Two researchers send a text message using vodka

Two researchers at York University have worked out a way to communicate between two points using vodka evaporated into the air.

Revive Adserver (formerly OpenX) zero-day actively exploited in the wild

A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of the continuous checklist tool Checkpanel.

Code-busters lift RSA keys simply by listening to the noises a computer makes

Un-named PC maker sought help to defeat un-named nation's PC-bricking plan In theory - Obama government granted time to fight injunction Chinese firm will still clear critical Brit networking gear, but team to be of UK's choosing Texts 'designed' to look like they were 'from a friend' - complaints Security upstart claims it's found a file-gobbling nasty with weak encryption Computer scientists have shown how it might be possible

Target hack: how to know if it hurt you (Updated)

By now, everyone knows that if you shopped at Target and paid by credit card between November 27 and December 15, 2013, you may be vulnerable and a victim of this humongous breach of security.

ZeroAccess criminals wave white flag: The impact of partnerships on cybercrime

The following is a post from Richard Domingues Boscovich, Assistant General Counsel, Microsoft Digital Crimes Unit.Two weeks after Microsoft filed its civil case in the U.S. District Court for the Western District of Texas against the notorious Sirefef botnet, also known ZeroAccess, I am pleased to report that our disruption effort has been successful, and it appears that the criminals have abandoned their botnet.

How a Hacker Compromised a Server in Under Four Hours

In September 2013, we ran a live server exploitation exercise to see how long an unpatched and minimally configured cloud server instance could survive against financially motivated attackers when connected directly to the Internet. The exercise, referred to as The Gauntlet throughout the capture-the-flag-style contest, ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.

Miss Teen USA exposes Apple Macbook camera security fail

The fruit themed toymaker Apple's legendary sloppy security has been brought into the spotlight again after it was revealed that you can turn on the laptops camera without the owner knowing.

Stock exchanges of the world band together to repel cyber attacks

The World Federation of Exchanges (WFE) announced the launch of the exchange industry’s first cyber security committee. The committee is tasked to combat systemic cyber abuse against world capital markets.

Microsoft's long-standing commitment to children's online safety

Today, social networking, mobile computing, and the realization that 21st century skills are a key ingredient to children’s success, make protecting kids online that much more significant, nearly a generation later. Last month in Brussels, Forum Europe held its second annual European Child Safety Online Conference to examine European and global cooperation toward a safer and better Internet for kids.

Android malware MisoSMS one of the largest botnets to date

A mobile botnet called MisoSMS is giving the Android platform a kick in the botnets, stealing personal SMS messages and sending them to attackers in China.

Judge rules NSA surveillance illegal

A federal judge has ruled that the National Security Agency's phone record surveillance program is likely to be unconstitutional.

Open Source Spat: OpenBSD versus FreeBSD

What happens when people, who are supposed to advocate openness and collaboration among developers, start to snipe at each other's ability to deliver the goods? It's like the Peloponnesian War without the hunky warriors, action, and historic relevance.

Bots overrunning human traffic on the Internet

Beancounters at the security outfit Incapsula have added up all their numbers and divided by their shoe size and worked out that 61.5 percent of all website traffic is now generated by bots.

NSA forces novelist to scrap book

A Scottish sci-fi writer has cancelled the last installment in a trilogy about high-tech government spying after discovering that the NSA has been doing exactly what he described in his books.

Sino-hackers go all NSA and shizzle on Europeans

Chinese hackers eavesdropped on the computers of five European foreign ministries before last September's G20 Summit, which was dominated by the Syrian crisis.

This Android app stops you being tracked in public

AVG, best known for its security software applications, has added WiFi Do Not Track (DNT) to is Android PirvacyFix app. This will kill all those comments about "Minority Report" and we are happy about anything that will stop people trying to sell us crap we don't want based on erroneous information that they've gotten through nefarious means. Suck it, retailers!

NSA not feelin' the love from Obama

Morale at the US spook agency the NSA has plummeted, according to an officialish survey.

2M Passwords For Facebook, Twitter And Others Stolen In Massive Data Breach

According to a report in ReadWrite: Have a Google, Facebook, Twitter, LinkedIn, or Yahoo account?  If so, you might want to change your password, stat. According to cybersecurity firm Trustwave, hackers using a nasty piece of work called the Pony Botnet Controller have stolen usernames and passwords for nearly two million accounts. The firm determined that a malicious keylogger installed on users’ computers was to blame.  In addition, CNN reported that the accounts hacked were:

FOX News Explaining GitHub is the Funniest Thing You’ll See Today

Fox News, the unmitigated authority in open source technology, gave its viewers the gift of knowledge yesterday with its explanation of GitHub. Thanks Fox News!

Google removing 9 links every second for media companies

Big content is effectively censoring Google in a way that the Chinese goverment can only dream of and no one appears to be stopping them.