Apple’s new Mountain Lion operating system is now available – but with it comes a surprising new twist to the terms and conditions for the new dictation capability. Apple gets and keeps the dictated files.
Rakshasa: Hindu demon – and permanent, undetectable backdoor
A security researcher has developed proof of concept for a PC backdoor that is both undetectable and very difficult to remove – and capable of infecting more than 100 different motherboards.
Apple to buy AuthenTec for $356 million
In a deal unanimously agreed by the AuthenTec board, but not yet by its shareholders, Apple Inc is to buy the mobile security firm at a price valuing shares at $8.00 – a 58% premium on the earlier closing price.
Black Hat 2012: Pappas bounces his way to $200,000 Microsoft BlueHat prize
Vasilis Pappas has won Microsoft’s $200,000 BlueHat defensive computer technology research prize for his kBouncer, an efficient and fully transparent return-oriented programming (ROP) mitigation technique.
Black Hat 2012: FAA’s new air traffic control system vulnerable to cyber attack
The US Federal Aviation Administration’s (FAA) new air traffic control system could be vulnerable to cyber attack, warned researcher Andrei Costin at the Black Hat conference this week in Las Vegas.
Russian websites pushing Olympics malware for Android
On the day of the official launch of the 2012 London Olympic Games, GFI Software warns Android gamers about fake 2012 apps being offered from Russian websites.
YouView: business and security issues
YouView, an internet-connected variant of Freeview – chaired by Lord Sugar and supported by all the major UK TV channels, and ISPs such as BT and TalkTalk – has finally launched in the UK, but to more criticism than praise.
Mahdi malware campaign resurrected
After having its command-and-control server shut down, the Madhi (Messiah) malware is back with improved features, warns Kaspersky Lab.
NIST: You can’t tell software misuse without a scorecard
The US National Institute of Standards and Technology (NIST) has issued a scoring system for computer security managers to assess the severity of security risks caused by software misuse.
BlackHat 2012: Microsoft Incorporates BlueHat ROP Mitigation Technology into EMET
One of the three finalist entries for Microsoft’s first-ever BlueHat Prize for building new security defense technologies is now part of the software giant’s free Enhanced Mitigation Experience Toolkit (EMET).