jeudi 23 mars 2017

WikiLeaks' Dark Matter documents reveal CIA hacks for Macs and iPhones

It's only a couple of weeks since WikiLeaks unleashed the first batch of its Vault 7 CIA documents, revealing the agency's spying and hacking capabilities. Now the organization has released a second cache of files dubbed Dark Matter, and they show that the CIA has developed tools for hacking Apple products. Bold and exciting names like Sonic Screwdriver, DerStarke, Triton and DarkSeaSkies are the monikers given to attack the firmware of MacBooks and iPhones. What's particularly interesting about the documents is that they appear to show that the CIA had the ability to exploit Apple hardware and software a full… [Continue Reading]


How to create your first Alexa skill

For the last couple of weeks, Graham, Marcel, Sinem and I, from Red Badger, have been experimenting with Amazon’s Alexa Echo Dot. An Electric Hockey Puck that uses voice recognition powered by Amazon Alexa voice assistant. In this post, I’d like to explain how one goes about creating their first Alexa skill. Unboxing The first thing we need to do after unboxing is to download the Alexa app from respective app store. Follow the instructions to connect it to WiFi. Once connected, Alexa should be ready and listening for requests, questions or commands. One caveat By the time of writing… [Continue Reading]


eBay now recommends mobile over token-based two-factor authentication -- should you switch?

Two factor authentication strikes the right balance between convenience and security, which is why so many services offer it nowadays. But its implementation differs. Many companies have SMS or app-based systems, others prefer tokens, and some offer both as an option. eBay falls in the third category, allowing users to receive the security code for the second authentication stage via SMS or a token. However, the company is now recommending users switch to the former method, touting its convenience as the main reason to abandon the token. But, should you take the advice? SMS-based authentication is, indeed, more convenient. Most… [Continue Reading]


CORSAIR ONE Intel Kaby Lake-powered VR-Ready gaming PC is small, powerful, and pricey

If you are a PC gamer, there is a good chance that you enjoy building your own computers. After all, building them yourself guarantees that you select every single component that goes inside. Not only can you pick the parts from a performance perspective, but aesthetically too -- for some folks, looks matter. While a self-built gaming rig can be rewarding, it can be an expensive headache too. If something goes wrong, you have to reach out to each component manufacturer for support and warranty purposes. Alternatively, when you buy a pre-built machine, you have a single company to contact. Today,… [Continue Reading]


US companies start to pull ads from Google and YouTube over extremist content controversy

Last week saw the start of a backlash against Google after advertisers voiced concern that their ads were appearing next to extremist content. The Guardian, the BBC and the British government were among the first to start to pull their ads from the network, and the trend has spread to the US. AT&T and Verizon are among American companies that have now announced that they are boycotting YouTube by pulling their ads. After concerns about being associated with terrorist and other extremist content, an increasing number of big names are calling on Google to make guarantees about ad placement. In… [Continue Reading]


New generation of cyber highwaymen could threaten parcel drones

Robbing the mail has a long and dishonorable history dating back to the days of the stagecoach. But UK-based online parcel broker ParcelHero is warning that automated delivery drones and droids could see the rise of a new breed of high-tech highwaymen. The development of devices that alter the drone or droid's instructions, or simply stop them dead, is seen as inevitable. With UK online retail sales now worth more than £130 billion a year, if deliveries are to become largely automated and just one percent of items are waylaid using new technology, that's over £1bn of goods stolen a… [Continue Reading]


Apple: iCloud is safe, but your passwords may not be

A group of hackers that goes by the name Turkish Crime Family, claims to have access to hundreds of millions of iCloud accounts, and it wants Apple to pay $75,000 in Bitcoin or Ethereum or $100,000 in iTunes gift cards to delete the compromised credentials. This may lead one to believe that the collective has managed to hack iCloud, but according to Apple there "have not been any breaches" in any of its systems. "The alleged list of email addresses and passwords appears to have been obtained from previously compromised third-party services." That's something that probably shouldn't surprise anyone nowadays,… [Continue Reading]