Starting in late 2013 with the original Moto G, Motorola has been carving out a niche for itself as a company that offers good value for the money. It’s competing against companies like ZTE and Huawei and Xiaomi overseas, but especially here in the US it sells some of the best Android phones you can get for under $200. Motorola sells them with relatively clean, sensible loads of Android that are updated predictably, if not always promptly.
During the last year, online crooks have realized that buying ads and lacing them with malicious code is an easy and cheap way of infecting victims with malware and get some money out of it.
As a result, “malvertising” in 2015 has almost tripled from the year prior, even if security firms have focused more on this threat, tracking down and reporting several cases of malvertising to the advertisers and publishers.
Now, the fight against malvertising is about to get tougher for internet defenders as criminal hackers have found an unlikely ally: web encryption.
For the first time, scientists have directly controlled brain cells using sound waves, in a tiny laboratory worm.
They used ultrasound to trigger activity in specific neurons, causing the worms to change direction.
As well as requiring a particular gene to be expressed in the brain cells, the technique bathes the animals in tiny bubbles to amplify the sound waves. These complications temper the technique's promise for controlling brain activity in a non-invasive way.
he Obama Administration is weighing whether to come out in full support of unfettered encryption, something that would be a huge blow to the Feds, who have been pushing for compulsory backdoors in all new tech.
But there's something in the President's proposals that aren't quite right.
Security firm FireEye has discovered a malicious backdoor program called SYNful Knock that could let hackers use Cisco’s routers to deploy attacks on a broad scale.
The implant is the same size as the Cisco router image, and it’s loaded each time the router is restarted. The program supports up to 100 modules that can be tailored to the attacker’s needs.