Getting hacked, whether on a desktop or smartphone, pretty much sucks. In a way, your entire digital life is an open book and even the control of your devices can be wrenched away from you. But imagine it’s not a smartphone getting ripped from your hands but rather your car’s steering wheel. (more…)
Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike. (more…)
UPDATE: To story we covered earlier.
Microsoft is releasing a security update for Internet Explorer that closes a gap that allowed attackers to take complete control of a computer. It also issued the update to Windows XP users, despite dropping support for the older operating system last month. (more…)
In a rare move, US Computer Emergency Readiness Team says to stop using Internet Explorer until Microsoft can plug a critical security hole. (more…)
The big problem with drones is they look like, well, drones. It makes them easy to spot, and easy to target. The Army has a solution to this problem: make them look like birds.
We added a Multi-OS section, with one of the best pieces of software I think I’ve seen come along for a while now. PREY – Prey lets you keep track of your laptop, phone and tablet whenever missing, whether you’re in town or abroad. Open source, proven software with hundreds of documented recoveries all around the world.
Not satisfied with the bulk data it collects through court orders from internet giants Google and Yahoo, the National Security Agency reportedly vacuumed up traffic from communication links between the companies’ data centers, according to documents leaked by Edward Snowden. (more…)
US and UK intelligence have reportedly cracked the encryption codes protecting the emails, banking and medical records of hundreds of millions of people.
Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network. (more…)