Peng Chong

211 Flips | 2 Magazines | 3 Likes | 7 Followers | @TanPengChong | 开卷有益

How Soviets used IBM Selectric keyloggers to spy on US diplomats

Highly sophisticated bugs went undetected for 8 years during the Cold War.<p>A National Security Agency memo that recently resurfaced a few years after …

Remote Controls

S'pore to spend 10% of IT budget on cyber security

Up to 10 per cent of Singapore's information technology budget will be spent on cyber security and the Government is urging private companies to do …

Cybersecurity

DoD's top secret smartphone expected in the fall

Government agencies have made significant strides in incorporating smartphones and tablets into their offices and missions, even at the Defense …

Xerox PARC's new chip will self destruct in 10 seconds

Engineers at Xerox PARC have developed a chip that will self-destruct upon command, providing a potentially revolutionary tool for high-security applications.<p>The chip, developed as part of DARPA’s vanishing programmable resources project, could be used to store data such as encryption keys and, on …

Nuke all your computer passwords, says Intel exec

Let’s face it: no one likes passwords.<p>With all the different websites and devices you log into, it’s become almost impossible to keep track of all …

Zero-day vulnerabilities found in Kaspersky and FireEye security products

Author:<p>Published<p>in Google, Malware, Vulnerability 6<p>Sounds like it's going to be a busy few days for R&D and PR departments at least two security …

Lockpickers 3D-Printed Master Key for TSA Luggage Locks and BluePrint Leaked Online

Here're a good news and bad news for you. The good news is that if you lose the keys for your TSA-compliant "Travel Sentry" luggage locks then you …

Researcher reveals security flaw in Internet of Things OS VxWorks

A security researcher discovered a serious yet simple flaw in VxWorks, a real-time operating system for the Internet of Things, which an attacker …

Qualcomm's new processor will learn how to detect malicious apps

Mobile chip giant Qualcomm is taking a stab at the malware growth on Android, adding a new artificial intelligence system into Smart Protect on the …

5 things to learn from the DoD on Cyber Security

I recently just had the unique privilege of sitting in a briefing given by a senior DoD Cyber expert to a bunch of middle state CEOs about the how …

This iPhone Malware Stole 225,000 Passwords from Jailbroken Phones

Pro-tip: don’t jailbreak your iPhone.<p>If you have a jailbroken iPhone, be careful what apps and software you trust.<p>In early July, some Apple users began noticing that their accounts were being used to make unauthorized purchases through iTunes and to install iOS apps, according to research by a …

Another security flaw in Android, multitasking is affected

Another likely serious flaw has been discovered in Android. The issue involves the mobile operating system's ability to multitask as opposed to its …

FTC can sue companies with poor information security, appeals court says

Court says Wyndham hotels practices could be considered “unfair” and “deceptive.”<p>On Monday, a federal appeals court ruled that the Federal Trade …

Identity Theft

NSA preps quantum-resistant algorithms to head off crypto-apocalypse

Quantum computing threatens crypto as we know it. The NSA is taking notice.<p>The National Security Agency is advising US agencies and businesses to …

Quantum Computing

Physicists Unveil First Quantum Interconnect - MIT Technology Review

One of the unsung workhorses of modern technology is the humble interconnect. This is essentially a wire or set of wires that link one part of an …

Another Critical Flaw Affecting Almost All Android Devices

Two weeks ago, we reported about a critical mediaserver vulnerability that threatened to crash more than 55 percent of Android devices, making them …

Russia Joint Chiefs of Staff hack: Deterrence doesn’t work with cyberattacks.

Sometimes we forget about the 40-odd–year Cold War between the former Soviet Union and the West. We forget about the espionage, sabotage (on both …

Windows Hello can identify twins apart, preventing unwanted logins

Windows Hello is one of the many new features of Microsoft's latest operating system, Windows 10. The feature is a new security measure, that …

Second Ashley Madison data release twice as big as the first

Hackers behind the Ashley Madison attack have released a second huge batch of data, this time taking aim at the company's top executives.<p>The 20GB …

Mapping Israel’s Cyber-Security Startups

Adam Fisher Contributor<p>Adam Fisher is a partner at Bessemer Venture Partners, where he manages the firm’s Herzliya office. Adam invests in Israeli and European technology startups. His cyber security investments include BillGuard, Wandera and Team8.<p>More posts by this contributor:<p>Israeli High Tech …

Full Ashley Madison Hacked Data Apparently Dumped On Tor

Hacked data from online extramarital affairs website Ashley Madison has apparently been leaked online, after a threat by a group of hackers to do so earlier this summer if the service did not shut down (which it has not).<p>In July the group, which calls itself The Impact Team, published a range of …

Parrot drones easily taken down or hijacked, researchers demonstrate

Open telnet port, open Wi-Fi, root access, open season.<p>In two separate presentations at Def Con in Las Vegas last weekend, security experts …

Drones

Silenced for two years by Volkswagen, car hackers reveal their paper into security hole

Two years ago, a trio of researchers were preparing to present the findings of their investigation into the security of car immobilisers used by …

Computer Science

Hack Satellite Connection and Surf Anonymously

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet.<p>Digital …

Lenovo Caught Using Rootkit to Secretly Install Unremovable Software

Two years ago Chinese firm Lenovo got banned from supplying equipment for networks of the intelligence and defense services various countries due to …

U.S. researchers show computers can be hijacked to send data as sound waves | Reuters

LAS VEGAS (Reuters) - A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to send information out of an office through sound waves.<p>A man types on a computer keyboard in Warsaw in this February 28, …

Las Vegas

Design flaw in Intel processors opens door to rootkits, researcher says

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware …

Windows patches can be intercepted and injected with malware

Researchers say Windows machines that fetch updates from an enterprise update server not configured to use encryption are vulnerable to an injection …

Critical Flaw IDed In ZigBee Smart Home Devices

Security researchers have identified a critical vulnerability in devices using ZigBee, a wireless standard used for connectivity in multiple Internet of Things and smart home devices — raising the specter of hackers breaking into your smart home and doing what they like with your connected locks, …

Hacking A Phone's GPS May Have Just Got Easier

One of the drawbacks of our increasingly connected world is the proliferation of new wireless connections to hack. More worrying is when hackers finding cheaper and more accessible ways to exploit those vulnerabilities.<p>For some time it’s been possible to spoof the location of a smartphone or any …

Wireless