Source: FBI to gain expanded hacking powers as Senate effort to block fails | Reuters
Category Archives: Security
Newly discovered router flaw being hammered by in-the-wild attacks | Ars Technica
Researchers detect barrage of exploits targeting potentially millions of devices.
Source: Newly discovered router flaw being hammered by in-the-wild attacks | Ars Technica
Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica
At one point, Avalanche network was responsible for two-thirds of all phishing attacks.
Source: Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica
NSA could put undetectable “trapdoors” in millions of crypto keys | Ars Technica
Technique allows attackers to passively decrypt Diffie-Hellman protected data.
Source: NSA could put undetectable “trapdoors” in millions of crypto keys | Ars Technica
“Most serious” Linux privilege-escalation bug ever is under active exploit (updated) | Ars Technica
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
Source: “Most serious” Linux privilege-escalation bug ever is under active exploit (updated) | Ars Technica
There’s a new way to take down drones, and it doesn’t involve shotguns | Ars Technica
Not a jammer, device lets hackers fly drones and lock out original pilot.
Source: There’s a new way to take down drones, and it doesn’t involve shotguns | Ars Technica
How to block the ultrasonic signals you didn’t know were tracking you | Ars Technica
Your phone can talk to advertisers beyond your back, beyond your audible spectrum.
Source: How to block the ultrasonic signals you didn’t know were tracking you | Ars Technica
How Can I Keep Passwords Invisible When Running a Command as an SSH Argument?
Keeping our passwords well secured is something that we all need to take seriously, but what do you do if a particular program or app displays your password in plain sight as you are typing it? Today’s SuperUser Q&A post has the solution to a frustrated reader’s password problem.
Source: How Can I Keep Passwords Invisible When Running a Command as an SSH Argument?
Zombie Crapware: How the Windows Platform Binary Table Works
Few people noticed at the time, but Microsoft added a new feature to Windows 8 that allows manufacturers to infect the UEFI firmware with crapware. Windows will continue installing and resurrecting this junk software even after you perform a clean-install.
Source: Zombie Crapware: How the Windows Platform Binary Table Works
The History of SQL Injection, the Hack That Will Never Go Away | Motherboard
Over 15 years after it was first publicly disclosed, SQL injection is still the number one threat to websites.
Source: The History of SQL Injection, the Hack That Will Never Go Away | Motherboard










