Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.
...moreTotal Articles Found: 32
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2023-05-31 19:54:41
Popularity: None
Author: Condé Nast
Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.
...morePublished: 2023-05-26 10:29:53
Popularity: None
Author: Condé Nast
The coinventor of “bcrypt” is reflecting on the ubiquitous function’s 25 years and channeling cybersecurity’s core themes into electronic dance music.
...morePublished: 2019-06-27 14:43:27
Popularity: None
Author: None
For a small group of bitcoin enthusiasts, the internet is a vulnerability. They're using satellites, ham radios, and mesh networks to stay current on the cryptocurrency.
...morePublished: 2019-03-08 00:51:20
Popularity: None
Author: None
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]
...morePublished: 2019-03-08 00:45:35
Popularity: None
Author: None
On Tuesday Google will offer tools that can accommodate Docker containers on the company’s cloud service, Google App Engine and Google Compute Engine, and it will release additional software that can juggle containers across all sorts of outside services and machines as well.
...morePublished: 2019-03-08 00:43:21
Popularity: None
Author: None
A new project called Dark Mail brings together two high-profile privacy advocates to take on the leakiest of all information: that pernicious metadata.
...morePublished: 2019-03-08 00:29:39
Popularity: None
Author: None
The FBI relied on Flash code from an abandoned Metasploit project called "Decloak" to identify suspects hiding behind the Tor anonymity network.
...morePublished: 2019-03-08 00:28:53
Popularity: None
Author: None
A year after tackling how close together prime number pairs can stay, mathematicians have now made the first major advance in 76 years in understanding how far apart primes can be.
...morePublished: 2019-03-08 00:22:22
Popularity: None
Author: None
The inside story of two anarchists' quest to create ungovernable weapons, untouchable black markets, and untraceable money.
...morePublished: 2019-03-08 00:21:54
Popularity: None
Author: None
As Ross Ulbricht's online drug empire mushroomed, he became rich, arrogant, and sloppy. Meanwhile, the feds were closing in.
...morePublished: 2019-03-08 00:20:26
Popularity: None
Author: None
Ross Ulbricht conceived of his Silk Road black market as an online utopia beyond law enforcement's reach.
...morePublished: 2019-03-08 00:16:52
Popularity: None
Author: None
MIT says it's found a new, more efficient way to blend data mining with the privacy protections of encryption.
...morePublished: 2019-03-08 00:16:29
Popularity: None
Author: None
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.
...morePublished: 2019-03-08 00:10:47
Popularity: None
Author: None
Germany has overtaken the US in total nodes, with France, the Netherlands, and Russia coming close behind.
...morePublished: 2019-03-07 23:32:28
Popularity: None
Author: Podcasts
Hackers can train artificial neural networks to recognize objects, read text, and even identify faces in obfuscated images.
...morePublished: 2019-03-07 23:16:06
Popularity: None
Author: None
A new project called Dark Mail brings together two high-profile privacy advocates to take on the leakiest of all information: that pernicious metadata.
...morePublished: 2019-03-07 23:14:53
Popularity: None
Author: None
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]
...morePublished: 2019-03-07 23:12:45
Popularity: None
Author: None
On Tuesday Google will offer tools that can accommodate Docker containers on the company’s cloud service, Google App Engine and Google Compute Engine, and it will release additional software that can juggle containers across all sorts of outside services and machines as well.
...morePublished: 2019-03-07 22:54:54
Popularity: None
Author: None
A Backchannel investigation reveals the problems Palantir poses for law enforcement.
...morePublished: 2019-03-07 22:54:33
Popularity: None
Author: None
Researchers planted a working hacker exploit in a physical strand of DNA.
...morePublished: 2019-03-07 22:47:56
Popularity: None
Author: None
When software standards aren't open and available for researchers to vet, bad things happen. Just look at Krack.
...morePublished: 2019-03-07 22:38:26
Popularity: None
Author: None
MobileCoin aims to make cryptocurrency transactions quick and easy for everyone, while still preserving privacy and decentralization.
...morePublished: 2019-03-07 22:29:11
Popularity: None
Author: None
Dutch police detail for the first time how they secretly hijacked Hansa, Europe's most popular dark web market.
...morePublished: 2019-03-07 22:22:06
Popularity: None
Author: None
Enabling JavaScript should make Excel more powerful, but increasing access points makes it even more of a web security nightmare than it already is.
...morePublished: 2019-03-07 22:19:16
Popularity: None
Author: None
While ditching TLS 1.0 encryption will benefit the payments ecosystem, it'll be rough going for those with older devices.
...morePublished: 2019-03-07 22:18:58
Popularity: None
Author: None
How Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.
...morePublished: 2019-03-07 22:14:43
Popularity: None
Author: None
Firmware bugs introduced by manufacturers and carriers put Android smartphones at risk.
...morePublished: 2019-03-07 22:07:11
Popularity: None
Author: None
If President Trump is using a personal iPhone instead of secured lines, he's making it entirely too easy for China and Russia to spy.
...morePublished: 2019-03-07 22:03:58
Popularity: None
Author: None
While HTTPS has made the web at large a much safer place, Apple has chosen to forgo it for iTunes and App Store downloads.
...morePublished: 2019-03-07 22:00:24
Popularity: None
Author: None
Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads.
...morePublished: 2019-03-07 21:56:57
Popularity: None
Author: None
By officially certifying the FIDO2 standard, the mobile OS will soon allow logins to sites and services without having to put in a password.
...morePublished: 2024-10-19 19:22:05
Popularity: None
Author: Lily Hay Newman
Plus: The alleged SEC X account hacker gets charged, Kroger wriggles out of a face recognition scandal, and Microsoft deals with missing customer security logs.
...more