17 hrs ago
Re: Differences of Hotknot and NFC
You point out good points. As we see a number of applications emerge, we may be facing the diverging near field standards... I agree, Jim.
Trending on the Topix Network
Fri Mar 14, 2014
New NSA Slides Reveal Tailored Access Run Amok
The NSA has seen the future of mass surveillance, and it appears they believe that the future lies in malware.
NSA Denies Allegations that it Infected Millions of PCs with Malware
The NSA has not infected millions of computers with malware, it said in a statement on Thursday.
NSA Large Scale TURBINE Malware Also Target Sysadmins
This time they detail a huge malware infection system created for widespread infections, it seems fairly advanced with the ability to spit out different types of malware depending on the target.
Thu Mar 13, 2014
NSA's Malware Methods Outed in Latest Leak
The latest report from the top-secret documents that former National Security Agency contractor Edward Snowden made off with describes the agency's efforts to infect and monitor PCs much in the way ordinary hackers do.
Zuckerberg 'frustrated' by US spying
The 29-year-old said in a blog post the US government "should be the champion for the internet, not a threat".
Backdoor Opens Samsung Galaxy Users to Danger
Black-hat security researchers with malicious intentions that want to launch real attacks can acquire the technology necessary for this attack on a Samsung Galaxy device for less than $1,000, making this a realistic threat for corporate espionage or could be used in a variety of other targeted attacks using a Samsung Galaxy device's modem.
Wed Mar 12, 2014
NSA And British Intelligence Impersonating Facebook, Hijacking Adbots ...
Newly released documents indicate that the NSA is masquerading as Facebook to hijack millions of computers worldwide with spyware... and that the surveillance agency is also piggybacking on commonly used adbots to infect computers worldwide with programs that let spies activate webcams and microphones.
Patent Issued for Apparatus for Blocking Malware Originating inside and outside an Operating System
"Any part of a computer under the control of a user can be appropriated by malware when a user installs software on the computer.
Report: NSA Has Plans To Infect "Millions" Of Computers With Malware
The National Security Agency reportedly has plans to control millions of computers by infecting them with malware, according to documents leaked to The Intercept by NSA whistleblower Edward Snowden.
NSA schemes mass internet infection and fake Facebooks
An NSA project to install spying malware on "millions" of computers around the world, dubbed TURBINE, could allow the clandestine US agency unprecedented access to "industrial-scale exploitation" in the battle for internet dominance.
Mon Mar 10, 2014
Russian spyware targets US, Europe
Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the US military uncovered in 2008.
International Business Times
Critical Windows And IE Vulnerabilities: Microsoft to Dispatch...
Security Bulletin Advance Notification , there will be a total of five updates released this week, two of them addressing "critical" vulnerabilities.
The Time Finder
Browser and Web Safety-A Timely Tool
Browser and web safety are important considerations if you are an internet-based business - or really if you are any user of the internet.
Sat Mar 08, 2014
New 'Facebook' scam infects millions
Viral Facebook hoaxes come in all different emotional flavors, trying to tug at your heart strings, tempt your adventurous side by daring you to look, or fueling the flames of your anger and frustrations.
Fri Mar 07, 2014
Microsoft to end XP support
The sirens are wailing and decision day is rapidly approaching for owners of the 300,000 computers in New Zealand that still run Windows XP.
German Firm Uncovers Russian Cyberespionage Spyware
A rootkit designed to take complete control of an infected system is believed to be one of the tools used in a cyberespionage campaign conducted by intelligence-gatherers in Russia against U.S. organizations and their allies.
Black Hat Asia 2014: Dangers of hacking IoT devices
We all know that computers can be hacked and so three presentations at Black Hat Asia 2014 in Singapore later this month on the dangers of hacking internet-enabled hardware will be of specific interest to anyone developing IoT technology.
INSIGHT-Suspected Russian spyware Turla targets Europe, U.S.
A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date.