Tech

New “Glowworm attack” recovers audio from devices’ power LEDs

This three-minute video outlines how Glowworm works and gives examples of optically recovered audio. Researchers at Ben-Gurion University of the Negev have demonstrated a novel way to spy on electronic conversations. A new paper released today outlines a novel passive form of the TEMPEST attack called Glowworm, which converts minute fluctuations in the intensity of […]

Tech

Paragon is working to get its ntfs3 filesystem into the Linux kernel

Enlarge / Your hard drives and SSDs aren’t any better than the filesystem you format them with. Paragon’s ntfs3 driver combines decent performance with a fully featured implementation—a combination that neither Linux in-kernel ntfs or FUSE-mounted ntfs-3g can claim both halves of. (credit: dublinmark / Getty Images) In March of last year, proprietary filesystem vendor […]

Tech

Apple explains how iPhones will scan photos for child-sexual-abuse images

Enlarge (credit: Getty Images | Oscar Wong) Shortly after reports today that Apple will start scanning iPhones for child-abuse images, the company confirmed its plan and provided details in a news release and technical summary. “Apple’s method of detecting known CSAM (child sexual abuse material) is designed with user privacy in mind,” Apple’s announcement said. […]

Tech

Apple plans to scan US iPhones for child abuse imagery

Enlarge / The 2020 iPhone lineup. From left to right: iPhone 12 Pro Max, iPhone 12 Pro, iPhone 12, iPhone SE, and apple iphone 12 mini. (credit: Samuel Axon ) Apple intends to install software on American apple iphones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among […]

Tech

Starlink-for-vehicles plan has ruggedized terminal for extreme heat and cold

Enlarge (credit: SpaceX ) SpaceX says that Starlink user terminals with regard to moving vehicles will be ruggedized to withstand “harsh environments” with extreme levels of heat and cold. SpaceX has been seeking Federal Communications Commission permission to deploy terminals on moving vehicles since March and provided new details on its plan in an application […]

Tech

Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown

Enlarge / You did a bad bad thing. (credit: Getty Images) Governments, vigilantes, and criminal hackers have a new way to disrupt botnets running the widely used attack software Cobalt Strike, courtesy of research published on Wednesday. Cobalt Strike is a legitimate security tool used by penetration testers to emulate malicious activity in a network. […]

Tech

CenturyLink selling copper network in 20 states instead of installing fiber

Enlarge / A CenturyLink service van parked in Santa Fe, New Mexico, on May 2, 2019. (credit: Getty Images | Robert Alexander ) CenturyLink is selling large portions of its copper network in 20 states to a private-equity firm, letting the telco pull out of rural areas where it doesn’t plan to install fiber-to-the-home technology. […]

Tech

The State Department and 3 other US agencies earn a D for cybersecurity

Enlarge (credit: Getty Images) Cybersecurity at eight federal agencies is so poor that four of them earned grades of D, three got Cs, and only one received a B in a report issued Tuesday by a US Senate Committee. “It is clear that the data entrusted to these eight key agencies remains at risk,” the […]

Tech

Awful transaction and timing: AT&T finally ditches DirecTV

Enlarge (credit: Getty Images | Ronald Martinez ) AT& T has completed its spinoff of DirecTV after six years of mismanagement in which nearly 10 million customers ditched the company’s pay-TV services. AT& T bought DirecTV for $49 billion ($67 billion including debt) in July 2015 even though DirecTV and other traditional TV services were […]

Tech

Trusted platform module security defeated in 30 minutes, no soldering required

Enlarge (credit: Getty Images) Let’s say you’re a large company that has just shipped an employee a brand-new replacement laptop. And let’s say it comes preconfigured to use all the latest best security practices, including full-disk encryption using a trusted platform module, password-protected BIOS settings, UEFI SecureBoot, and virtually all other recommendations from the National […]