The 342-page report warns of civil war, a humanitarian crisis or even war with China. That becomes an even more deadly concern because of the North’s chemical, biological and nuclear weapons.

The cell radio is one of the biggest battery drains on a phone. Every time you send data, no matter how small, the radio is powered on for up for 20-30 seconds. Every decision you make should be based on minimizing the number of times the radio powers up. Battery life can be dramatically improved by changing the way your apps handle data transfers. Users want their data now, the trick is balancing user experience with transferring data and minimizing power usage. A balance is achieved by apps carefully bundling all repeating and intermittent transfers together and then aggressively prefetching the intermittent transfers.

Speaking at the keynote LinuxCon panel this year, Linus Torvalds, who created the open-source Linux operating system 22 years ago, revealed that the government had approached him about installing a backdoor into system’s structure. Linux is the preferred operating system for the privacy conscious infosec community.

Is it time yet to divorce productivity from employment?

TEPCO has become a symbol of everything that is wrong with the nation of Japan: cronyism, collusion, gentrification, corruption, weak regulation, and entropy. Despite being in the spotlight for the worst nuclear disaster since Chernobyl, TEPCO continues to engage in questionable labor practices, and has escaped bankruptcy in closed-door meetings with politicians, and through denying culpability has shifted part of the reparations burden onto taxpayers – deeds which testify to the extent to which TEPCO still has plenty of political power, if not as much nuclear power.

Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.

The idea we had was to build an “unattended self-deploying” instance of Kali Linux that would install itself on a target machine along with a customized configuration requiring no user input whatsoever. On reboot after the installation completes, Kali would automagically connect back to the attacker using a reverse OpenVPN connection. The VPN setup would then allow the attacker to bridge the remote and local networks as well as have access to a full suite of penetration testing tools on the target network.

According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese.

Medical examinations in Fukushima Prefecture following the nuclear crisis of 2011 have detected 18 children with thyroid cancer.

|< First   < Previous   21–30 (344)   Next >   Last >|