The internet is everywhere. In another, more concrete way, it’s inside massive, anonymous buildings and beneath city streets, marked by special manhole covers and cryptic, colorful symbols.
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos of herself and her colleagues snapped by an excitable event photographer, the researcher walks inside, casually drops the unopened bills on the kitchen table, opens up her laptop, and slides in the CD. Windows asks if she’d like to open the pictures to view them.
For most of the year, employees of leading cyber-security firm Symantec work toward securing and managing their customers’ information.
This week, they took a break from that. They got to be the bad guys.
Four years ago, Symantec launched its annual CyberWar Games, an internal event that challenges employees to walk in the shoes of an attacker. The Games simulates an information security breach modeled after a high profile incident reported in the media, and employees experience the attack from start to finish as the malicious party.
After our recent discovery that our Samsung TV was sending voice recognition data over the internet unencrypted, they sent the following response:
“Samsung takes consumer privacy very seriously and our products are designed with privacy in mind. Our latest Smart TV models are equipped with data encryption and a software update will soon be available for download on other models."
Encrypted communications provider Silent Circle has raised approximately $50 million in a funding round aimed at pushing the company forward in the enterprise market.
Announced on Thursday, Silent Circle said "strong demand" from enterprise customers seeking to keep communication private through the Blackphone product range led the firm to launch a private, common equity round in order to grow and cater for new clients.
British hacker Stephen Tomkinson has found two Blu-Ray-borne attacks.
His first exploit relies on a poor Java implementation in a product called PowerDVD from CyberLink. PowerDVD plays DVDs on PCs and creates menus using Java, but the way Oracle's code has been used allows naughty folk to circumvent Windows security controls.
Nvidia Actually Listens To Its Customers, Will Again Let Them Use The Expensive Hardware They Own As They See Fit
Graphics card powerhouse Nvidia hasn't been having very much fun lately. First, the company took an Internet wide beating from gamers after selling a 4 GB graphics card (the GTX 970) that wasn't really a 4 GB graphics card, resulting in the $300+ purchase choking on high-end resolutions (or when using, say, Oculus Rift).
“None of the claims of what comsec works is to be taken saltless: Tor, OTR, ZTRP are lures.” —Cryptome , Dec. 30, 2014
Gemalto, the Dutch maker of billions of mobile phone SIM cards, confirmed this morning that it was the target of attacks in 2010 and 2011—attacks likely perpetrated by the NSA and British spy agency GCHQ. But even as the the company confirmed the hacks, it downplayed their significance, insisting that the attackers failed to get inside the network where cryptographic keys are stored that protect mobile communications.
Back in 2012 the Ramnit worm wriggled its way through social networks and onto the computers of over three million computers, and began to steal sensitive information like bank account details. Now, almost three years later, police have announced that the botnet behind the scourge has been fully shut down.