Microsoft is officially banning emulators from Windows Store. The company has updated the Windows Store policy to announce the changes. The new rules bar any applications that emulate pre-existing game systems, resulting in the removal of a popular program that…
Senate Confirms Neil Gorsuch To Supreme Court
halfEvilTech quotes a report from Washington Post: The U.S. Senate confirmed Neil M. Gorsuch to serve on the U.S. Supreme Court on Friday. On a vote of 54 to 45, senators confirmed Gorsuch, 49, a Denver-based judge on the U.S….
Canonical Founder Talks About Ubuntu Desktop Switching From Unity To GNOME, And Focus On Cloud
Canonical founder Mark Shuttleworth on Friday talked about the move to switch Ubuntu’s desktop user interface from Unity to GNOME, and putting a stop to development of Ubuntu software for phones and tablet: I would like to thank all of…
WikiLeaks Reveals Grasshopper, the CIA's Windows Hacking Tool
An anonymous reader quotes a report from The Next Web: In case you haven’t had your dose of paranoia fuel today, WikiLeaks released new information concerning a CIA malware program called “Grasshopper,” that specifically targets Windows. The Grasshopper framework was…
Microsoft's Surface Pro 5 Said To Move To Intel Kaby Lake Processors
Windows watcher Paul Thurrott has revealed the first credible details about Microsoft’s Surface Pro 5. TechCrunch reports: The Surface Pro 5 will have the same power connector currently used on the Surface Pro 4 and Surface Book, which is a…
Samsung Tizen Security ‘Feels like 2005’
A researcher at the Security Analyst Summit described the insecure state Samsung’s Tizen operating system.
Apache Struts 2 Exploits Installing Cerber Ransomware
Attackers are attempting to exploit the recent Apache Struts vulnerability on Windows servers and the payload is a variant of the Cerber ransomware.
Creating a More Altruistic Bug Bounty Program
David Jacoby and Frans Rosén said at this year’s Security Analyst Summit they offered companies free pen-testing and raised $15,000 for charity in the process.
Baseband Zero Day Exposes Millions of Mobile Phones to Attack
A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference
Researcher Warns SIEMs Are Weak Link In Network Security Chain
Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets.