Microsoft breaches Dutch data protection law with Windows 10

Microsoft breaches the Dutch data protection law by processing personal data of people that use the Windows 10 operating system on their computers. This is the conclusion of the Dutch Data Protection Authority (DPA) after its investigation of Windows 10 Home and Pro. Microsoft does not clearly inform users about the type of data it [...]

Advertisements

Bad Rabbit Ransomware Outbreak Also Used NSA Exploit

Two days after the Bad Rabbit ransomware outbreak has wreaked havoc in Russia and Ukraine, security researchers are still unearthing details regarding the malware's modus operandi. While initially it was believed that the ransomware spread from the initial victim to nearby computers using a custom scanning mechanism that relied on the SMB protocol, new research [...]

Defcon hackers find it’s very easy to break voting machines

When the password for a voting machine is "abcde" and can't be changed, the integrity of our democracy might be in trouble. The Advanced Voting Solutions WinVote machine, dubbed "America's worst voting machine," came equipped with this simple password even as it was used in some of the country's most important elections. AVS went out [...]

CIA malware for hacking Linux computers

The CIA has developed strains of malware specifically designed to target Linux computers. The existence of the malware, known as OutlawCountry, was revealed by WikiLeaks. It demonstrates the CIA is intent on accessing all kinds of computer system. Generally, mainstream malware attacks tend to focus on consumer-oriented operating systems like Windows. It's rare that Linux [...]

Even a mask won’t hide you from the latest face recognition tech

Ditch the hat and scarf – it’s not fooling anyone. Face recognition software can now see through your cunning disguise – even you are wearing a mask. Amarjot Singh at the University of Cambridge and his colleagues trained a machine learning algorithm to locate 14 key facial points. These are the points the human brain [...]

The GNU General Public License version 3 celebrates its tenth birthday

Ten years ago today heralded the release of the GNU General Public License version 3. Through several iterations over two years, public drafts enabled the community to develop a license that better addressed the changing software freedom landscape. From Tivoization, to the Digital Millennium Copyright Act, to the rise of software patents, many threats to [...]

CIA targeting Gnu/Linux users with OutlawCountry malware

Wikileaks which is known for exposing corruption within governments and corporations, has released a massive data dump which included some interesting news about what the CIA has been up to recently. According to the leak, the CIA has targeted Gnu/Linux users, with an exploit that re-routes network traffic towards them for analysis. The exploit called [...]