Browsing Category: Uncategorized

Researchers Demo TAILS Flaw Exploit, Disclose Details to Developers

The critical vulnerability in the TAILS operating system discovered by researchers at Exodus Intelligence lies in the I2P software that’s bundled with the OS and the company has released some details and a video demonstrating an exploit against the bug.

Read more...

Flash Zero Day Used to Target Victims in Syria

A couple days after Microsoft warned users about a new vulnerability in Internet Explorer that’s being used in targeted attacks, Adobe on Monday said that researchers have discovered a zero day in Flash, as well, which attackers are using to target victims in Syria through a watering hole attack on a compromised Syrian government site.

Read more...

Gaming Platform Settles on Bitcoin Mining Malware Allegations

Categories: Malware, Privacy, Uncategorized

The ESEA League, an online competitive gaming community, has decided to settle with the state of New Jersey after the active Attorney General there alleged that the gaming community operator infected user-machines with malware designed to mine for Bitcoins.

Read more...

Surveillance Infrastructure Showing Signs of Decay

Categories: Uncategorized

Buried underneath the ever-growing pile of information about the mass surveillance methods of the NSA is a small but significant undercurrent of change that’s being driven by the anger and resentment of the large tech companies that the agency has used as tools in its collection programs. The changes have been happening since almost the[...]

Read more...

Senate Debates Surveillance Transparency Act of 2013

Categories: Government, Uncategorized

Washington D.C. – Senator Al Franken presided over a hearing today in which lawmakers and technology experts discussed the National Security Administration’s surveillance practices, examining a proposed bill that would require that the U.S. spy agency carry out its operations in a more transparent fashion.

Read more...