Advertisements


Cisco security advisory dump finds 20 warnings, 2 critical

It’s a bad week for all things network security as Cisco spewed out 20 Security Advisories and Alerts – two critical and three high-impact – that customers should be aware of and implement patches where they can.Cisco, like other big enterpr.....»»

Category: securitySource:  networkworldMar 16th, 2017

Paul Allen Finds Long-Lost World War II Cruiser, the USS Indianapolis

An anonymous reader quotes the US Naval Institute News: Seventy-two years after two torpedoes fired from a Japanese submarine sunk cruiser USS Indianapolis (CA-35), the ship's wreckage was found resting on the seafloor on Saturday -- more than 18,000.....»»

Category: topSource:  slashdotRelated News21 hr. 9 min. ago

Resourceful golden retriever finds $85,000 of heroin in his backyard

Police dogs aren't the only ones sniffing out drugs.  A regular, untrained family golden retriever in Oregon dug up something interesting in his own backyard. The 18-month-old dog, Kenyon, came back with what his family thought was a time capsul.....»»

Category: topSource:  mashableRelated NewsAug 19th, 2017

Marcus Hutchins" Code Used In Malware May Have Come From GitHub

troublemaker_23 quotes ITWire: A security researcher says code has been discovered that was written by British hacker Marcus Hutchins that was apparently 'borrowed' by the creator of the banking trojan Kronos. The researcher, known as Hasherezade, po.....»»

Category: topSource:  slashdotRelated NewsAug 19th, 2017

Hacking the home: how connected tech is making your shack a security risk

Your home may be getting smarter, but hackers are making it look pretty darn stupid. If there’s one place in the world that’s supposed to feel safe and comfortable, it’s the home. When you’re not working or doing thi.....»»

Category: topSource:  techradarRelated NewsAug 19th, 2017

Atlas 5 Rocket Launches $400 Million NASA Satellite Into Space

A new communications hub has been successfully deployed in space today thanks to the United Launch Alliance Atlas 5 rocket. "TDRS is a critical national asset have because of its importance to the space station and all of our science missions, primar.....»»

Category: topSource:  slashdotRelated NewsAug 19th, 2017

Hackers just sent us practically all of HBO"s social media passwords

The leaks just keep coming. The hackers responsible for the massive breach of HBO haven't let up, and reached out to Mashable to share their latest exploits. And while the latest data dump doesn't include any Game of Thrones spoilers, it definitely c.....»»

Category: topSource:  mashableRelated NewsAug 18th, 2017

Code chunk in Kronos malware used long before MalwareTech published it

Marcus Hutchins, the researcher who stopped WCry, complained his code was lifted. Enlarge / Marcus Hutchins, security researcher for Kryptos Logic. In May, he registered a domain name that neutralized the WCry ransomware worm. In August, he was.....»»

Category: topSource:  arstechnicaRelated NewsAug 18th, 2017

White House elevates status of US Cyber Command

The Trump administration is also considering separating Cyber Command from the National Security Agency......»»

Category: blogSource:  betweenthelinesRelated NewsAug 18th, 2017

‘Marjorie Prime’ explores the limits of AI built from memories

Marjorie, 86, is dying. In her final months, she finds solace in an artificially intelligent holographic recreation of her late husband Walter, called "Walter Prime." They talk every day, recounting special moments of their life together. Bu.....»»

Category: topSource:  engadgetRelated NewsAug 18th, 2017

Trump approves Obama-era plan for a more independent US Cyber Command

 President Trump has given the go-ahead for a plan dating from the Obama administration to elevate US Cyber Command to the level of Unified Combatant Command, giving it more operational independence from the National Security Agency. The stateme.....»»

Category: gadgetSource:  techcrunchRelated NewsAug 18th, 2017

Kaspersky’s Android VPN app comes under fire for intrusive permissions

Including needing access to your calls and contacts, location and more. A fresh VPN controversy has reared its head, this time concerning an Android VPN app which was recently released by security firm Kaspersky.As Ghacks spotted, Kaspersky Sec.....»»

Category: topSource:  techradarRelated NewsAug 18th, 2017

Secret Chips in Replacement Parts Can Completely Hijack Your Phone"s Security

Dan Goodin, writing for ArsTechnica: People with cracked touch screens or similar smartphone maladies have a new headache to consider: the possibility the replacement parts installed by repair shops contain secret hardware that completely hijacks the.....»»

Category: topSource:  slashdotRelated NewsAug 18th, 2017

Secret chips in replacement parts can completely hijack your phone’s security

Booby-trapped touchscreens can log passwords, install malicious apps, and more. Enlarge (credit: Omer Shwartz et al.) People with cracked touch screens or similar smartphone maladies have a new headache to consider: the possibility the replace.....»»

Category: topSource:  arstechnicaRelated NewsAug 18th, 2017

How Security Pros Look at Encryption Backdoors

An anonymous reader shares a report: The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of government-mandated encryption backdo.....»»

Category: topSource:  slashdotRelated NewsAug 18th, 2017

Student finds way to save energy by making lighter washing machine

One student and researcher from Nottingham Trent University has figured that simply designing a lighter washing machine can save the United Kingdom almost 45,000 tons of carbon dioxide each year in transportation alone. The post Student finds way to.....»»

Category: topSource:  digitaltrendsRelated NewsAug 18th, 2017

Netgear Arlo Go review: This security camera lets you roam free

This indoor/outdoor security camera runs on batteries and a cellular connection, It doesn't need to be in range of your Wi-Fi network......»»

Category: topSource:  pcwRelated NewsAug 18th, 2017

iCloud security: How (and why) to enable two-factor authentication

Given that so many of the details of our digital lives are either with us (on our smartphones) or easily accessible (via the web), you should be doing everything you can to protect that information and data. On iPhones and iPads, data is largely k.....»»

Category: cloudcomputingSource:  cwRelated NewsAug 18th, 2017

Micron advances semiconductor R&D capabilities with new Boise facility

Micron Technology has announced the opening of a new facility which will play a critical role in the company's research into breakthrough new memory and storage technologies of the future. When fully equipped, the new building will nearly double Micr.....»»

Category: itSource:  digitimesRelated NewsAug 18th, 2017

Hacker Claims To Have Decrypted Apple"s Secure Enclave Processor Firmware

According to iClarified, a hacker by name of "xerub" has posted the decryption key for Apple's Secure Enclave Processor (SEP) firmware. "The security coprocessor was introduced alongside the iPhone 5s and Touch ID," reports iClarified. "It performs s.....»»

Category: topSource:  slashdotRelated NewsAug 17th, 2017

Changing the security landscape for entrepreneurs

 Cloud computing and the IoT have given rise to seemingly intractable security exposure. The good news is that a new technological advance could unleash the full promise of cloud computing and put IoT on the verge of everyday use by U.S. intelli.....»»

Category: topSource:  techcrunchRelated NewsAug 17th, 2017