Category: Software
-
Kaspersky Researcher Shows How He Hacked His Hospital While Sitting In His Car – fossBytes
Please note that he noticed the potential security risks inherent in the hospital’s system and medical equipment and got permission to run tests to expose the vulnerabilities. When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he/she uses. With advancement in technology, these equipment have become…
-
Uber tests out using smartphones to monitor driver behavior | Ars Technica
So, what could possibly go wrong? Is anyone else weirded out by this? Uber announced today that it will monitor some of its drivers’ behavior for things like excessive speeding or distracted driving. Starting with a trial in Houston, the program will use Uber drivers’ own smartphones to provide data to the company. The company will use a phone’s…
-
From Today Onwards, Don’t You Even Dare To Use Microsoft Internet Explorer | The Hacker News
From Today Onwards, Don’t You Even Dare To Use Microsoft Internet Explorer Are we prepared to play this out without setting any groundwork and without mitigating and reducing the consequences of an all-automated society? Yes, from today, Microsoft is ending the support for versions 8, 9 and 10 of its home-built browser Internet Explorer, thereby…
-
‘Ridiculous’ Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords
‘Ridiculous’ Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords If you have installed Trend Micro’s Antivirus on your Windows computer, then Beware. Your computer can be remotely hijacked, or infected with any malware by even through a website – Thanks to a critical vulnerability in Trend Micro Security Software. The Popular antivirus…
-
Pioneer In Internet Anonymity Hands FBI A Huge Gift In Building Dangerous Backdoored Encryption System | Techdirt
Rockin’ Encryption, Open Back Door… Few doubt Chaum’s cryptography skills or pedigree. He was instrumental in the early days of computer cryptography and what anonymity we have online today owes a lot to Chaum. But his latest plan is… troubling: At the Real World Crypto conference at Stanford University today, Chaum plans to present for…
-
Get A Glimpse Of The Cyber Threat Landscape For 2016 And Beyond | Hacked
Here’s a rundown of the cyber threat landscape for 2016 and beyond, courtesy of a report from Intel security. Coming In 2016 The 2016 predictions covers threats from ransomware, infrastructure attacks, attacks on automobile systems and the sale and warehousing of stolen data. • Hardware: Attacks on hardware and firmware will continue while the market…
-
Adobe to Kill ‘FLASH’, but by Just Renaming it as ‘Adobe Animate CC’ – The Hacker News
Adobe to Kill ‘FLASH’ by Just Renaming it as ‘Adobe Animate CC’ “What it won’t bring is: Fix for the number of security issues that have plagued Adobe Flash for years The platform has a new name, but the development tool lives on. So, Flash isn’t actually dead; it’s just renamed. “Adobe’s strategy is to…