The U.S. National Security Agency was developing a software implant in 2008 for Apple iPhones that allowed the agency to take almost total control of the device, including retrieving text messages and voicemail and remotely turning on its ...
Tags: iPhones, Backdoor Access
Virtual reality has been hyped as the next big thing for decades—and yet,it never seems to deliver.Despite the potential,particularly in the world of gaming,numerous attempts have left players dizzy with disappointment,and just plain ...
Tags: Oculus Rift, virtual reality
This year's 30th Chaos Communication Congress (30C3) in Hamburg from December 27 to December 30 carried numerous informative presentations, including a reverse-engineering story about SD cards, which two investigators explored for malware ...
Tags: 30C3, SD cards, reverse-engineering, malware, MITM attacks
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal ...
Tags: National Security Agency's hacking unit, Tailored Access Operations
New research by two John Hopkins University students showed older Apple Mac's cameras, iSight, can be hacked to covertly monitor users. John Hopkins University students turn Apple MacBook webcam iSight into covert surveillance camera ...
Tags: LED indicator, Lights, Lighting
The price of bitcoins may be soaring, but China isn’t too thrilled with the virtual currency. On Thursday, it moved to regulate use of bitcoins, stating that its financial institutions could not deal in the virtual currency. ...
Tags: bitcoins, usage, investment
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones. Security researcher Samy Kamkar created the hacker drone, which uses the Parrot AR.Drone 2.0 ...
Prime Minister David Cameron is to enter talks with China over cyber spying after raising the issue with Chinese Prime Minister Li Keqiang during his visit to the country. It follows on from a long-running war of words between the US and ...
Tags: Cyber Spying, Talks with China
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company. Eric J. Rosol, 38, is admitted that on Feb. 28, 2011, he took part in a denial of service ...
Tags: Ddos Attack, Fined
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies as “W32.Shadesrat,” ...
Tags: Symantec, Blackshades, malware
A biomedical engineer is developing a clinical-grade open-source 12-lead ECG. The device includes support for Android devices and is designed to meet all relevant medical device manufacturing standards, like ISO 60601-1. According to early ...
The US National Security Agency (NSA) propagated malware around the world in a bid to infiltrate and compromise more than 50,000 networks. The claim is the latest in the Edward Snowden disclosures and published in the German newspaper ...
Tags: Computer Products, software
SAN FRANCISCO (AP) -- Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the world. ...
Tags: Yahoo, Encrypt, Users'Personal Data
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals. They include an El Salvadoran national accused of selling a Trojan designed to spy on husbands or wives believed by their ...
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole