Are you a security researcher planning to present at Black Hat, Defcon, B-Sides or any of this summer’s security events? Are you worried a big corporation or the government might attack you for revealing true facts about the defects in the security systems we entrust with our safety, privacy and health? (more…)
It’s been more than a year since RSA’s Rotem Kerner published his research on the insecurities in a PVR that was “white labeled” by TVT, a Chinese company and sold under over 70 brand-names around the world. In the intervening year, tens of thousands of these devices have been hijacked into botnets used by criminals in denial of service attacks, and TVT is still MIA, having done nothing to repair them.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group. (more…)
Windows 10 takes one of the most hated aspects of Microsoft operating systems — forced, sudden software updates and reboots — and elevates them to a sadistic art, with Win 10 machines suddenly announcing that it’s update time and rendering themselves inoperable for up to an hour, wiping out unsaved work and locking users out of their computers while they’re onstage, or in the middle of large file uploads, or livecasting, or completing a live test for college admission, taking notes during an interview, etc. (more…)
17 minutes of funny and informative notes from the history of DRM from Lazy Game Reviews, starting with Bill Gates’s infamous Open Letter to Hobbyists and moving through to the modern era with its activation codes, rootkits and scandals. (Thanks, Fipi Lele!)
The libraries of St Louis, MO have been crippled by a ransomware attack that has shut down the public terminals the library provides to the poor and vulnerable of St Louis, as well as the systems used to process book and material lending (the catalog is on a separate, uninfected system). (more…)
Opponents of Ecuadoran president Rafael Correa — himself a prolific and shrewd social media campaigner — have had their social media accounts hacked and used to dump embarrassing transcripts purporting to show their party in disarray and romantic scandals in their personal lives. (more…)
Seth Godin sends us this trailer for Coded, a new documentary series on hackers: “There’s an invisible war being waged. And we’re all part of it. Foreign governments are hacking major corporations. Major corporations are collecting massive amounts of consumer data. And the NSA is listening…to everything. But a new generation of programmers armed with powerful technology is rising up and fighting back. Freethink presents a new original series: Coded.”
Of 1700+ known acts of global power-grid sabotages, affecting some 5,000,000 people, 879 were caused by squirrels; between 0 and 1 were caused by Russia, and another 1 was caused by the USA (Stuxnet). (more…)
Randal Munroe nails it again in an XKCD installment that expresses the likelihood that your houseguests will be able to connect to your wifi (I confess to having been the “firmware” guide — but also, having been reminded to do something about my own firmware when other difficult houseguests came to stay).
Facebook spokespeople and cryptographers say that Facebook’s decision to implement Open Whisper Systems’ end-to-end cryptographic messaging protocol in such a way as to allow Facebook to decrypt them later without the user’s knowledge reflects a “limitation” — a compromise that allows users to continue conversations as they move from device to device — and not a “defect.” (more…)
An analysis of passwords found in the 2009 breach of Rockyou — 32 million accounts — finds a large number of Biblical references (“jesus”,” “heaven”, “faith”, etc), including a number of Bible verse references (“john316”). (more…)