Evil pixels: researcher demos data-theft over screen-share protocols

It’s the kind of thinking you expect from someone who lives in a volcano lair: exfiltrating data from remote screen pixel values.The idea comes from Pen Test Partners’ Alan Monie, taking a break from sex toy hacks and wondering how to get data over a connection like RDP (remote desktop protocol) when the target had

Evil pixels: researcher demos data-theft over screen-share protocols Read More »

Not even ordering pizza is safe from the browser crypto-mining scourge

A total of 2,531 of the top 3 million websites (1 in 1,000) are running the Coinhive miner, according to new stats from analytics firm Red Volcano. BitTorrent sites and the like were the main offenders but the batch also included the Ecuadorian Papa John’s Pizza website [see source code]. Read more

Not even ordering pizza is safe from the browser crypto-mining scourge Read More »

You know what’s coming next: FBI is upset it can’t get into Texas church gunman’s smartphone

FBI agents investigating the murder-suicide of 26 people in a church in Sutherland Springs, Texas, on Sunday, have said they can’t yet unlock the shooter’s smartphone. In a press conference on Tuesday, special agent Chris Combs said that investigations into the motives and actions of the gunman was ongoing, but that his mobe was a

You know what’s coming next: FBI is upset it can’t get into Texas church gunman’s smartphone Read More »

Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Microsoft has released a new document explaining the minimum hardware and firmware requirements to create a “highly secure” Windows 10 device. If you’ve got a Surface Pro 4, which has a sixth-generation Intel processor, it doesn’t meet Microsoft’s newly published standard. Read more

Windows 10: If you want a highly secure device, follow these rules, says Microsoft Read More »

Serious Tor browser flaw leaks users’ real IP addresses

A newly-discovered bug exposes the real-world IP addresses of those who are using the Tor browser, used by millions for anonymity and private browsing. The bug, called TorMoil by security firm We Are Segment, which discovered it, is triggered when a user clicks on a local file-based address, like file://, rather than http:// or https://.

Serious Tor browser flaw leaks users’ real IP addresses Read More »