Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

PRISM-proof system could turn servers into spook-proof fortresses

A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.

Sniffing earwax could offer icky new frontier in biometrics

For most of us, earwax is a bodily product we prefer not to think about, but a team of scientists have discovered that the substance reveals a huge amount about its creator – and could even be used to identify people.

Tumblr adds “nuclear defense system” (well, 2FA) to shield users

Popular blogging service Tumblr has become the latest web giant to add two-factor authentication as an “extra layer” of security for users – describing its new measure as a “nuclear defense system” armed with twin keys.

Mark Zuckerberg invests in CAPTCHA-crushing AI which “thinks like a human”

Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already ‘read’ CAPTCHA codes – and aims to mimic functions of the human brain.

President Obama’s BlackBerry survives assault from Korean Androids

Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.

Bitcoin fixes Mt Gox theft bug – as exchange staff find 200,000 BTC in ‘forgotten’ wallet

Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is said to have brought down the Mt Gox exchange – and Mt Gox staff have ‘found’ 200,000 BTC in an abandoned wallet in the exchange.

Google encrypts ALL Gmail to keep snoopers out

Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service – and will use security measures when moving mails internally, citing fears over government snooping.

Master of Mavericks: How to secure your Mac using Apple’s latest update

Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk

Stealth malware sneaks onto Android phones, then “turns evil” when OS upgrades

A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS – allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.

Target breach optioned as Sony feature film

The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as a feature film by Sony. The studio bought the rights to the New York Times article, “Reporting From the Web’s Underbelly,” with a view to creating a “cyber thriller.”

Facebook’s ‘Deepface’ photo-matching is nearly as good as human brains

Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings – a huge leap forward in the technology, with some potentially alarming implications for privacy.

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Revenue Service breach may have leaked data on 20,000 employees

Personal data for around 20,000 workers for the U.S. Internal Revenue Service (IRS), including names, social security numbers and addresses may have been exposed, after an employee plugged a thumb drive into a computer on an unsecured home network.

More than 80% of business leaders feel “unprepared” for cyber incidents

More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a new survey by the Economist Intelligence Unit – despite 77% of companies having faced such incidents in the past two years.

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

“You have cancer” phishing attack shows how low cybercriminals will go

A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.

New wearable from makers of Pine smartwatch aims to be “key to everything”

A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in wearable technology, including the creators of the Neptune Pine smartwatch – one of the only wearable devices to work independently of smartphones.

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 – but there is no video, and it’s a criminal scam.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.