Security
RSA Conference has a leaky app… again!
- You wouldn’t expect the organisers of a seminar on nuclear physics to hand out conference badges…
China forces spyware onto Muslim’s Android phones, complete with security holes
- If you’re a member of the Uyghur Muslim population in Xinjiang, you’re probably used to China’s…
Want to terrify a city with an emergency broadcast? All you need is a laptop and $30
- Researchers have uncovered a remote hijacking vulnerability present in the systems many cities and…
Hackers Deface Network Switches in Russia, Iran with US Flag
- Hackers last Friday disrupted internet access in Russia and Iran with an attack that left a digital…
Air gapping voting machines isn't enough, says one election security expert
- The safeguards that election officials say protect voting machines from being hacked are not as…
-
How to keep your ISP’s nose out of your browser history with encrypted DNS
- The death of network neutrality and the loosening of regulations on how Internet providers handle… -
Hackers abused Cisco flaw to warn Iran and Russia: 'Don't mess with our elections'
- The message “Don’t mess with our elections” followed by a U.S. flag appeared on Iranian and Russian… -
VPNs can still be used in China despite March 31 ban
- China's VPN ban came into effect on March 31, 2018, but virtual private network providers are still…
Microsoft
Microsoft makes more AI programming interfaces available to developers
- Microsoft is continuing to roll out more application programming interfaces (APIs), which enable…
Google's Project Zero discloses 'important' security vulnerability in Windows 10
- Google's Project Zero team has disclosed another Windows 10 security flaw after Microsoft failed to…
Hacker investigating Windows 10 for ARM for the Lumia 950
- The project to run Windows 8 RT on the Lumia 640 XL has been progressing really well, but in many…
No more Windows 10 passwords? Microsoft says Hello to palm-vein biometrics
- Microsoft has added Windows 10 Pro support for palm-vein authentication, as part of its Windows…
Microsoft is trying to kill passwords. It can't happen soon enough.
- Microsoft is trying to kill the password, and it’s about time. This week, the company said the next…
-
Office for Mac finally has real-time collaboration in 16.9.0 update
- Microsoft has released a major update for Office for Mac. Update 16.9.0 finally brings long-… -
Skype finally getting end-to-end encryption
- Since its inception, Skype has been notable for its secretive, proprietary algorithm. It's also… -
Microsoft says security fixes will noticeably slow older PCs
- It's been clear for a while that the fixes for the Meltdown and Spectre memory vulnerabilities…
HITB
JPMorgan’s Blockchain Chief Amber Baldet Steps Down for Her Own Project
- L33tdawg: Excited to see Amber's closing keynote at #HITB2018AMS next week!
As soon as the episode…
Establishing covert communication channels by abusing GSM AT commands
- Security research often starts as a hobby project, and Alfonso Muñoz’s and Jorge Cuadrado’s probe…
#HITB2018AMS Ethereum-taal Solidity: toegankelijk maar complex
- In een presentatie op Hack in the Box in Amsterdam demonstreert beveiligingsonderzoekers Bernhard…
New attack against intelligent buildings that use KNX and Zigbee networks on show at #HITB2018AMS
- A great many of us are living, staying or working in “smart” buildings, relying on automated…
Hacking Intelligent Buildings and a Journey into a Modern Private Hospital at #HITB2018AMS
- Amsterdam – 24 March 2018: The Industry Internet of Things (IIoT) is at the forefront of smart…
-
Applying AI to User Behavior Security Analytics & Threat Intelligence at #HITB2018AMS
- Amsterdam – 19 March 2018: User behavior analytics (UBA) solutions typically applies machine… -
Backdoor Allowing Remote Control of Cars to be Presented at Amsterdam Hacker Conference
- Amsterdam – 16 March 2018: A smart connected car is not much more than a computer on wheels, with… -
福利 | 获取HITB安全峰会门票的最全姿势(阿姆斯特丹)#HITB2018AMS
- 2018 年度 HITB 安全峰会在 2018 年 4 月 9 日至 13 日举办。会议内容包含历时三天的技术培训和两天的前沿议题技术交流会议,一场CTF比赛。现场还有公开的技术展览区域,…
Apple
Apple is replacing some 13-inch MacBook Pro batteries
- Apple is replacing a number of 13-inch MacBook Pro batteries after reports of a defect causing the…
Apple says the redesigned Mac Pro is coming in 2019
- If you've been hoping for a new Mac Pro in the near future, you're going to be disappointed. Apple…
Developers create a touchscreen MacBook for just $1
- There’s good news for everyone who wants a MacBook with a touchscreen. A group of developers came…
Apple Plans to Use Its Own Chips in Macs From 2020, Replacing Intel
- Apple Inc. is planning to use its own chips in Mac computers beginning as early as 2020, replacing…
Apple has hired Google’s head of search and artificial intelligence
- Yesterday, Google SVP of Engineering in charge of search and artificial intelligence John…
-
How a QR code can fool iOS 11's Camera app into opening evil.com rather than nice.co.uk
- A security researcher based in Germany has identified a flaw in the way Apple's iOS 11 handles QR… -
iOS 11 bugs are so common they now appear in Apple ads
- If you blink during Apple’s latest iPhone ad, you might miss a weird little animation bug. It’s… -
Apple developing MicroLED tech at secret facility, likely to debut in Apple Watch
- Located on a nondescript road minutes from Apple Park, the 62,000-square-foot facility houses about…
Linux
10 commands every Linux user should know
- You may think you're new to Linux, but you're really not. There are 3.74 billion global internet…
Linus Torvalds slams CTS Labs over AMD vulnerability report
- CTS Labs, a heretofore unknown Tel Aviv-based cybersecurity startup, has claimed it's found over a…
5 Linux Tools to Help Recover Data from Corrupted Drives
- Did your screen just turn black or your laptop freeze without warning? Maybe your hard drive has…
The best Linux distro for privacy and security in 2018
- The awesome operating system Linux is free and open source. As such, there are thousands of…
How To Tell If Your Linux Server Has Been Compromised
- A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot…
-
Ubuntu 17.10 Temporarily Pulled Due To A BIOS Corrupting Problem
- Canonical has temporarily pulled the download links for Ubuntu 17.10 "Artful Aardvark" from the… -
Code-execution flaws threaten users of routers, Linux, and other OSes
- Google researchers have discovered at least three software bugs in a widely used software package… -
Cronopete – An Apple’s Time Machine Clone For Linux
- If you use Mac OS, you certainly have known about or used Time machine. It is a backup software…
Scitech
Stephen Hawking, legendary theoretical physicist, dies at 76
- Stephen Hawking, the British physicist and author of A Brief History of Time, has passed away at…
Can Machine Learning Find Medical Meaning in a Mess of Genes?
- “We don’t have much ground truth in biology.” According to Barbara Engelhardt, a computer scientist…
5 Linux Tools to Help Recover Data from Corrupted Drives
- Did your screen just turn black or your laptop freeze without warning? Maybe your hard drive has…
The Moon is Getting 4G Coverage
- The moon will get its first mobile phone network next year, enabling high-definition streaming from…
Why you should read and train to boost your brain
- The brain can take over functions of injured parts of the brain. It can create new neural pathways…
-
How did life begin? It’s Chemistry 101, but in space
- How did life start? There may not be a bigger question. To learn the secret of our origins means… -
Scientists discover a new way to use DNA as a storage device
- The future of technology is about more than just increasing raw processing power and embracing the… -
Artificial Intelligence Is Now Fighting Fake Porn
- Facial recognition and machine learning programs have officially been democratized, and of course…