Tuesday, January 13th, 2015
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back all keystrokes from any Microsoft wireless keyboards (which use a proprietary 2.4GHz RF protocol) in the area.
Keystrokes are sent back to the KeySweeper operator over the Internet ...
Posted in Hardware, Internet, Mobile, Privacy, Security | No Comments
Sunday, January 11th, 2015
We installed the top 10 apps from Download.com, and you’ll never believe what happened! Well… I guess maybe you might have a good guess. Awful things. Awful things are what happens. Join us for the fun!
We’ve been railing against freeware download recommendations for years, and recently we taught you how ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, January 8th, 2015
Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, January 6th, 2015
For years, Chrome, Firefox, and virtually all other browsers have offered a setting that doesn't save or refer to website cookies, browsing history, or temporary files. Privacy-conscious people rely on it to help cloak their identities and prevent websites from tracking their previous steps. Now, a software consultant has devised ...
Posted in Internet, Privacy | No Comments
Sunday, January 4th, 2015
If you paid for the bulk of your holiday shopping with plastic, you may not be looking forward to your first statement of the new year but you can’t afford not to. The holidays are prime time for identity thieves who want to get their hands on your personal information, ...
Posted in Internet, Privacy, Security | No Comments