Posts tagged "tech"

DHS Is Funding a Boeing Project for Enhanced Biometrics to Be Used as a Means for Device Self-Destruction

DHS is funding a Boeing project for enhanced biometrics to be used as a means for device self-destruction after identifying it is no longer being used by its owner: The technology powering the devices potentially could identify the user’s walking style, for example. Officials would be alerted if the gait does not match the authorized… Continue reading

Shortsighted Federal Bureau of Investigation Considered Taking Apple to Court Over Encryption Fears

The shortsighted Federal Bureau of Investigation considered taking Apple to court due to their encryption capabilities built-in to iMessage, Facetime, and iOS devices: The clash with Cupertino was reportedly sparked by an investigation this summer — “involving guns and drugs” — in which a court order was obtained, demanding that Apple provide real time iMessages… Continue reading

Kali Linux 2.0 Top 10 Post Install Tips

If you are a penetration tester or just interested in the tools attackers use then chances are you are more than familiar with Kali Linux. The distro was recently updated to Kali Linux 2.0, and here are the top ten post-install tips designed to maximize your experience with this outstanding OS: There’s several ways you… Continue reading

IoT Working Group Crafts Framework for Security, Privacy

A tech industry working group convened and drafted an IoT security and privacy framework for locking down home automation, and consumer health and fitness wearable devices with standard security best practices: The framework calls for IoT makers to have the ability to fix bugs quickly and reliably via remote updates or other notifications to consumers… Continue reading

Commodore Is Back, This Time With an Android Smartphone Named PET

Commodore, the outstanding computer manufacturer I grew up with, is back and this time with a smartphone using their iconic name – PET: For those of you too young to remember, Commodore was a hot company in the mid-1980s. It was a leader in personal computers, shipping thousands of Commodore 64 desktops daily. Guinness has… Continue reading

This Story of How Yamaha Went All-in on Cloud Computing Should Terrify Hardware Vendors

Hardware vendors like Dell, HP, Cisco and others have a potentially bleak future ahead of them as more and more companies move from administering their own suite of servers to using cloud-based solutions like Amazon Web Services. This story about how Yamaha went all-in on AWS should terrify these companies because they stand to lose… Continue reading

Raspberry Pi-Based Tool Allows Anyone to Anonymously Access Wi-Fi From 2.5 Miles Away

This little gem of a Raspberry Pi-based tool allows anyone to anonymously access wifi from up to 2.5 miles away from a wireless access-oint: Proxyham is composed of a WiFi-enabled Raspberry Pi computer and three antennas setup. One of the antennas connects to a source public Wi-Fi network while the other two transmit the Wi-Fi… Continue reading

Clueless Japanese Judge Orders Google to Delete Links to a Man’s Previous Under-Age Sexual Solicitation Arrests

An obviously clueless Japanese Judge orders Google to delete links to a man’s previous under-age sexual solicitation arrests from the search engine in an attempt to hide his embarrassing past from the world: In 2012, the man was arrested for paying a girl under the age of 18 for sexual favors. He was charged with… Continue reading

Advertisement Masquerades as an Article About How the Cyber Security Industry Is a Billion Dollar Scam

The Next Web has posted what amounts to an advertisement masquerading as an article about how the cyber security industry is a billion dollar scam. The author claims cyber security vendors are purposely selling outdated technology it knows to be ineffective at preventing cyber attacks. First, the author sets the stage by claiming the the… Continue reading

FBI Hunting for Suspects in California Internet Backbone Cable-Severing Attack

Engadget on the FBI hunting for suspects in California internet backbone cable-severing attack (emphasis added): The severed cables belonged to backbone-internet companies Level 3 and Zayo. In order to access these cables, the vandals had to remove manholes and enter underground vaults. While the cut lines were fixed within a day, it does highlight how… Continue reading