Samy Kamkar’s latest hacking device, PoisonTap, can steal HTTP cookies from millions of websites and install persistent web-based backdoors.

Regulation May Be Best Answer to IoT Insecurity
Technologists, including Bruce Schneier, testifying before a House committee today on IoT security said that regulation could be the only answer to solving existing vulnerabilities.

Mozilla Patches 29 Vulnerabilities, Prevents MIME Confusion Attacks, in Firefox 50
Mozilla addressed 29 vulnerabilities, three critical, when it released the latest iteration of its flagship browser, Firefox 50 on Tuesday.

IBM Opens Attack Simulation Test Center
IBM introduced on Wednesday a new Cyber Range attack simulator during the opening of its global security headquarters in Cambridge, Mass.

BlackNurse DDoS attack can ‘overload firewalls from a laptop’
Low-volume attack can replicate success of much larger incidents

Shanghai surprise as cheap Android devices ‘phone home’ to China
Cheap Andoid phones discovered to be sending personal data phones secretly sent texts, call logs, and PII. The firmware company says oops, our bad: we were catering to an advertising client!

2016 Will Be the Hottest Year On Record, UN Says
2016 will very likely be the hottest year on record and a new high for the third year in a row, according to the UN. It means 16 of the 17 hottest years on record will have been this century….

DJI Unveils Phantom 4 Pro and Inspire 2 Drones
An anonymous reader quotes a report from TechCrunch: The Inspire wasn’t the only DJI line to get a refresh at today’s intimate event in Los Angeles. The company’s Phantom line is also getting a bump, with the addition of the…

Apple Releases $300 Book Containing 450 Photos of Apple Products
Apple has a reputation for releasing “revolutionary” products that carry higher price tags than competing products. Today, the company hasn’t made that reputation any better as it has released a “$299 coffee table book” that contains 450 photographs of Apple…

Cryptsetup Vulnerability Grants Root Shell Access On Some Linux Systems
msm1267 quotes a report from Threatpost: A vulnerability in cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems. From there, an attacker could have…