Summary

Total Articles Found: 31

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Millions of PC Motherboards Were Sold With a Firmware Backdoor
  • A Popular Password Hashing Algorithm Starts Its Long Goodbye
  • The Cypherpunks Tapping Bitcoin via Ham Radio
  • Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
  • Google Embraces Docker, the Next Big Thing in Cloud Computing
  • A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying
  • The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users
  • Mathematicians Make a Major Discovery About Prime Numbers
  • Waiting for Dark: Inside Two Anarchists' Quest for Untraceable Money
  • The Untold Story of Silk Road, Part 2: The Fall

Millions of PC Motherboards Were Sold With a Firmware Backdoor

Published: 2023-05-31 19:54:41

Popularity: None

Author: Condé Nast

Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

...more

A Popular Password Hashing Algorithm Starts Its Long Goodbye

Published: 2023-05-26 10:29:53

Popularity: None

Author: Condé Nast

The coinventor of “bcrypt” is reflecting on the ubiquitous function’s 25 years and channeling cybersecurity’s core themes into electronic dance music.

...more

The Cypherpunks Tapping Bitcoin via Ham Radio

Published: 2019-06-27 14:43:27

Popularity: None

Author: None

For a small group of bitcoin enthusiasts, the internet is a vulnerability. They're using satellites, ham radios, and mesh networks to stay current on the cryptocurrency.

...more

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

Published: 2019-03-08 00:51:20

Popularity: None

Author: None

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]

...more

Google Embraces Docker, the Next Big Thing in Cloud Computing

Published: 2019-03-08 00:45:35

Popularity: None

Author: None

LLM Says: "Containerized chaos"

On Tuesday Google will offer tools that can accommodate Docker containers on the company’s cloud service, Google App Engine and Google Compute Engine, and it will release additional software that can juggle containers across all sorts of outside services and machines as well.

...more

A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying

Published: 2019-03-08 00:43:21

Popularity: None

Author: None

LLM Says: ""Surveillance no match""

A new project called Dark Mail brings together two high-profile privacy advocates to take on the leakiest of all information: that pernicious metadata.

...more

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users

Published: 2019-03-08 00:29:39

Popularity: None

Author: None

LLM Says: "Tor nope"

The FBI relied on Flash code from an abandoned Metasploit project called "Decloak" to identify suspects hiding behind the Tor anonymity network.

...more

Mathematicians Make a Major Discovery About Prime Numbers

Published: 2019-03-08 00:28:53

Popularity: None

Author: None

LLM Says: "Prime time bombs 💥🔴"

A year after tackling how close together prime number pairs can stay, mathematicians have now made the first major advance in 76 years in understanding how far apart primes can be.

...more

Waiting for Dark: Inside Two Anarchists' Quest for Untraceable Money

Published: 2019-03-08 00:22:22

Popularity: None

Author: None

LLM Says: "cryptic cash"

The inside story of two anarchists' quest to create ungovernable weapons, untouchable black markets, and untraceable money.

...more

The Untold Story of Silk Road, Part 2: The Fall

Published: 2019-03-08 00:21:54

Popularity: None

Author: None

LLM Says: "Law enforcement takedown"

As Ross Ulbricht's online drug empire mushroomed, he became rich, arrogant, and sloppy. Meanwhile, the feds were closing in.

...more

Silk Road Creator Ross Ulbricht Sentenced to Life in Prison

Published: 2019-03-08 00:20:26

Popularity: None

Author: None

LLM Says: "Silk road shut down"

Ross Ulbricht conceived of his Silk Road black market as an online utopia beyond law enforcement's reach.

...more

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data

Published: 2019-03-08 00:16:52

Popularity: None

Author: None

LLM Says: "Crypto mining"

MIT says it's found a new, more efficient way to blend data mining with the privacy protections of encryption.

...more

Hackers Remotely Kill a Jeep on the Highway—With Me in It

Published: 2019-03-08 00:16:29

Popularity: None

Author: None

LLM Says: ""Jeep hack fail""

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.

...more

Mapping How Tor's Anonymity Network Spread Around the World

Published: 2019-03-08 00:10:47

Popularity: None

Author: None

LLM Says: "Tor map spreading"

Germany has overtaken the US in total nodes, with France, the Netherlands, and Russia coming close behind.

...more

AI Can Recognize Your Face Even If You’re Pixelated

Published: 2019-03-07 23:32:28

Popularity: None

Author: Podcasts

Hackers can train artificial neural networks to recognize objects, read text, and even identify faces in obfuscated images.

...more

A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying

Published: 2019-03-07 23:16:06

Popularity: None

Author: None

A new project called Dark Mail brings together two high-profile privacy advocates to take on the leakiest of all information: that pernicious metadata.

...more

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

Published: 2019-03-07 23:14:53

Popularity: None

Author: None

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]

...more

Google Embraces Docker, the Next Big Thing in Cloud Computing

Published: 2019-03-07 23:12:45

Popularity: None

Author: None

On Tuesday Google will offer tools that can accommodate Docker containers on the company’s cloud service, Google App Engine and Google Compute Engine, and it will release additional software that can juggle containers across all sorts of outside services and machines as well.

...more

How Peter Thiel's Secretive Data Company Pushed Into Policing | Backchannel

Published: 2019-03-07 22:54:54

Popularity: None

Author: None

A Backchannel investigation reveals the problems Palantir poses for law enforcement.

...more

Biohackers Encoded Malware in a Strand of DNA

Published: 2019-03-07 22:54:33

Popularity: None

Author: None

Researchers planted a working hacker exploit in a physical strand of DNA.

...more

The Flawed System Behind the Krack Wi-Fi Meltdown

Published: 2019-03-07 22:47:56

Popularity: None

Author: None

When software standards aren't open and available for researchers to vet, bad things happen. Just look at Krack.

...more

The Creator of Signal Has a Plan to Fix Cryptocurrency

Published: 2019-03-07 22:38:26

Popularity: None

Author: None

MobileCoin aims to make cryptocurrency transactions quick and easy for everyone, while still preserving privacy and decentralization.

...more

Operation Bayonet: Inside the Sting That Hijacked an Entire Dark Web Drug Market

Published: 2019-03-07 22:29:11

Popularity: None

Author: None

Dutch police detail for the first time how they secretly hijacked Hansa, Europe's most popular dark web market.

...more

Microsoft's Latest Excel Update Has Security Pros Anxious

Published: 2019-03-07 22:22:06

Popularity: None

Author: None

Enabling JavaScript should make Excel more powerful, but increasing access points makes it even more of a web security nightmare than it already is.

...more

An Encryption Upgrade Could Upend Online Payments

Published: 2019-03-07 22:19:16

Popularity: None

Author: None

While ditching TLS 1.0 encryption will benefit the payments ecosystem, it'll be rough going for those with older devices.

...more

The Elite Microsoft Hacker Team That Keeps Windows PCs Safe

Published: 2019-03-07 22:18:58

Popularity: None

Author: None

How Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.

...more

Millions of Android Devices Are Vulnerable Right Out of the Box

Published: 2019-03-07 22:14:43

Popularity: None

Author: None

Firmware bugs introduced by manufacturers and carriers put Android smartphones at risk.

...more

Everything That Could Go Wrong With Trump's iPhones

Published: 2019-03-07 22:07:11

Popularity: None

Author: None

If President Trump is using a personal iPhone instead of secured lines, he's making it entirely too easy for China and Russia to spy.

...more

iTunes Doesn't Encrypt Downloads—on Purpose

Published: 2019-03-07 22:03:58

Popularity: None

Author: None

While HTTPS has made the web at large a much safer place, Apple has chosen to forgo it for iTunes and App Store downloads.

...more

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

Published: 2019-03-07 22:00:24

Popularity: None

Author: None

Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads.

...more

Android Is Helping Kill Passwords on a Billion Devices

Published: 2019-03-07 21:56:57

Popularity: None

Author: None

By officially certifying the FIDO2 standard, the mobile OS will soon allow logins to sites and services without having to put in a password.

...more

end