I was in Germany for Chaos Congress 2009, a hacker conference, and after attending a series of talks I was headed back to my hotel when I spotted Julian Assange. This predated my working as a project manager at DARPA as a hacker-in-residence, if you will. It was ...
Rumors of Magic Lantern first hit the internet airwaves when Bob Sullivan, a prominent journalist and co-founder of MSNBC network, accused the FBI for using powerful keylogger software to aid in its investigations of extortion and harassment. The Bureau denied the allegations until official FBI documents produced in court proved that the FBI had developed the tool, in 2002 . This high-tech keyboard Recorder was capable of remote installation unlike previous keyloggers which had to be physically installed in a target computer. The documents further stated that the use of ...
Police in Argentina have arrested a 19 year-old man accused of heading a gang of hackers who targeted international money transfer and gambling websites. Dubbed "the superhacker", the teenager was making $50,000 (£31,500) a month, working from his bedroom in Buenos Aires, police say. The arrest operation shut ...
It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted ...
The Passive Vulnerability Scanner (PVS) version 4.0 was released today and is available to the public. It features a brand-new HTML5 web-based interface and a standalone version, allowing users to track and review vulnerabilities discovered from sniffing network traffic.View a two-minute video by Tenable Technical Product Manager Jack ...
One of my tasks at IOActive Labs is to deal with vulnerabilities; report them, try to get them fixed, publish advisories, etc. This isn\\'t new to me. I started to report vulnerabilities something like 12 years ago and over that time I have reported hundreds of vulnerabilities - many of them found by me and by other people too. It\\'s really sad to tell that, as of right now, 12 years later, I continue to see most (if not all) of the same problems. Not only that, but some organizations ...
The digital rights management (DRM) market will grow at a rate of 12% annually to become a $1.2 billion market by 2018, while the related conditional access (CAS) market will decline slightly to dip below $1.5 billion annually.
Apparently, the practice of manipulating people with fear into doing things that are not in their best interests is not illegal but the people who perpetrate this stuff are lower forms of life. Check out this video and score one for the human race.
#doyouknowwhoswatchingyou? A new study from USC researchers sampled more than 15 million tweets, showing that some Twitter users may be inadvertently revealing their location through updates on the social media channel.
Syrian Electronic Army (SEA) hackers "broke into" Melbourne IT, an Australian Internet services company that claims Twitter and the New York Times as its customers.
Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.
Scientists recently launched unmanned aerial vehicles (UAVs) from a research vessel in a significant experiment that could help boost the Navy’s radar and communications performance at sea.
UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as "software obfuscation," and it is reportedly the first time it has been accomplished.
It’s a wonder we still put up with passwords. We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.
Cloud computing - outsourcing computational tasks over the Internet - could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.
Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.
Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.
The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.
Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, at least according to computer scientists at the University of California, San Diego.
We all know that Prism is most likely just the tip of the snooping iceberg. While some of us may run Tor on our PC or Mac, there may be times when when we are working on a device that is not our own, or perhaps even a Chromebook, tablet or phone.