Google confirms that the next Android versions will use Oracleâs open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android. The company is planning to adopt as an alternative an open source solution. What is this OpenJDK? It is an […]
The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small drones are another powerful tool used by the US Department of Homeland Security to monitor its borders, but drug traffickers already adopting countermeasures. In order to avoid surveillance, drug traffickers are hacking US […]
The US Department of Corrections discovered a long-standing software bug that resulted in the early release of prisoners. This news is disconcerting and demonstrates the importance to carefiĂŹully consider the technology in our lives. The Washington State Department of Corrections (DoC) launched an investigation after it early released 3,200 prisoners over the course of 13 years. It […]
Adobe has released security patches for Adobe Flash Player to fix critical vulnerabilities that could be exploited to take control of the affected system. Adobe released an emergency patch for Flash Zero-Day (CVE-2015-8651) that is currently being exploited in targeted attacks. The out-of-band security update issued on Monday fix a number of security vulnerabilities that could be exploited […]
The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the systemâs ,proximity. The collected […]
Fabian Wosar, security researcher at Emsisoft, created a tool for decrypting files locked by the Gomasom Ransomware. Ransomware are the most threatening cyber threats for end-users, but today I have a good news for victims of the Gomasom ransomware, victims can rescue their locked files. The news was spread by the security researcher Fabian Wosar that developed a […]
Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devices to spy on individuals. Lack of security by design and poor security settings could open the door to hackers. A Smartwatch or a fitness tracker […]
Liz Upton from the Raspberry Pi Foundation made a shocking revelation, someone has offered cash to install a malware into its tiny computers. The Raspberry Pi Foundation made a shocking revelation, someone has offered cash to install a malware into its tiny computers. Yes, the news is unbelievable, but Liz Upton, the Foundation’s director of communications, disclosed the […]
Microsoft declared war to Ad injection and âman-in-the-middleâ techniques implemented by both malware and legitimate programs including adware. Superfish adware was found already installed on new Lenovo portable PCs (laptops) earlier this year. The malware opens users to MITM (man in the middle) assaults in view of the way it infuses ads into web browsers. […]
The security expert Ariel Sanchez presented the results of the test conducted on 40 iOS banking apps, comparing them to the ones obtained 2 years ago. The banking industry is looking with an increasing interest in mobile platform, financial institutes are offering a growing number of services accessible through mobile devices, but what about security? The security […]