-
November 27, 2013
Android, Bitcoin top malware targets, McAfee reports
Android, Bitcoin top malware targets, McAfee reports: Almost 700,000 new malware samples aimed at the Android platform were cataloged in the third quarter of the year, accounting for an increase of more than 30 percent. McAfee Labs claims this is driven at least partially by a new category of Android malware, titled Exploit/MasterKey.A, which allows […]
-
November 26, 2013
It’s Not Just the NSA: Your Keyboard Knows Who You Are, Too
It’s Not Just the NSA: Your Keyboard Knows Who You Are, Too: In 1891, Arthur Conan-Doyle wrote a Sherlock Holmes short story entitled “A Case of Identity”. In it, he solves a mystery in part by determining that several different letters were all typed on the same typewriter: “It is a curious thing,” remarked Holmes, […]
-
November 26, 2013
Cellphones on a plane? Please don’t phone home
Cellphones on a plane? Please don’t phone home: Think cramped seats, snoring passengers, crying babies and mediocre — or non-existent— food make flying miserable? Imagine what it will be like to sit next to a person yammering on his or her cellphone. That’s what many passengers and airline analysts are contemplating in light of the […]
-
November 26, 2013
NTRU public key crypto released to open source community
NTRU public key crypto released to open source community: Today, Security Innovation announced the availability of NTRU crypto for free use in open source software. With the GPL open source license, NTRU can be confidently deployed in open source products such as web browsers and TLS/SSL servers. For those wishing to incorporate NTRU into a […]
-
November 26, 2013
Former FBI agent in charge in Buffalo to be honored Monday
BUFFALO, NY – A Special Agent working in the Buffalo office of the FBI is due in Eden Town Court later this month, after being arrested by New York State Police last Friday night, charged with exposing himself to a fellow motorist on the New York State Thruway. State Police Lt. David Denz confirmed for […]
-
November 26, 2013
Google to Unveil the Google Wallet Debit Card
Google to Unveil the Google Wallet Debit Card: It’s not the Google payments card that has long been planned, but Google is set to announce today that it is releasing a Google Wallet debit card that allows people to pay at stores that accept Mastercard using their Google Wallet balance. Cardholders will also be able […]
-
November 26, 2013
Patent Application For Touch ID Shows How Apple Secures Fingerprint Information On iPhone 5s
Patent Application For Touch ID Shows How Apple Secures Fingerprint Information On iPhone 5s: A new patent application published by the USPTO (via MacRumors) shows some more detail around Apple’s use of Touch ID and the fingerprint sensor in the iPhone 5s. Apple has been mostly quiet about the specifics of how the tech works, […]
-
November 26, 2013
1-15 November 2013 Cyber Attacks Timeline
1-15 November 2013 Cyber Attacks Timeline: It’s time for the summary of the main cyber attacks occurred in the first half of November and reported on the news. These fifteen days have been particularly troubled from an information security perspective, having left to the records several remarkable breaches: LoyaltyBuild, affecting potentially 1.12 million individuals, CorporateCarOnline.com […]
-
November 26, 2013
Bitcoin accepted by university in Cyprus
Bitcoin accepted by university in Cyprus: The University of Nicosia in struggling euro zone nation Cyprus is to become the first university in the world to accept the virtual currency bitcoin, according to a press release on its website. The educational facility – the largest private university in Cyprus – will also offer a Master’s […]
-
November 25, 2013
NSA compromised more than 50000 networks with malware
NSA compromised more than 50000 networks with malware: A new report based on documents leaked by Snowden revealed that the NSA placed malicious software on more than 50000 networks around the world. The NSA infected more than 50000 networks worldwide with malicious software designed to steal sensitive information. The large-scale cyber espionage operation was revealed […]