Security firm Malwarebytes has designed a USB stick that can plug into any PC to automate the process of finding, logging, and cleaning up a range of malware.
Called Techbench, the product is a key-shaped USB flash drive designed to get around the need to install software on every system being inspected for malware. Simply plugging in the drive starts the scanning process which can be left to complete on its own before a log file is saved.
Apple has been criticized by the developer of a Chinese app designed to bypass China's Internet censorship protocols after the company removed the title from the App Store in China because its functionality is illegal in that country.
Open Door was sold in the Chinese App Store until July of this year, when Apple pulled the program, saying that it contained content that was illegal within China. The app saw roughly 2,000 daily downloads in China, according to the Daily Mail, and it is still available in the App Stores of other countries, including the U.S. App Store.
This week, as revelations about the extent of National Security Agency (NSA) spying continued to unfold, Ryan Gallagher brought us an article about the types of hardware that agencies outside of the NSA use to gather information from mobile devices. These agencies, which include local law enforcement as well as federal groups like the FBI and the DEA, use highly specialized equipment to gain information about a target. Still, the details about that hardware is largely kept secret from the public.
After three days of talks, networking and learning from the brightest minds in Python programming, PyCon UK culminated with an Raspberry Jam – the coming together of programmers, teachers and 35 children to play, hack and program with the Raspberry Pi and Python.
Education was a very prominent theme at this year’s conference and the Raspberry Jam, sponsored by Bank of America, was proof positive that we can all play a part in the much-needed revolution of the UK’s tired and broken approach to IT education.
An app that purportedly spoofed a Mac so that Android smartphone and tablet owners could send and receive text-like messages through Apple's iMessage service disappeared today from the Google Play app store.
Google confirmed that it yanked the app for violating its store policies.
Dubbed "iMessage Chat," the app came under quick fire Monday from other app developers who said the program may have been harvesting Apple ID usernames and passwords by passing packets through a China-based server.