Les Cnil européennes ont demandé à Yahoo d’expliquer en quoi, selon lui, le programme installé sur son service Yahoo Mail qui permettait de transférer automatiquement certains messages aux services de renseignement américains était conforme au droit européen.
Étiquette : vulnerability (Page 31 of 38)
The hacker who stole nude photos of female celebrities in 2014 has been sentenced to 18 months in federal prison, officials announced on Thursday.
Ryan Collins looks like Jennifer Lawrence ?
Not at all !
Source : Hacker who stole nude photos of celebrities gets 18 months in prison | Technology | The Guardian
Bryan Police Make DWI Arrest of 19 year old — — Rader after she collided with a parked patrol car last night. According to Rader she was sending photos through snapchat to her boyfriend. Rader was arrested for for DWI and bonded out on $2000 bond.
Source : City of Bryan Police Department
Law enforcement face recognition networks include over 117 million American adults
Source : Perpetual Line Up – Unregulated Police Face Recognition in America
Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.
Source : Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence – sources
The botnets are made up of tens of thousands of Internet of Things (IoT) devices, including unsecure routers, digital video recorders (DVRs) and connected IP cameras. Such IoT machines have been shown widely vulnerable to simple hacks, meaning the bot masters are easily able to build up vast networks of compromised systems to send extraordinary volumes of traffic to a chosen target.
Source : How Hacked Cameras Are Helping Launch The Biggest Attacks The Internet Has Ever Seen
A Computer Science student and security enthusiast from Netherlands who own a Xiaomi Mi4 smartphone started an investigation to know the purpose of a mysterious pre-installed app, dubbed AnalyticsCore.apk, that runs 24×7 in the background and reappeared even if you delete it.
Source : Xiaomi Can Silently Install Any App On Your Android Phone Using A Backdoor
La presse chinoise rapporte ainsi qu’un homme habitant dans les environs de Weifang a détruit physiquement quatre « récepteurs réseau de fibre optique », pour tenter de prévenir la diffusion d’une vidéo embarrassante, ou d’empêcher qu’elle puisse être vue par les riverains.
The USB Killer’s website claims it will destroy 95% of devices it’s inserted into. With that kind of destructive capability, one has to wonder how many of these sticks will actually be bought by security experts, and how many by pranksters and malicious individuals looking to destroy someone else’s equipment.
Source : Remember the laptop-destroying ‘USB Killer?’ Now you can buy one
La technique utilisée, qui consiste à jailbreaker l’iPhone depuis un simple lien ouvert sur un navigateur, rappelle très fortement la faille achetée 1 million de dollars en novembre 2015 par Zerodium, une société française créée par Chaouki Bekrar, qui avait publiquement offert une telle somme à qui lui fournirait la solution.
Source : Comment une faille de sécurité sur iOS permettait d’espionner des dissidents – Tech – Numerama