At the MWC 2014, Silent Circle and Geeksphone corporations have demonstrated the most protected smartphones from wiretapping, called Blackphone. The first phones were sold in late June.
The super protected smartphone for $ 630, with fairly low characteristics for its price turned out to be unable to protect its owner from wiretapping. At the DEF CON 22 Hacking Conference on computer safety, called BlackHat that brings together a variety of people interested in information security, the participant of @TeamAndIRC Justin Case could gain root access and enable ADB on the device in 5 minutes after obtaining root on smartphone, one can install any software remotely.
Read moreThe Swiss Switch CH Company declared that the Trojan code, which attacks online banking systems of Switzerland‘s large banks was found.
Experts claim that the code is Russian; it is also capable to change settings in domain system of the computer or abduct SMS keys. In practice the Trojan aims the victim to appear on hacker‘s site and there all requisites for access to the real banking will be taken. The most important thing is the malicious code is capable to bypass even a two-factorial identification system; in addition it is capable to change DNS records in such a way that the client won’t notice anything.
Read moreThe newly launched torrent search engine BTindex crawls BitTorrent's DHT network for new files. It's a handy service, but one that comes with a controversial twist. In addition to listing hundreds of thousands of magnet links, it also exposes the IP-addresses of BitTorrent users to the rest of the world.
Unless BitTorrent users are taking steps to hide their identities through the use of a VPN, proxy, or seedbox, their downloading habits are available for almost anyone to snoop on. By design the BitTorrent protocol shares the location of any user in the swarm. After all, without knowing where to send the data nothing can be shared to begin with.
Read moreThe governments of 30 countries scattered around the globe have voted to allow their municipal police departments to use malware in their arsenals of crime fighting tools, computer security experts said at this week’s hacker conference.
Malware is now being used in criminal investigations by remotely inserting tracking technology into mobile phones and following suspects with geolocation technology remotely installed. It’s also used to infect suspects machines directly, noted security expert Mikko Hypponen. The U.S. and Germany, with court-sanctioned green lights, have been using malware for years in investigations.
Read moreAccording to German researches of the SR Labs company, which works in the field of the information security, all devices that work through USB are poorly protected and dangerous.
Experts have found vulnerability which was invisible earlier in the USB standard. Everybody knows that viruses can be transferred through flash cards and it isn't very dangerous. Experts claim that the found vulnerability will allow malefactors to reach personal information of any device, which works through USB easily. In order to prove that vulnerability really exists, SR Lab Company specialists have developed the application that can be used to get full access to the computer disregarding all anti-virus decisions, which exist.
Read moreThink you’re safe on the internet? Think again: Map reveals millions of cyber-attacks happening around the world in real time
A fascinating interactive map from security firm Norse serves as a stark reminder to just how dangerous the web can be. The live graphic plots every attack taking place on the internet, in real-time and reveals the number of attacks, where the attacks originate, and which locations they are aimed at. Norse’s interactive live map, allows viewers to watch as live attacks unfold around the world. The most popular target seems to be the U.S., with many attacks originating in China.
Read moreTwo examples of commercial censorship: the first is American hotel fines guests $500 for bad reviews and the second one is French judge orders food blogger to pay €2500 for writing negative review.
A New York hotel has a rather bizarre booking policy - it charges wedding couples $500 for every bad review left online by their guests. The Union Street Guest House said that it levies the fines because visitors "may not understand" its vintage interior and period furniture. "If your guests are looking for a Marriott type hotel they may not like it here," the inn added. According to the hotel's wide-ranging terms and conditions, a couple making a wedding booking will have the fine deducted from their deposit "for every negative review of USGH placed on any internet site by anyone in your party".
Read moreThe Bluebox Labs Company experts have published information about security vulnerability on Android platform which allows hackers to get access into functions of gadgets and to personal information without user‘s knowledge.
However many users are in danger as vulnerability was corrected only in the last Android version, but in other versions it still exists. After the Bluebox Labs Company found vulnerability, in English-speaking releases "hole" it was called "super vulnerability of new type", it is likely because of possibility to extend extremely malicious software. BlueBox experts called vulnerability Fake ID, because it allows malware apps to pass fake credentials to Android, which fails to properly verify the app's cryptographic signature.
Read moreAs WikiLeaks founder Julian Assange marks his 777th day in the Ecuadorian embassy in London, the Metropolitan Police has spent over $11.8 million on guarding the embassy.
Assange has been detained without charge for 1,337 days – and 777 of those days have been spent in the Ecuadorian embassy in London, according to the latest WikiLeaks statement. Meanwhile, the price tag for guarding Assange hit over seven million British pounds (US$11.8 million) early on Wednesday, according to govwaste.co.uk counter. Officers have been staking out the embassy around the clock since June 2012, with the cost to the London taxpayers surpassing $15,000 per day.
Read moreResearchers and scientists from the Massachusetts Institute of Technology (MIT) have figured out a way to reproduce sound using the most fantastic and weirdest of "microphones."
These boffins have captured speech reflected off everyday objects such as a glass of water, a potted plant and a bag of chips. In effect, these objects become "microphones" that can record vibrations with the aid of a high speed camera. In collaboration with Microsoft and Adobe, MIT scientists developed a method that uses vibrations on reflective surfaces to eavesdrop on conversations. Instead of using expensive, professional equipment such as lasers, this ingenious method uses everyday objects to extract sound vibrations turned into audio from high speed video.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland