Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
In the two years since we launched the current Raspberry Pi Model B, we’ve often talked about our intention to do one more hardware revision to incorporate the numerous small improvements people have been asking for. This isn’t a “Raspberry Pi 2?, but rather the final evolution of the original Raspberry Pi. Today, I’m very pleased to be able to announce the immediate availability, at $35 – it’s still the same price, of what we’re calling the Raspberry Pi Model B+.
If you’ve been wanting an Apple desktop but didn’t want to shell out the cash for either an iMac or the Mac Pro, you’re in luck: a new, cheaper iMac goes on sale today. For $1,099 (that’s $200 less than the previous bottom model) the new 21.5-inch desktop looks just like every other iMac from the outside, but its Core i5 chip is dual-core with merely 1.4Ghz.
Developing markets targeted with $60 price point for chip and mobo combined.
The developing world may be turning toward cheap and portable smartphones, but AMD seems confident that what those markets need is more desktop computing power.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
Anyone can toss together a Raspberry Pi and a bunch of accessories and call it a computer learning kit, but Kano has a more joined-up approach which it’ll put into production if it can raise $100,000 by the middle of December. (more…)
What is Hour of Code
It’s a one-hour introduction to computer science designed to demystify code and show that anyone can learn the basics — on a browser, smartphone, or “unplugged”. The online tutorials won’t require any prior experience. (more…)
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks is usually either to pay up or suck it up. This post offers a few pointers to help readers avoid becoming the next victim. (more…)
Not satisfied with the bulk data it collects through court orders from internet giants Google and Yahoo, the National Security Agency reportedly vacuumed up traffic from communication links between the companies’ data centers, according to documents leaked by Edward Snowden. (more…)