Windows 10 Is Showing Ads On Your Lockscreen, Here’s How to Turn Them Off

Windows 10’s new Spotlight feature usually shows you neat photographs and fun facts when you first start your computer. Now, it’s started showing ads. Here’s how to turn it off. Source: Windows 10 Is Showing Ads On Your Lockscreen, Here’s How to Turn Them Off So not only is Windows invading your privacy with windows Read more about Windows 10 Is Showing Ads On Your Lockscreen, Here’s How to Turn Them Off[…]

NL Minister Blok takes flying leap from reality in criticism of open source

The minister states that he thinks (his vision is backed by a bunch of closed source software vendors [Microsoft, Oracle, SAP, KPN, CapGemini, Ordina, ATOS, CGI and IBM]) that not having to buy licenses is offset by the costs of having to manage and pay for the deployments of open source software (OSS). Which is Read more about NL Minister Blok takes flying leap from reality in criticism of open source[…]

Mousejack Attacks Abuse Vulnerable Wireless Keyboard, Mouse Dongles

The issue lies in the wireless USB dongles that the keyboards and mice use to communicate over radio frequencies with the host computer. Bastille says that while communication from most keyboards to the dongle is encrypted, none of the mice it tested encrypt their wireless communication. The dongle, therefore, will accept commands from an attacker Read more about Mousejack Attacks Abuse Vulnerable Wireless Keyboard, Mouse Dongles[…]

Companies Are Using Big Data to Discourage Employees From Having Costly Surgery

Do you work for a big company? Have you been having back pain? Your company probably knows about it already thanks to high-tech healthcare companies that it hired. Welcome to our brave new world of big data. Source: Companies Are Using Big Data to Discourage Employees From Having Costly Surgery They are using this to Read more about Companies Are Using Big Data to Discourage Employees From Having Costly Surgery[…]

glibc getaddrinfo stack-based buffer overflow – patch now

The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack. Google has found some mitigations that may help prevent exploitation if you are not able to Read more about glibc getaddrinfo stack-based buffer overflow – patch now[…]

Denuvo Anti-Piracy Tech stays good during the sales window of games, which is long enough

More than two months after release, it’s still not possible to pirate Just Cause 3. The same is true for Rise of the Tomb Raider, released for PC in late January. Cracking computer games used to be measured in hours or days, but now, it’s turning into weeks and months. The nature of piracy is Read more about Denuvo Anti-Piracy Tech stays good during the sales window of games, which is long enough[…]

Eternal 5D data storage could record the history of humankind for billions of years

Using nanostructured glass, scientists from the University’s Optoelectronics Research Centre (ORC) have developed the recording and retrieval processes of five dimensional (5D) digital data by femtosecond laser writing. The storage allows unprecedented properties including 360 TB/disc data capacity, thermal stability up to 1,000°C and virtually unlimited lifetime at room temperature (13.8 billion years at 190°C Read more about Eternal 5D data storage could record the history of humankind for billions of years[…]

Crims unleashed IRS-stabbing malware in bid to rob 464,000 people

Fraudsters, armed with stolen social security numbers and other personal information on nearly half a million people, used malware to systematically request PINs corresponding to those taxpayers, allowing the crooks to potentially file paperwork on their behalf. The swindlers could put their own bank account details on the tax returns, thus channelling people’s rebates into Read more about Crims unleashed IRS-stabbing malware in bid to rob 464,000 people[…]

Google retires Picasa for Photos, no desktop alternative in sight

As of March 15, 2016, we will no longer be supporting the Picasa desktop application. For those who have already downloaded this—or choose to do so before this date—it will continue to work as it does today, but we will not be developing it further, and there will be no future updates. If you choose Read more about Google retires Picasa for Photos, no desktop alternative in sight[…]

Adobe Creative Cloud update deletes first file in directories. Kills backups.

How about this for bizarre bug of the week: the latest version of Adobe Creative Cloud deletes the first hidden directory in root directories on Macs. That’s bad news for users of BackBlaze: the backup software stores a .bzvol folder in the top level of every drive it backs up, and uses these folders to Read more about Adobe Creative Cloud update deletes first file in directories. Kills backups.[…]

GCHQ hacking phones and computers is legal, says top UK court

Computer, smartphone and network hacking by UK intelligence agency GCHQ is legal, a security tribunal has said. The Investigatory Powers Tribunal ruled on Friday that computer network exploitation (CNE) – which can include remotely activating microphones and cameras on electronic devices such as iPhones without the owner’s knowledge – is legal. The case, which was Read more about GCHQ hacking phones and computers is legal, says top UK court[…]

Vodafone network allows you to copy yourself into someone elses conversation

The Vodafone network does not generate random TMSI numbers, which allows you to copy them and thereby listen in to other ongoing conversations. The network won’t throw off duplicates. If you have an IMSI catcher you can exploit this. It does, however, put the phone into conference call mode, which shows up on the screen. Read more about Vodafone network allows you to copy yourself into someone elses conversation[…]

The size of your pupil shows which letter you are reading

We present a new human-computer interface that is based on decoding of attention through pupillometry. Our method builds on the recent finding that covert visual attention affects the pupillary light response: Your pupil constricts when you covertly (without looking at it) attend to a bright, compared to a dark, stimulus. In our method, participants covertly Read more about The size of your pupil shows which letter you are reading[…]

NASA announces that Pluto has icebergs floating on glaciers of nitrogen ice

The most recent finding from New Horizons show that ice bergs have broken off from the hills surrounding the Sputnik Planum, a glacier of nitrogen ice, and are floating slowly across its surface, eventually to cluster together in places like the Challenger Colles, informally named after the crew of the space shuttle Challenger, which was Read more about NASA announces that Pluto has icebergs floating on glaciers of nitrogen ice[…]

Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks

Today at the Security Analyst Summit, researchers from Kaspersky Lab Global Research & Analysis Team unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more Read more about Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks[…]