Generations of hobbyists hardware hackers have spent countless hours messing with piles of radio gear, happily tinkering away in garages and basements looking for new ways to connect to people around the world. Now, a researcher has put together a new radio called HackRF that is a kind of all-in-one hacker's dream with functionality to intercept and reverse-engineer traffic from a wide range of frequencies and sources.HackRF is the work of Michael Ossmann of Great Scott Gadgets, and the idea behind the project was to build a multipurpose transceiver that a user could attach to his computer and use as a "software-defined radio". Ossmann has released
Apple has released a fix for a vulnerability in its Remote Desktop product that could result in sensitive data not being encrypted, even when users have the product configured to send all data in encrypted form. The vulnerability can lead to information leakage and Apple says the issue affects versions 3.0 and later.
The vulnerability in Apple Remote Desktop is fixed by adding an SSH tunnel to the connection, which wraps the connection in an encrypted tunnel.
"Connecting to a third-party VNC server with 'Encrypt all network data' set may lead to information disclosure Description: When connecting to a third-party VNC server with
Oracle last week patched the two zero-day vulnerabilities in Java that attackers had been exploiting in targeted attacks, but it didn't take long for researchers to poke more holes in the software. A new bug that allows a complete Java sandbox escape has ben identified already, the latest in what has become a long line of flaws haunting the Java software running on hundreds of millions of machines.Ada Gowdiak, a researcher at Security Explorations, a Polish firm that said it sent more than a dozen security vulnerabilities in Java to Oracle several months ago, said that upon downloading and inspecting the Java 7 update 7 file, he found that one
Windows 8 isn't yet a week old, but the scammers and phishing crews already are taking their swings at it, setting up new campaigns based on the shiny new operating system. Security researchers have identified a new scareware campaign playing off of the Windows 8 launch, as well as a phishing email trying the same tack.The public release of Windows 8 was just last Friday, Oct. 26, and most people probably haven't even seen the OS in person yet. But that's not stopping the scammers from trying to make a buck off the back of Microsoft's work. This shouldn't come as a surprising development, given that these crews use virtually every major news
A nasty new piece of malware that has the ability to steal money from users' via fraudulent SMS payments has shown up in a Chinese Android market and researchers say it's infected more than 500,000 victims. The SMSZombie malware is being hidden inside apps on the app market and once it's on a device it has the ability to prevent users from uninstalling it.
The SMSZombie malware targets Android devices and uses a flaw in the SMS payment system used by China Mobile to forward payments to the attacker without the user's knowledge. Researchers at TrustGo, a mobile security company, found that the malware is hiding inside of various
- Information Streams - Going Beyond the Activity Stream - E2 Conference Boston
- How to Choose a SaaS Vendor - E2 Conference Boston
- The E2 Social Business Leaders - E2 Conference Boston - E2 Conference Boston
- Mobile Connect - E2 Conference Boston - E2 Conference Boston
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
- Building a Hybrid Cloud in Government: It's not that Complicated
- Mobile DevOps: Achieving continuous delivery with multiple front ends and complex backends in Banking, Financial Services, and Insurance
- Maximize the benefits of virtualization for greater ROI
- Cloud Security: It’s Not Just for IT Anymore
- How Cloud Facilitates an Agile Contact Center
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue