An anonymous reader writes: “Mobile applications that open ports on Android smartphones are opening those devices to remote hacking, claims a team of researchers from the University of Michigan,” reports Bleeping Computer. Researchers say they’ve identified 410 popular mobile apps…
MIT Creates 3D-Printing Robot That Can Construct a Home Off-Grid In 14 Hours
Kristine Lofgren writes: Home building hasn’t changed much over the years, but leave it to MIT to take things to the next level. A new technology built at MIT can construct a simple dome structure in 14 hours and it’s…
Threatpost News Wrap, April 28, 2017
Mike Mimoso and Chris Brook recap this year’s SOURCE Boston Conference and discuss the week in news, including the long term implications of the NSA’s DoublePulsar exploit, and the HipChat breach.
WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking
The CIA is planting web beacons inside Microsoft Word documents to track whistleblowers, journalists and informants, according to WikiLeaks.
Banks confident of their approach to security – but still get hit by hackers
How well does your bank look after your details? The financial institutions are pretty confident they’re doing a good job
Discovery of 8,800 servers sends warning to Asian cybercriminals
Move shows the importance of international co-operation to take down cybercrime at its roots
News in brief: Cassini dives into Saturn’s rings; Mexican pirate site move; Twitter under fire from spooks
Your daily round-up of some of the other stories in the news
FCC: net neutrality is ‘politically motivated government overreach’
FCC chief signals assault on rules from the days of Ma Bell used by Obama to guarantee net neutrality
Sports fans protest at plans to scan their faces as they head for the match
Police to use facial recognition to match Champions League fans to ‘persons of interest’ as they arrive for the UEFA Cup final
Lawmaker calls on ISPs to stop customers being hit by viruses
Australian minister says government is considering moving towards ‘active defence … blocking or diverting malicious traffic’