According to German researches of the SR Labs company, which works in the field of the information security, all devices that work through USB are poorly protected and dangerous.
Experts have found vulnerability which was invisible earlier in the USB standard. Everybody knows that viruses can be transferred through flash cards and it isn't very dangerous. Experts claim that the found vulnerability will allow malefactors to reach personal information of any device, which works through USB easily. In order to prove that vulnerability really exists, SR Lab Company specialists have developed the application that can be used to get full access to the computer disregarding all anti-virus decisions, which exist.Read more
Think you’re safe on the internet? Think again: Map reveals millions of cyber-attacks happening around the world in real time
A fascinating interactive map from security firm Norse serves as a stark reminder to just how dangerous the web can be. The live graphic plots every attack taking place on the internet, in real-time and reveals the number of attacks, where the attacks originate, and which locations they are aimed at. Norse’s interactive live map, allows viewers to watch as live attacks unfold around the world. The most popular target seems to be the U.S., with many attacks originating in China.Read more
Two examples of commercial censorship: the first is American hotel fines guests $500 for bad reviews and the second one is French judge orders food blogger to pay €2500 for writing negative review.
A New York hotel has a rather bizarre booking policy - it charges wedding couples $500 for every bad review left online by their guests. The Union Street Guest House said that it levies the fines because visitors "may not understand" its vintage interior and period furniture. "If your guests are looking for a Marriott type hotel they may not like it here," the inn added. According to the hotel's wide-ranging terms and conditions, a couple making a wedding booking will have the fine deducted from their deposit "for every negative review of USGH placed on any internet site by anyone in your party".Read more
The Bluebox Labs Company experts have published information about security vulnerability on Android platform which allows hackers to get access into functions of gadgets and to personal information without user‘s knowledge.
However many users are in danger as vulnerability was corrected only in the last Android version, but in other versions it still exists. After the Bluebox Labs Company found vulnerability, in English-speaking releases "hole" it was called "super vulnerability of new type", it is likely because of possibility to extend extremely malicious software. BlueBox experts called vulnerability Fake ID, because it allows malware apps to pass fake credentials to Android, which fails to properly verify the app's cryptographic signature.Read more
As WikiLeaks founder Julian Assange marks his 777th day in the Ecuadorian embassy in London, the Metropolitan Police has spent over $11.8 million on guarding the embassy.
Assange has been detained without charge for 1,337 days – and 777 of those days have been spent in the Ecuadorian embassy in London, according to the latest WikiLeaks statement. Meanwhile, the price tag for guarding Assange hit over seven million British pounds (US$11.8 million) early on Wednesday, according to govwaste.co.uk counter. Officers have been staking out the embassy around the clock since June 2012, with the cost to the London taxpayers surpassing $15,000 per day.Read more
Researchers and scientists from the Massachusetts Institute of Technology (MIT) have figured out a way to reproduce sound using the most fantastic and weirdest of "microphones."
These boffins have captured speech reflected off everyday objects such as a glass of water, a potted plant and a bag of chips. In effect, these objects become "microphones" that can record vibrations with the aid of a high speed camera. In collaboration with Microsoft and Adobe, MIT scientists developed a method that uses vibrations on reflective surfaces to eavesdrop on conversations. Instead of using expensive, professional equipment such as lasers, this ingenious method uses everyday objects to extract sound vibrations turned into audio from high speed video.Read more
For a long time many people use Tor for information security. The Department of State expenses were increased in 2,5 times, and the government of the USA invests more than 47% money in the Tor network now.
The Tor Corporation has published the financial report for 2013 that on the Tor project which gives users the chance to remain anonymous, more 47% budgetary funds of the USA were spent. In 2012 Tor Project received from the government $1,24 million, and in 2013 – $1,82 million, from them $882,3 were allocated by the Department of State, the Ministry of Defence of the USA donated $830,3 thousand, the National Science Foundation handed over $100,3 thousand and $10 were given by the Agency for International Development (USAID).Read more
More than 175 million customer records of personal and financial information were compromised between April and June due to 237 data breaches, bringing the total number of records stolen for the first half of this year to 375 million, a new report has said.
The report released by the SafeNet, Inc., a global leader in data protection solutions, said more than 375 million customer records were stolen or lost as a result of 559 breaches worldwide in the first half of this year. "Even amidst continued warnings about data security, the breach epidemic is trending in the wrong direction. 2014 has proven to be more of the same, with 375 million customer records stolen in the first six months alone," said Sebastien Pavie, Regional Sales Director Middle East and Africa, SafeNet.Read more
Almost a year ago, at the ‘Hack In The Box’ security summit in Amsterdam, a security researcher at N.Runs and a commercial airline pilot, Hugo Teso presented a demonstration that it's possible to take control of aircraft flight systems and communications using an Android smartphone and some specialized attack code.
Quite similar to the previous one, a security researcher claims to have devised a method that can give cyber criminals access to the satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Santamarta research paper titled “SATCOM Terminals: Hacking by Air, Sea and Land” explains that ships, aircraft and industrial facilities are all at risk of being compromised — perhaps with catastrophic results.Read more
Federal law requires people and companies to report child exploitation when they see it. This includes Google, whose automated eyes tipped law enforcement about a Houston-area man whom the police say was using the company’s Gmail service to email pornographic images of a child.
The man, John Henry Skillern, 41, was arrested and charged with promotion and possession of child pornography. According to the police, the arrest was set in motion when Google sent a tip to the National Center for Missing & Exploited Children. The group alerted David Nettles, a detective in Webster, Tex., who works full time for the Houston Metro Internet Crimes Against Children Task Force.Read more