Sneaky hackers use Intel management tools to bypass Windows firewall
Enlarge / Physical serial ports (the blue ones) are fortunately a relic of a lost era and are nowadays quite rare to find on PCs. But their virtual counterparts are alive and well, and they can be used for some exciting things. (credit: Ericf) When you’re a bad guy breaking into a network, the first problem you need to solve is, of course, getting into the remote system and running your malware on it. But once you’re...
Al-Jazeera claims to be victim of cyber attack as Qatar crisis continues
Enlarge / Qatari Foreign Minister Sheikh Mohammed bin Abdulrahman bin Jassim Al-Thani delivers a speech during a press conference. (credit: Mohamed Farag/Anadolu Agency/Getty Images) Two weeks after an alleged cyber attack on Qatar’s state news agency resulted in the publishing of a fake news story, the Qatari-funded broadcasting company Al-Jazeera claims that the company’s “websites and digital platforms” are...
Task force tells Congress health IT security is in critical condition
Health IT’s security problems run deep. (credit: Sean Gallagher) A congressionally mandated healthcare industry task force has published the findings of its investigation into the state of health information systems security, and the diagnosis is dire. The Health Care Industry Cybersecurity Task Force report (PDF), published on June 1, warns that all aspects of health IT security are in critical condition and that...
Theresa May's Call to Ban "Safe Spaces" Undermines Encryption—And Misses the Point
Governments need to focus on real-world solutions to terrorism.
How the Right and Left Saw James Comey's Senate Testimony Today
When former FBI director James Comey spoke, both sides of the political spectrum heard very different things.