It’s a computer – inside a cockroach. Nano-sized entities made of DNA that are able to perform the same kind of logic operations as a silicon-based computer have been introduced into a living animal. The DNA computers – known as… Read More ›
Technology
‘Heartbleed’ bug puts encrypted data in danger
Trust in the Internet took a major blow as alarm spread that software commonly used to encrypt and secure online transactions could wind up giving away the store. Computer security specialists, website masters, and fans of online privacy were worriedly… Read More ›
Home is where the Heartbleed is thanks to SSL in your modem
Vendors and ISPs have a lot of work to do updating firmware – if it possible to do so By Richard Chirgwin Posted in Security, 9th April 2014 02:36 GMT All over the world, systems administrators are scrambling to fix… Read More ›
Knowledge transfer: Computers teach each other Pac-Man
March 27, 2014 Matthew Haugen PULLMAN, Wash. – Researchers in Washington State University’s School of Electrical Engineering and Computer Science have developed a method to allow a computer to give advice and teach skills to another computer in a way that… Read More ›
Why CIA, NSA can’t spy on Putin?
Tuesday, 01 April 2014 Earlier this month, as Russia began its move in Crimea, U.S. spy agencies reportedly found a worrying silence in the spot where they were listening most attentively — the digital space around Russian President Vladimir Putin… Read More ›
Hacked Twitter accounts more valuable to cyber thieves than credit cards
Cyber thieves can make more money out of stolen Twitter credentials than from stolen credit card data on the black market, a report by the Research and Development Corporation (RAND) says. The survey called “Markets for Cybercrime Tools and Stolen… Read More ›
Hey, Glasshole: That cool app? It has turned you into a SPY DRONE
Google Glass spyware can use users as surveillance drones By John Leyden Security researchers have created prototype Google Glass spyware that is capable of snooping on everything the user is looking at without tipping off victims that anything is amiss…. Read More ›
Rise of robot reporters: when software writes the news
17:00 21 March 2014 by Aviva Rutkin Just three minutes after an earthquake hit California on Monday, the Los Angeles Times broke the story on its website. The short article seemed fairly ordinary. It covered all the major details –… Read More ›
Antisocial Network to help users avoid their friends
Friday, 21 March 2014 A pair of U.S. developers have created Cloak, an iPhone “antisocial network” to help users avoid running into their friends. Cloak, created by programmer Brian Moore and former Buzzfeed creative director Chris Baker, is billed as… Read More ›
NSA ‘records all phone conversations’ in unnamed target country ( MYSTIC )
US agency records every phone conversation in unnamed target nation, according to exiled whistle-blower Edward Snowden and others UPDATED : Thursday, 20 March, 2014, 4:23am The Washington Post NSA taps ‘all calls’ in one country. The US National Security Agency… Read More ›
Ukraine (cyber) war in full swing
2014-03-17 07:29 Kiev – With cyber attacks already launched against Crimean separatists, the Kremlin and Nato, the ground war may not have started in Ukraine but computer warfare is already raging. In recent days – and with increasing intensity on… Read More ›
USA gives up control of Internet
Friday, 14 March 2014 U.S. officials announced plans Friday to relinquish federal government control over the administration of the Internet, a move likely to please international critics but alarm some business leaders and others who rely on smooth functioning of… Read More ›
Turkish Graft Documents 17 DECEMBER OPERATION as leaked – Converted to PDF
EEV: Link here is to WordPress PDF file: 17 ARALIK OPERASYONU BAKANLAR FEZLEKESİ Egemen Bağış Zafer Çağlayan Muammer Güler Original leak source : The Twitter pseudonym @HARAMZADELER333 EEV: First post published below for linking: R A P O R Soruşturma No :… Read More ›
NSA’s TURBINE robot pumps ‘malware into MILLIONS of PCs’
Sysadmins, routers, criminals’ IRC botnets, and maybe terrorists, all for the pwning By Iain Thomson 12th March 2014 21:47 GMT The latest batch of top-secret intelligence documents from the hoard collected by NSA whistleblower Edward Snowden detail the massive increase in… Read More ›
Russian Military to Deploy Security Bots at Missile Bases
Russian Military to Deploy Security Bots at Missile Bases © RIA Novosti. Sergei Pyatakov 04:48 13/03/2014 MOSCOW, March 12 (RIA Novosti) – Russia is planning to deploy mobile security robots in 2014 to protect its strategic missile facilities, the Defense… Read More ›
Cyber attack on Russia hits India, secret defence documents leaked
Saikat Datta , Hindustan Times New Delhi, March 08, 2014 First Published: 21:03 IST(8/3/2014) | Last Updated: 22:06 IST(8/3/2014) A cyber attack on Russian communication systems by anonymous hackers on early Saturday morning has compromised India’s defence dealings with Russia… Read More ›
Suspected Russian spyware Turla targets Europe, U.S. ( Turla )
– A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date Reuters, 07/03 16:26 CET By Peter Apps and… Read More ›
Hacking Team snoopware found on US servers
– The governments named include Uzbekistan, Poland, Mexico, Colombia, Morocco, Thailand, the UAE, Korea* Morocco and Azerbaijan Citizen Lab tags foreign governments for spying in America By Richard Chirgwin 6th March 2014 05:01 GMT Canada’s Citizen Lab has added to its… Read More ›
VIIRS Downloads / NOAA/NASA Suomi National Polar-orbiting Partnership spacecraft
VIIRS View Spinning Marble App Raytheon’s VIIRS View app provides a glimpse into the type of data meteorologists and climatologists use every day to track the weather and monitor the Earth’s environment. VIIRS View illustrates three types of data… Read More ›
Largest single personal data hack ever? 360mn stolen account credentials found online
Published time: March 01, 2014 01:31 Reuters / Kacper Pempel A cyber security firm has reported a “mind boggling” cache of stolen credentials which has been put up for sale on online black markets. A total of… Read More ›
Who holds the seven keys to the internet?
Meet the seven people who hold the keys to worldwide internet security It sounds like the stuff of science fiction: seven keys, held by individuals from all over the world, that together control security at the core of the web…. Read More ›
Yahoo webcam images from millions of users intercepted by GCHQ
• Optic Nerve program collected Yahoo webcam images in bulk • 1.8m users targeted by UK agency in six-month period alone • Yahoo: ‘A whole new level of violation of our users’ privacy’ • Material included large quantity of sexually… Read More ›
Wi-Fi Computer Virus goes Airborn like common cold
Thursday, 27 February 2014 Researchers in Britain have shown for the first time how a computer virus can spread through Wi-Fi “as efficiently as the common cold spreads between humans.” The ‘Chameleon’ Wi-Fi AP-AP virus infiltrates dense networks and… Read More ›
2029: the year when robots will have the power to outsmart their makers
Ray Kurzweil, Google expert in artificial intelligence, predicts that by 2029 robots will make jokes and flirt Nadia Khomani The Observer, Saturday 22 February 2014 16.00 EST Computers will be cleverer than humans by 2029, according to Ray Kurzweil, Google’s director… Read More ›
Beware Greeks bearing lists: Bank-raiding nasty Zeus smuggles attack orders in JPEGs
EEV: _ Very Well Placed Malware_ Trojan stashes config files in photos in mythology mash-up By Iain Thomson Posted in Security, 20th February 2014 20:12 GMT A new variant of the bank-account-raiding Zeus malware apparently uses the ancient technique of steganography to… Read More ›
Termite robots build castles with no human help
Video: Termite robots build castles with no human help A shoe-sized robot, shaped like a VW Beetle and built by a 3D printer, scuttles in circles on a Harvard lab bench. Its hooked wheels, good for climbing and grasping,… Read More ›
‘I always wonder if someone is listening’: NSA spied on American lawyers but sometimes got other governments to do the work for them
U.S. law firm advising Indonesia’s government on trade issues was spied on by a foreign government Spying was done by Australia which then passed the info onto the NSA Law firm involved not identified in the latest documents The NSA… Read More ›
10 Technologies That Could Enslave Humanity
Terminator is a true story. Find out how we’re all doomed in 10 technologies that could enslave humanity.
New system combines control programs so fleets of robots can collaborate
A new system combines simple control programs to enable fleets of robots — or other ‘multiagent systems’ — to collaborate in unprecedented ways Writing a program to control a single autonomous robot navigating an uncertain environment with an erratic communication… Read More ›
Hackers used previously unknown Internet Explorer flaw in new attacks
– He said planting backdoors on the machines of VFW members and site visitors to collect military intelligence was a possible goal. Source: Reuters – Fri, 14 Feb 2014 01:25 AM Author: Reuters By Joseph Menn SAN FRANCISCO, Feb 13… Read More ›
DARPA developing ultimate web search engine to police the internet
Published time: February 12, 2014 22:35 Reuters / Umit Bektas The Pentagon’s research arm that fosters futuristic technology for the military will soon begin working to surpass current abilities of commercial web search engines. Yet, once it masters… Read More ›
‘Elite’ hacking operation ‘The Mask’ targeted govts, diplomats for 7 years
Published time: February 10, 2014 23:05 Image by Kaspersky Labs Researchers recently detected a highly sophisticated cyber spying operation, active since 2007, that targeted governments, diplomats, and embassies before it was razed last month. Kaspersky Labs in Russia identified the… Read More ›
The gadget that can hack any CAR: Terrifying £12 tool can remotely control headlights, locks, steering and even brakes
Gadget is fitted to the Controller Area Network (CAN) of a modern car Depending on the make of car, the CAN controls lights, locks and brakes Hackers claim it can be fitted to any car’s network ‘within five minutes’ CAN… Read More ›
Affordable Care Act Software ongoing investigation, if the software was written in Belarus
U.S. says no evidence Obamacare software written in Belarus Hayden confirmed that a U.S. intelligence agency had recently issued, then retracted, a report related to possible involvement by a Belarus company in writing the software. Valery Tsepkalo, director of the… Read More ›
Microsoft, Facebook, Google and Yahoo release US surveillance requests
• Tech giants turn over data from tens of thousands of accounts • Limited disclosure part of transparency deal made last month Spencer Ackerman in Washington and Dominic Rushe in New York theguardian.com, Monday 3 February 2014 16.40 EST Microsoft,… Read More ›
This tool demands access to YOUR ENTIRE DIGITAL LIFE. Is it from GCHQ? No – it’s by IKEA
Order a flat-pack kitchen, surrender your HDD’s contents By Richard Chirgwin, 29th January 2014 If the Target hack – along with all its predecessors – taught us anything, it’s that the database isn’t the vulnerability. It’s the data that’s… Read More ›
ATM security alert as Microsoft prepares to kill off Windows XP
Microsoft to cease support for Windows XP on April 8th Experts believe only 95% of ATMs run the software Could leave machines vulnerable to hackers By Mark Prigg PUBLISHED: 19:42 EST, 17 January 2014 Cashpoints around the world could be… Read More ›
‘A hacker’s wet dream:’ ‘World’s most wanted hacker’ SLAMS Obamacare website security
– Healthcare.gov retrieves information from numerous third-party databases belonging to the IRS, Social Security Administration, Department of Homeland Security, and other State agencies – it’s clear that the management team did not consider security as a priority – A breach may result… Read More ›
Net neutrality is now DEAD
– Internet providers may be able to offer faster connections to preferred websites, or even block competitors – This ruling, if it stands, will adversely affect the daily lives of Americans and fundamentally change the open nature of the internet,… Read More ›
The Cyborgs Era Has Started
Press Release 003/2014 Interfaces of Technical Devices with Organisms for Medical Applications – KIT Scientists Report in “Angewandte Chemie Int. Ed.” Communication between man and machine – a fascinating area at the interface of chemistry, biomedicine, and engineering. (Figure: KIT/S…. Read More ›
Millions of visitors to Yahoo.com hit by huge malware attack
Ads from Yahoo are redirecting users to sites that install a host of different malware IT security firm Fox IT estimates that up to 29,000 computers per hour were affected Yahoo says it is aware of the problem and working… Read More ›
NSA statement does not deny ‘spying’ on members of Congress
– Senator Asked the Question ” about whether it “has spied, or is … currently spying, on members of Congress or other American elected officials” • Agency responds to questions from Senator Bernie Sanders • Statement cites ‘same privacy protections as… Read More ›
NSA Warns of Rogue System Administrators 1996 / Irony?
EEV: Thank you to Cryptome for bringing attention to this. .. I decided to post the first page of the FOIA release, just to display the declassification date. A few out there will recognize the Irony 😉 4 January 2014 A… Read More ›
The Actual NSA’s Spy Catalog
EEV: As Promised, in no particular order. This information already has been fully compromised internationally, over the past few days.
U.S. House to mull proposals to make Obamacare website more secure
– experts warned Congress in November that the Obamacare website had so many security flaws that it was putting people’s data at risk and should be shut down until it is fixed. Source: Reuters – Thu, 2 Jan 2014 11:40… Read More ›
Shopping for Spy Gear / Catalog Advertises NSA Toolbox
By Jacob Appelbaum, Judith Horchert and Christian Stöcker After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Editor’s note:… Read More ›
China-made software collects text data without users’ knowledge
The government’s National Information Security Center has warned about 140 organisations, not to use a Japanese input method editor developed by Baidu Inc.ch. Yomiuri Shimbun/ANN | 26-12-13 The government’s National Information Security Center has warned about 140 organisations, including… Read More ›
Major computer security firm RSA took $10 mln from NSA to weaken encryption – report
Published time: December 20, 2013 23:48 RSA SecureID electronic keys (Reuters / Michael Caronna) The National Security Agency arranged a clandestine US$10 million contract with computer security power RSA that allowed the spy agency… Read More ›