If you're writing poetry, write it. Don't type it in just because you can. The classroom is changing, as new technologies dramatically alter the learning for both teachers and students. And at the heart of this change is the tablet.
You might not think of the classroom as a key market for big companies such as Apple and Google. That's indicative of a vast worldwide market. Manufacturers understandably want their share – and it comes with some significant benefits to education too. What's been clear from looking at how the tablet is currently used in the classroom is that it's had a transformational effect.
Read moreA security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email.
A security and forensic expert has developed a tool, the iOS 8.3 Mail.app inject kit, that could be used to create malicious iCloud password phishing emails. He explained that he exploits an unpatched bug affecting Apple iOS. The iOS 8.3 Mail.app inject kit exploits a vulnerability in the Apple operating system’s native email client that allows and attacker to display a realistic pop-up.
Read moreA zero-day software vulnerability in the firmware of older Apple computers could be used to slip hard-to-remove malware onto a computer. Pedro Vilaca wrote that the flaw he found builds on previous ones but this one could be far more dangerous.
Vilaca found it was possible to tamper with an Apple computer's UEFI, a firmware designed to improve upon BIOS, which is low-level code that bridges a computer's hardware and operating system at startup. The UEFI code is typically sealed off from users. But Vilaca wrote that he found the code is unlocked after a computer goes to sleep and reawakens, allowing it to be modified.
Read moreA new bug has been discovered in the Messages app, allowing a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash after being opened.
The bug, which requires a specific string of symbols and Arabic characters to be sent, was first noticed on Reddit earlier and has been spreading around the Internet since then. Sending the string of characters to an iPhone results in an immediate respring, causing an iPhone to crash and quickly reboot. From there, if the Messages app was opened at a security list view, the Messages app crashes automatically when you try to open it.
Read moreResearchers have revealed a zero-day vulnerability in iOS 8 that, when exploited by a malicious wireless hotspot, will repeatedly crash nearby Apple iPhones, iPads and iPods. The attack will render vulnerable iOS things within range unstable or even entirely unusable by triggering constant reboots.
Anyone can take any router and create a Wi-Fi hotspot that forces you to connect to their network, and then manipulate the traffic to cause apps and the operating system to crash. This is not a denial-of-service where you can't use your Wi-Fi – this is a denial-of-service so you can't use your device even in offline mode.
Read moreWe are very used to dividing the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed to software which is usually the layer suffering from bugs and malware.
This value system has been functioning for quite a while, however lately it has been showing signs of changing. Certain firmware responsible for managing discrete hardware components has been getting increasingly complex and is subject to vulnerabilities and exploits. Let’s review the top 5 dangerous hardware vulnerabilities that have recently been found in today’s PCs.
Read moreMillions of flawed BIOSes can be infected using simple two-minute attacks that don't require technical skills and require only access to a PC to execute. BIOS have been the target of much hacking research in recent years since low-level p0wnage can grant attackers the highest privileges, persistence and stealth.
Because almost no one patches their BIOSes, almost every BIOS is affected by at least one vulnerability, and can be infected. The high amount of code reuse across UEFI BIOSes means that BIOS infection can be automatic and reliable. The point is more how the vendors' fixes are going un-applied by users, corporations, and governments.
Read moreA lot of Android apps that have been downloaded 6.3 billion times from the Google Play store are still vulnerable to the FREAK bug. Research published Tuesday by the company shows just how vulnerable both Android and iOS apps still are to a FREAK attack.
FREAK is a cryptographic weakness that permits attackers to force data traveling between a vulnerable website or operating system to servers to use weak encryption protocols. If combined with a so-called man-in-the-middle attack, the data could theoretically be intercepted and cracked as the user is unwittingly using a lower level of encryption than believed.
Read moreSafeUM secure messenger has successfully finished first beta testing. Today we are ready to give SafeUM for everyone who applied for testing. Developers team hopes public beta testing will be even more productive, than the first one.
You will help us to understand the logic behaviour of different users in the application, to know your requirements and expectations from SafeUM secure messenger. Our goal is to create a convenient, user-friendly messenger that meets latest IT security and personal data protection standards. We appreciate your feedback and take seriously each of your valid comments.
Read moreOperation Pawn Storm,” a cyber-espionage campaign targeting military, governmental and media organizations, has extended its reach as security researchers discovered malicious tools connected to the operation and designed for iOS platform.
Two pieces of malware have been found, both intended for spying purposes. One of them is called XAgent and the other took its name from a legitimate game in iOS world, MadCap. Trend Micro caught the two samples, and after analysis, the researchers determined that they were related to Sednit, a piece of malware employed on Windows by the threat actor behind Operation Pawn Storm.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland