Post Profile

US cyberweapons have been stolen and there’s nothing we can do

Malicious code exploits are the new weapons of war, but can we ever reach international agreement on how they should be used and who gets to control them?
read more


Related Posts

PS4 4.05 Kernel Exploit Released, Full Jailbreak Round the Corner

Internet / File Sharing : TorrentFreak

Developer Specter has just released a much-anticipated kernel exploit for Playstation 4. Published on Github two hours ago, the exploit states that it does not contain any code related to defeating anti-piracy mechanisms or running ...

Attack by subtitles: Media player exploit grants hackers access to your system

Technology : The Next Web Blog

Better watch out where you download your subtitles from: It turns out attackers can infect subtitles with malicious code to exploit vulnerabilities in popular media players and take control of your device Researchers from security f...

AtomBombing: Zero-Day Windows exploit

Technology :

Ensilo security researchers have discovered a new zero-day exploit in Windows that attackers can make use of to inject and execute malicious code. The researches call the exploit AtomBombing because of its use of a Windows function ...

NewsFlash: Star Wars? ---ISS Control Codes on Stolen NASA Laptop

Academics / Astronomy : The Daily Galaxy

A laptop, which was not encrypted, was stolen from NASA last year contained command codes used to control the International Space Station, an internal investigation revealed. The laptop was among dozens of mobile devices lost or sto...

U.S. Firms Fight Global Cyberweapon Deal

Technology : Tech -

An international effort to prevent cyberweapons from reaching malicious regimes is at risk of coming apart amid objections from U.S. companies who claim it would upend the way they use and sell legitimate spyware.


Copyright © 2016 Regator, LLC