Tuesday, January 13th, 2015
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back all keystrokes from any Microsoft wireless keyboards (which use a proprietary 2.4GHz RF protocol) in the area.
Keystrokes are sent back to the KeySweeper operator over the Internet ...
Posted in Hardware, Internet, Mobile, Privacy, Security | No Comments
Thursday, November 6th, 2014
A piece of Apple-focused espionage malware dubbed WireLurker has been uncovered that, unlike most iPhone bugs, can compromise even non-jailbroken iOS smartphones and tablets—potentially putting 800 million devices at risk.
Apple operating systems, once seen as a more secure alternative to Windows and Android, have been faced with increasing numbers of ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Wednesday, November 5th, 2014
In the face of widespread Internet surveillance, we need a secure and practical means of talking to each other from our phones and computers. Many companies offer “secure messaging” products—but are these systems actually secure? We decided to find out, in the first phase of a new EFF Campaign for ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Wednesday, September 17th, 2014
Researchers are warning Android users of a major vulnerability that impacts a vital browser security mechanism called Same-Origin Policy (SOP).
The bug – called a “privacy disaster” by Tod Beardsley, an engineering manager at Rapid7 who blogged about the issue Monday – is serious because SOP, “the cornerstone of web privacy,” ...
Posted in Mobile, Privacy, Security | No Comments
Tuesday, September 2nd, 2014
If you haven’t been following the most recent news regarding a wide swath of celebrities whose accounts were hacked and private photos shared, you must have been having a lot of fun on Labor Day and I salute you.
Probably the very first thing most of the victimized celebrities are doing ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Page 3 of 8«12345...»Last »