJune 3, 2022

The company continues to downplay the severity of the Follina vulnerability, which remains present in all supported versions of Windows.

The Surveillance State Is Primed for Criminalized Abortion

Privacy Police, Security, Security / PrivacyBy Lily Hay NewmanMay 24, 2022

A new report lays out existing US police surveillance capabilities that can easily be repurposed to monitor pregnant people.

Spyware Vendors Target Android With Zero-Day Exploits

Hacks For Hire, Security, Security / Cyberattacks and HacksBy Lily Hay NewmanMay 19, 2022

New research from Google’s Threat Analysis Group outlines the risks Android users face from the surveillance-for-hire industry.

The NSA Swears It Has ‘No Backdoors’ in Next-Gen Encryption

Security, Security / Security News, security roundupBy Lily Hay NewmanMay 14, 2022

Plus: New details of ICE’s dragnet surveillance in the US, Clearview AI agrees to limit sales of its faceprint database, and more.

The Hidden Race to Protect the US Bioeconomy From Hacker Threats

Risk Assessment, Security, Security / Cyberattacks and HacksBy Lily Hay NewmanMay 12, 2022

A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.

12345…
678910111213141516171819202122232425
26
Noraa Productions
  • Shop
  • Disclaimer
  • Privacy Policy
    • Terms and Conditions
  • Return and Refund Policy
Footer

Copyright © 2010-2022 Noraa Productions. All Rights Reserved. Proud Partner Samsung.

Go to Top