Now that we're living in the age of sufficient fingerprint sensors, devices like the TappLock are on the rise. The creators of the TappLock have embedded a fingerprint sensor (aka a fingerprint reader) into a padlock, allowing the user to do away with keys altogether. This system, they suggest, will allow you to "never worry about losing your keys, forgetting your combination code, or getting your locks picked again." That is, until the device's sensor malfunctions. But that'll never happen, right?
The so-called "going dark" problem—which various government officials claim will be the death knell to the US because Silicon Valley won't bake crypto backdoors into its wares—is greatly overblown. That's because crime fighters are not in the dark, at least technologically, and are now presented with a vast array of spy tools at their disposal. Specifically, modern espionage is piggybacking on the Internet of Things (IoT) tools, from televisions to toasters, that enable wanton spying.
For years now, the FBI has been warning legislators and CEOs about criminals "going dark" through encryption — and the responsibility of companies like Apple and Google to stop it from happening. But according to a new study from Harvard's Berkman Center for Internet and Society, that's not what's happening at all. Titled "Don't Panic," the paper unpacks the context of the recent debate around encryption, ultimately deciding that police are at little risk of being locked out of digital communications at large.
Over 60 Android games hosted on Google Play had Trojan-like functionality that allowed them to download and execute malicious code hidden inside images.
The rogue apps were discovered by researchers from Russian antivirus vendor Doctor Web and were reported to Google last week. The researchers dubbed the new threat Android.Xiny.19.origin.
Malicious Android apps were a common occurrence on Google Play until a few years ago when Google implemented more rigorous checks. This included an automated scanner called Bouncer that used emulation and behavior-based detection.
Running rm -rf / on any UEFI Linux distribution can potentially perma-brick your system.
As a public service announcement, recursively removing all of your files from / is no longer recommended. On UEFI distributions by default where EFI variables are accessible via /sys, this can now mean trashing your UEFI implementation.