Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
The internet around the world has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history. (more…)
American and Israeli researchers have used twisted, vortex beams to transmit data at 2.5 terabits per second. As far as we can discern, this is the fastest wireless network ever created — by some margin. This technique is likely to be used in the next few years to vastly increase the throughput of both wireless and fiber-optic networks.
Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself. (more…)
Hackers temporarily blocked President Vladimir Putin’s web site on Wednesday, carrying out a promise to disrupt government information portals two days after his swearing-in for another six-year term that has drawn street protests. (more…)
A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security. (more…)
DNS is in the news as the FBI will be shutting down Internet use for a large amount of U.S. based users this July, so we wanted to take a moment to bring some clarity to the situation especially if you’re one of the people that could be affected. (more…)
If the news wires are to be believed, the death of spam is imminent. Again! (In 2004, Bill Gates famously remarked that spam would be a thing of the past by 2006.) Now, the Big internet providers are joining forces to kill it DEAD!! The following article is from Sophos and does the best at explaining the plan so I’m providing the entire article. (more…)