Schlagzeilen |
Dienstag, 05. Juli 2016 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

A man who told police he feared surveillance by Google has been arrested and charged with arson after one of the company's self-driving cars was destroyed in an attack in June. Raul Murillo Diaz of Oakland was stopped by police after Google security spotted him driving around the company's headquarters campus in Mountain View, California, just after midnight on June 30. They became suspicious because his car matched that spotted at the scene of several attacks on the company over the preceding six weeks. The first, on May 19, saw several

The world's newest mobile telecoms network went into operation this week, but it's not for smartphones. The network, built by South Korea's SK Telecom, is dedicated to gadgets that connect to the so-called internet of things. Today, most of those devices communicate over Bluetooth or WiFi, which are low power but short range, or over conventional cellular, which has better coverage but is more expensive and consumes more power.

Hillary Clinton was "extremely careless" in her use of a private email server while she was U.S. secretary of state, but the FBI isn't recommending any charges be brought against her for mishandling classified information. Speaking to reporters on Tuesday morning, days after the U.S. Federal Bureau of Investigation interviewed the presidential candidate, FBI Director James Comey said his investigation had uncovered numerous instances of the system being improperly used for classified information. He also said it was impossible to rule out the possibility that the system could have been hacked. The controversy was thought to revolve around a single server, but Comey disclosed that over the years Clinton was secretary of state, she relied on a string of email servers. When new ones were installed, the older ones were removed but data was not always deleted.

Reading your favorite website may be a whole new experience in the near future. As part of its Chromium project Google is apparently working at bringing virtual reality support to its browser. According to Google’s  There’s an an experimental flag found at Virtual reality is likely to gain wider traction with Google’s browser.

A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors, including HP and Gigabyte Technology. An exploit for the vulnerability was published last week and can be used to execute rogue code in the CPU’s privileged SMM (System Management Mode). This level of access can then be used to install a stealthy rootkit inside the computer’s Unified Extensible Firmware Interface (UEFI)—the modern BIOS—or to disable Windows security features such as Secure Boot, Virtual Secure Mode and Credential Guard that depend on the firmware being locked down. The exploit, dubbed ThinkPwn,

AMD’s efforts to 

Vimtag isn’t a household name, but the 17-year-old company’s security cameras and accessories have amassed some pretty stellar reviews on Amazon.com. After putting the its P1 Smart Cloud IP Camera through it’s paces, it’s easy to see why. While it doesn’t sport a particularly arresting design or boast bleeding-edge features like facial recognition, it easily stands with our favorite security cameras thanks to some solid technology and and an excellent user experience. The Vimtag P1 follows what are now well-established design cues for DIY security cameras: an inoffensive pod-like body in a white finish that can be placed on any tabletop surface. While it can be inconspicuously nestled within a bookshelf or between knick-knacks in an entertainment center, it comes with a couple of screws should you want to, say, mount it upside down on your ceiling.

Attackers can exploit vulnerabilities in Android devices with Qualcomm chipsets in order to extract the encrypted keys that protect users’ data and run brute-force attacks against them. The attack was demonstrated last week by security researcher Gal Beniamini and uses two vulnerabilities patched this year in Qualcomm’s implementation of the ARM CPU TrustZone. The ARM TrustZone is a hardware security module that runs its own kernel and Trusted Execution Environment independent of the main OS. On Qualcomm chips, the Trusted Execution Environment is called QSEE (Qualcomm Secure Execution Environment). The full-disk encryption feature on Android devices relies on a randomly generated key called the device encryption key (DEK). This key is itself encrypted with another key derived from the user’s PIN, password or swipe pattern.

The European Union is stumping up €450 million ($500 million) to fund research into cybersecurity -- and wants industry to contribute three times that. The EU's executive body, the European Commission, is concerned about the vulnerability of the EU economy to cyberattacks, warning in a The $2 billion cybersecurity public-private partnership (cPPP) is intended boost cross-border research into cybersecurity, and to aid development of security products and services for the energy, health, transport and finance industries, the European Commission said Tuesday.