This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins’ kidnappers used anonymous remailers, image sharing sites, Tor, and other people’s Wi-Fi to communicate with the police and the media, scrupulously scrubbing meta data from photos before sending.
Yesterday, the New York Stock Exchange (NYSE) stopped trading, United Airlines grounded thousands of flights, and the Wall Street Journal site went down all due to computer and network related issues.
Last week, I talked about a Flash 0day vulnerability that attackers were only exploiting in limited, targeted attacks. This week, the vulnerability has been added to popular exploit kits, so I expect it to become more popular. Watch today’s video to learn more about it.
New research : In “Brainprint,” a newly published study in academic journal Neurocomputing , researchers from Binghamton University observed the brain signals of 45 volunteers as they read a list of 75 acronyms, such as FBI and DVD. They recorded the brain’s reaction to each group of letters, focusing on the part of the brain associated with reading and recognizing words, and found that participants’ brains reacted differently to each acronym, enough that a computer system was able to identify each volunteer with 94 percent accuracy
Admiral Mike Rogers gave the keynote address at the Joint Service Academy Cyber Security Summit today at West Point. He started by explaining the four tenets of security that he thinks about
This video demonstrates how McAfee Threat Intelligence Exchange protects you from ransomware like CryptoLocker, Teslacrypt, and PDFcrypt. The key technologies used are McAfee Threat …