360° view of this story
Security flaw in USB devices could be used in new attacks http://pic.twitter.com/G6UVWI53EN http://iphonehacks.com/2014/07/usb-de…
USB HAS A FUNDAMENTAL SECURITY FLAW THAT YOU CAN'T DETECT. … #TechDrop http://pic.twitter.com/yr0nlI1QdN http://432thedrop.com/9/post/2014/07…
USB has a fundamental security flaw that you can't detect: http://pic.twitter.com/NagdNPqLa9 http://gizmo.do/JfYS99u
WHAT EXACTLY ARE THE SPY AGENCIES ACTUALLY DOING WITH THEIR BAG OF DIRTY TRICKS? #Infowars http://pic.twitter.com/4HkM9Zz3Ov http://infowars.com/what-exactly-a…
#MobileTechnology #Mobile Major Security Flaw Patched Through Flash Update http://pic.twitter.com/UN9vy4E9pz http://ift.tt/1xS0uIt
@DarinRMcClure: Flash Just Patched a Huge Security Flaw, Go Update it Right Now http://pic.twitter.com/1fgLo9UlVU http://be.rtgit.com/1qTF7WE
Eric Holder Warns Europe's Spy Agencies That Amer…: http://youtu.be/xkljCNZ8Uqg
I liked a @YouTube video NEW How To Bypass iOS 7 LockScreen & Access ANY iPhone Application http://youtu.be/Hg9Vy7XzGZY?a
I liked a @YouTube video from @protomario Windows XP, Bank ATMS, and Explorer Security Flaw? http://youtu.be/7NQdVs5cAuk?a
TGP #0701 | New Web Security Flaw, Samsung Pays Apple $120 Million: via @YouTube http://youtu.be/dB_I3k-uxgY?a
I liked a @YouTube video Internet Explorer Security Flaw - What Can You Do About It? http://youtu.be/aSaoYCat6O8?a
Sydney Morning Herald
Jihadists returning from fighting alongside terrorists overseas are committed to trying to strike on home soil and Attorney-General George Brandis says its ''delusional'' to think otherwise. Senator Brandis argues the Liberals are the best placed political side to introduce such powers because they are naturally on the side of the individual and not the state.
In the new era of digital media, everyone's a publisher -- celebrities, nobodies, spy agencies , house plants and, especially, brands. "At the end of the day, the board of directors sees this as a way to differentiate ourselves," he says.
How spy agencies keep 'toys' from law enforcement. And sometimes it's not just the tool that is classified, but the existence itself of the capability -- the idea that a certain type of communication can be wiretapped -- that is secret.
A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo Jr., so they could get evidence from his computer to be used at his trial. In the end, the judge let the trial go forward without allowing the defense to see details of the technique and Scarfo -- the son of legendary Philly mob boss Nicodemo "Little Nicky" Scarfo -- was convicted.
July 23, 2014, 11:01 AM -- Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday. The plaintiffs called the reasoning of the court "incomprehensible" in a statement.
How Spy Agencies Plan to Solve Their Racism Problem. The office of the director of national intelligence says it will implement annual training on "multi-cultural understanding and sensitivity," an evaluation of current diversity training, and the reestablishment of an external advisory board on "diversity and inclusion," according to a DNI spokeswoman.
A political analyst says the ISIL Takfiri militants currently wreaking havoc on Iraq are serving the interest of Israeli and US intelligence agencies. The analyst said that the Takfiri terrorists currently operating in Iraq "are fighting the enemies of Israel" and seek to divide Shia and Sunni Muslims.
Vienna: Security researchers have revealed two separate threats this week they say could put up to 90 per cent of the world's 2 billion plus smartphones at risk of password theft, stolen data and in some cases let hackers take full control of devices. Solnik stressed that the threat to smartphone management software identified by Accuvant remained remote to average users and said that only a few dozen mobile communications experts in the world would currently be able to replicate the technique.
Recovering from a USB attack is extraordinarily difficult. "The USB thumb drive, from which the operating system is reinstalled, may already be infected, as may the hardwired webcam or other USB components inside the computer. A BadUSB device may even have replaced the computer's BIOS -- again by emulating a keyboard and unlocking a hidden file on the USB thumb drive, they added."
A pair of security researchers from SR Labs have uncovered a fundamental flaw in the way USB devices work. This firmware is present on every USB device within the controller chip - the component that facilitates communication between the USB device and the computer it's plugged in to.