1. 1-13 of 13
    1. Google phishing attack was foretold by researchers—and it may have used their code

      The "Google Docs" phishing attack that wormed its way through thousands of e-mail inboxes earlier this week exploited a threat that had been flagged earlier by at least three security researchers—one raised issues about the threat as early as October of 2011. In fact, the person or persons behind the attack may have copied the technique from a proof of concept posted by one security researcher to GitHub in February.

      Read Full Article
    2. How ISPs can sell your Web history—and how to stop them

      The US Senate yesterday voted to eliminate privacy rules that would have forced ISPs to get your consent before selling Web browsing history and app usage history to advertisers. Within a week, the House of Representatives could follow suit, and the rules approved by the Federal Communications Commission last year would be eliminated by Congress. So what has changed for Internet users? In one sense, nothing changed this week, because the requirement to obtain customer consent before sharing or selling data is not scheduled to take effect until at least December 4, 2017.

      Read Full Article
    3. What we’ll be looking for in laptops for 2017

      Certain pieces of technology tend to stick around. USB has been the connector of choice for all manner of peripherals for two decades, and ATA hard disks, first parallel and now serial, have a history back to 1986. Over the last few years, however, we've started to see real alternatives to these technologies hit the market, with NVMe storage and Thunderbolt 3 for attaching devices. Our platonic ideal of what a laptop computer should be has shifted somewhat. As we head into 2017 and all the systems that will inevitably be announced at CES, we felt it would be ...

      Read Full Article
    4. AI in healthcare: Fascinating tech, but is it actually saving lives?

      Tech-driven automated health data collection obviously opens up tremendous possibilities. But a vast trove of information is useless without the ability to efficiently store, analyze, individualize, and implement this information on a case-by-case basis. Despite any science fiction depictions of super-capable, user-facing robodoctors of the future, this behind-the-scenes legwork is the genuine niche where artificial intelligence can revolutionize health.

      Read Full Article
    5. To go green, Facebook puts petabytes of cat pics on ice and “likes” windfarming

      When someone says the word "sustainability," the first thing that leaps into your mind is not a data center. These giant buildings full of computer, network, and storage gear are typically power-hungry behemoths with giant cooling systems that keep servers happy and chilled. Their power distribution systems lose kilowatts just shifting electricity from one form to another.  A number of Internet giants have gone to great lengths to change that—building their own data centers and even building their own hardware in an effort to make their ever-ballooning fleet of data centers more environmentally friendly.

      Read Full Article
    6. Booming crypto ransomware industry employs new tricks to befuddle victims

      Ransomware that uses strong cryptography to hold entire hard drives' worth of data hostage keeps getting nastier, as criminals attempt to find new ways to extort more people into paying increasingly hefty ransoms to recover their files. A case in point is Chimera, a relative newcomer to the crypto ransom racket that targets primarily businesses. In an attempt to turn up the pressure on infected victims, the malware threatens to publish their pictures and other personal data somewhere on the Internet unless a ransom of $638 in bitcoins is paid.

      Read Full Article
    7. New data uncovers the surprising predictability of Android lock patterns

      The abundance of password leaks over the past decade has revealed some of the most commonly used—and consequently most vulnerable—passphrases, including "password", "p@$$w0rd", and "1234567". The large body of data has proven invaluable to whitehats and blackhats alike in identifying passwords that on their face may appear strong but can be cracked in a matter of seconds. The Tic-Tac-Toe-style patterns, it turns out, frequently adhere to their own sets of predictable rules and often possess only a fraction of the complexity they're capable of. 

      Read Full Article
    8. Hacking Team gets hacked; invoices suggest spyware sold to repressive govts

      Hacking Team gets hacked; invoices suggest spyware sold to repressive govts

      A controversial company that sells weaponized spyware has been penetrated by hackers who claim to have plundered more than 400 GB worth of e-mails, source code, and other sensitive data—including invoices showing that the firm has done business in countries ruled by highly repressive governments. Italy-based Hacking Team has long denied selling to nations with poor human rights records.

      Read Full Article
    1-13 of 13