D-Link router security vulnerability discovered in several models

D-Link has been making routers and modems for Internet users for a long time and holds a significant portion of market. Several routers produced by D-Link have been discovered to have a critical security vulnerability. The vulnerability was posted to a website dedicated to embedded device hacking and was discovered by reverse engineering a firmware […]

Edward Snowden Whistleblower Award reception video released by WikiLeaks

WikiLeaks has posted six videos of former NSA analyst Edward Snowden receiving the Sam Adams Award for Integrity in Intelligence on Oct. 9, 2013. The appearance is one of very few for Snowden after leaking classified documents about US and UK mass spying programs in May. The annual award is given to former US intelligence […]

Britain’s Colorful Burglar Alarms Are Oddly Mesmerizing

Britain's Colorful Burglar Alarms Are Oddly Mesmerizing

When you think of iconic graphic design, you might think of magazine ads or highway signs or even design-centric companies like American Airlines. You almost certainly don’t think of burglar alarms. But maybe you should.

Read more…


    



Samsung biometric security acquisition scam prompts fraud investigation

Fake confirmations of Samsung buying a Swedish fingerprint biometrics company have prompted a fraud investigation, after a bogus press release claiming a $650m deal had gone ahead was released. According to the statement, put out on press distributor Cision earlier today, Samsung had acquired Fingerprint Cards in a fully cash deal; however, both Samsung and […]

Synaptics acquires Validity to enter fingerprint ID market

Biometric Fingerprint Authentication solutions group Validity have been announced this afternoon to have been acquired by human interface solutions group Synaptics. This acquisition will have the two growing companies aim for a new more solid goal in creating a full, top-to-bottom experience for tablets, smartphones, and notebook PCs. Technology developed by Validity will soon be […]

Floating Touchscreen Displays Keep ATM Screens Invisible To Others

If this next-generation display technology developed by Asukanet ever goes past the concept stage, the days of huddling over an ATM display to block your balances from prying eyes could be over. With a viewing angle of just plus or minus 20 degrees, the Aerial Imaging Plate has a very specific sweet spot that ensures your private info stays private.

Read more…


    



Samsung Galaxy fingerprint scanner up next: Note 3 nearly supplied

The Samsung Galaxy Note 3 works with a variety of next-generation abilities, most of them based in its unique S Pen technology – one thing it doesn’t have (but almost did) is a fingerprint scanner. Currently rolling out with the iPhone 5s with Touch ID and quite likely appearing on the HTC One Max, the […]

Navy Seals? Furry Fighters In The Russian Military

Russian Military SealU.S. Navy SEALs are some of the most feared individuals in the military world. But would you stand up against Navy Seals in the Russian Seas?

How the Bible Is Helping Crack Your Passwords

How the Bible Is Helping Crack Your PasswordsThe Bible might not be quite the good book it claims to be. According to an Ars Technica report on the future of password cracking, the holy book is being employed to help crack passwords to great effect.

Read more…


    



How The NSA Deploys Malware

How The NSA Deploys Malware

We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it’s important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

Read more…