Chrome Extension Thwarts User Profiling Based On Typing Behavior

Per Thorsheim, the founder of PasswordsCon, created and trained a biometric profile of his keystroke dynamics using the Tor browser at a demo site. He then switched over to Google Chrome and not using the Tor network, and the demo site correctly identified him when logging in and completing a demo financial transaction.… Read More »

Posted on 28 July 2015 | 9:48 am

Your Stolen Identity Goes For $20 On the Internet Black Market

At Quartz that the going rate for a stolen identity is about twenty bucks on the internet black market. Collins analyzed hundreds of listings for a full set of someone's personal information—identification number, address, birthdate, etc., known as "fullz" that were put up for sale over the past… Read More »

Posted on 28 July 2015 | 8:46 am

OnePlus Announces OnePlus 2 'Flagship Killer' Android Phone With OxygenOS

The OnePlus 2 was officially unveiled [Monday] evening and it has been announced that the smartphone will start at an competitively low $329, unlocked and contract free. The entry level price nets you a 5.5" 1080p display, a cooler-running 1.8GHz Qualcomm Snapdragon 810 v2.1 SoC paired with 3GB of RAM, 16GB of internal storage, a… Read More »

Posted on 28 July 2015 | 7:59 am

Currently Quantum Computers Might Be Where Rockets Were At the Time of Goddard

If quantum computing is at the Goddard level that would be a good thing for quantum computing. This means that the major fundamental breakthrough that would put them over the top was in hand and merely a lot of investment, engineering and scaling was needed. The goal of being able to solve NP-hard or NP-Complete problems with… Read More »

Posted on 28 July 2015 | 7:14 am

Air-Gapped Computer Hacked (Again)

Researchers from Ben Gurion University managed to extract GSM signals from air gapped computers using only a simple cellphone. According to Yuval Elovici, head of the University’s Cyber Security Research Center, the air gap exploit works because of the fundamental way that computers put out low levels of… Read More »

Posted on 28 July 2015 | 6:28 am

Hacker Set To Demonstrate 60 Second Brinks Safe Hack At DEFCON

Ok so we know that Chrysler cars will be hacked at Black Hat, Android will be hacked at DEFCON with Stagefright, and now word has come out that a pair of security researchers plan on bringing a Brinks safe onstage at DEFCON to demonstrate how it can be digitally hacked. No this isn't some kind of lockpick, but rather a digital… Read More »

Posted on 28 July 2015 | 4:35 am