Inverse Path is proud to announce the USB armory project, an open source hardware design, implementing a flash drive sized computer for security applications. The USB armory is a compact USB powered device that provides a platform for developing and running a variety of applications.
Malware-based espionage targeting political activists and other opposition is nothing new, especially when it comes to opponents of the Chinese government. But there have been few attempts at hacking activists more widespread and sophisticated than the current wave of spyware targeting the mobile devices of members of Hong Kong’s “Umbrella Revolution.”
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called by an application,” a Red Hat security advisory warned.
TripAdvisor has suffered a data breach at its Viator tour-booking and review website.
An estimated 1.4 million Viator customers are potentially affected by the compromise, which the firm admits may have exposed payment card data.
The compromise also potentially aired the email address, password and Viator "nickname" associated with accounts. Viator only became aware of the breach after investigators looking into incidents of credit card fraud made the link that victims were also users of its site.
Three weeks ago hundreds of nude celebrity photos were leaked onto the internet. Dubbed The Fappening, the collection included pictures of Jennifer Lawrence, Kate Upton, Mary Elizabeth Winstead, Jessica Brown Findlay, and Kaley Cuoco, with the majority of the personal images apparently obtained from hacked iCloud accounts.