Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.
The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defences to determine how well they can protect themselves, according to a 13 Sept blog post.
Web encryption is about to see a major improvement with the finalization of the TLS 1.3 protocol, which brings enhanced security as well as faster loading pages. Cloudflare, a popular web company that offers DDoS protection and CDN services, among other things, said that it has already implemented TLS 1.3 for all of its customers. However, it’s now waiting on browsers to support it as well so that everyone can use it.
Can you count to four? That is approximately how long it takes for an employee somewhere to download an unknown new variant of malware. This is according to security researchers Check Point, whose latest research projects, Check Point 2016 Security Report and Exploits at the Endpoint: SANS 2016 Threat Landscape Study reveal key challenges IT leaders are facing.
The Apple vs. FBI fight over breaking the encryption of the San Bernardino iPhone was one of the most important news topics of the beginning of the year. Ultimately Apple won, as it didn’t have to create a backdoored version of iOS that would let the FBI spy on that iPhone 5c that belonged to one of the San Bernardino shooters. The FBI won too, as it bought an iPhone hack for more than $1.3 million that let it bypass the password that protects the lockscreen of iPhones.
Hackers love exposing Tesla’s electronic weaknesses. Just this August, researchers showed how they could use jamming and spoofed signals to convince the Tesla Model S autopilot that real objects had disappeared or fake obstacles had appeared. A year before, researchers prized open a Tesla’s dash and attached computers to kill the car mid-drive. And today hackers from Tencent’s elite KEEN Team TISI +% hacker crew claimed to have demonstrated the first remote exploit of Elon Musk’s vehicles, making the potential for real-world attacks a little more realistic.
When Mac OS X (as it was then called) first moved to a yearly release cycle in 2011, Apple had trouble defining its scope for each release. Lion, the first in this cadence and the first release to pull in a significant number of features from iOS, feels like a half-finished version of Mountain Lion in retrospect. Mavericks stripped out some of previous versions' skeuomorphism and superfluous texture, but the Mac didn’t fully match with iOS 7 until Yosemite came out a year later.
The world is dangerously unprepared for a global disaster sparked by cyber attacks on space infrastructure, experts have warned.
Authorities are not doing nearly enough to stop space assets being hacked and used maliciously, according to a warning from security experts. The consequences of such a hack could be disastrous – anything from damage to trade and financial services to terrorists taking over strategic weapons.
A report from Visa says that UK residents are nearly twice as likely to trust banks to keep biometric data such as fingerprints and iris scans safe.
It also revealed that nearly two thirds of us say the British are willing to use biometrics as a method of authentication.
So does biometric authentication for banking offer a safer alternative to pin numbers and passwords? If you’ve seen one of the many demonstrations over the last year of spoof fingerprints made from Plasticine you might not be quite so quick to adopt it as a primary authentication method.
Microsoft is continuing to follow through with the 2,850 additional job cuts company officials announced back in July that they'd be making during fiscal 2017.
The latest round of cuts, which happened this past week, affected both Redmond and London (as well as some other geographies).
Criminals have started to aggressively erase EXIF metadata from their photos to make it harder for authorities to locate them, Harvard University students Paul Lisker and Michael Rose find.
Unbeknownst to most, digital cameras and smartphones that shoot in JPG or TIFF formats write information on where a photograph was taken, when, and the camera used, every time the virtual shutter opens. That data is written in the "exchangeable image file format" (EXIF) standard.