Scott Charney, of Microsoft's Trustworthy Computing, said the government has "never" asked for a backdoor in Microsoft products. Yet a former engineer working on BitLocker claimed the government does ask, but those requests are “informal.”
Nvidia — and Oculus and Sony and a bunch of other companies — are working feverishly to come up with virtual reality hardware that feels a lot more R and a lot less V. Nvidia has come up with a novel solution: sandwich parts from two display panels together.
Microsoft disclosed in a statement that China is investigating the company in an antitrust probe after China government officials paid unexpected visits to the software firm’s offices.
Representatives from China's State Administration for Industry and Commerce, which is responsible for enforcing business laws, made the visits to Microsoft offices in Beijing, Shanghai, Guangzhou and Chengdu.
Do you know how to ride a bicycle? It's easy, isn't it?
But do you remember how hard it turned out to be when you first tried? Who would have thought?
We often forget that many things are "obvious" only with experience, meaning, in fact, that they're not really obvious at all. That's why we do phishing walkthroughs fairly regularly on Naked Security. The idea is to step you through a typical email phish, pointing out the telltale warning signs in the original email and the web pages that follow, so you know what to look for in future.
Blueprints for Israel's sophisticated defence system, Iron Dome, were stolen in cyber-attacks most likely carried out by hackers working for the Chinese military, cyber-security experts have reported.
Over a 22-month period, large quantities of documents and data related to the pioneering anti-missile system were stolen from three leading Israeli defence technology companies, Intelligence firm Cyber Engineering Services Inc. (CyberESI) told journalist Brian Krebs.
A recent research report [PDF] from HP's Fortify on Demand division found that seven out of ten of the most commonly used Internet of Things consumer devices contain serious security vulnerabilities.
Fortify on Demand said that some of the vulnerabilities include insufficient or non existent authentication mechanisms with weak passwords, data and firmware/software being transmitted in the clear without encryption, as well as insecure web interfaces for the devices.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.
There's a distinctive sound your computer makes when an online friend is trying to get your attention. Sometimes its high pitched, other times its a low, warm tone, but regardless of your chat software, the onomatopoeia probably reads something like "bleep" which -- by no coincidence, we're sure -- is what BitTorrent is calling its new messaging platform. Unlike Google Hangouts, AIM or Skype, however, Bleep is a decentralized communication platform, design specifically to protect user metadata and anonymity.
USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher has revealed.
Karsten Nohl, chief scientist with Berlin's SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.
Job interviews missed, work and wedding plans disrupted, children unable to fly home with their adoptive parents -- the consequences keep proliferating in the aftermath of a database outage that crippled the US State Department's process for issuing passports, visas, and other documents related to travel to the US.