From the high cost of ‘sim swaps’ and Google Docs used for phishing to the mobile network flaw that gave crooks access to bank accounts, and more!
How to protect your boss from phishing attacks
Oversharing on social media can make both individuals and the companies we work for targets for spearphishers and whalers. Here are our tips to help stop that happening
Intel's Remote Hijacking Flaw Was 'Worse Than Anyone Thought'
An anonymous reader quotes Ars Technica: A remote hijacking flaw that lurked in Intel chips for seven years was more severe than many people imagined, because it allowed hackers to remotely gain administrative control over huge fleets of computers without…
After Almost Two Years, The Air Force's Mysterious X-37B Space Plane Lands
An anonymous reader quotes Space.com: The record-shattering mission of the U.S. Air Force’s robotic X-37B space plane is finally over. After circling Earth for an unprecedented 718 days, the X-37B touched down Sunday at the Shuttle Landing Facility at NASA’s…
WikiLeaks Reveals A CIA LAN-Attacking Tool From 'Vault 7'
An anonymous reader quotes BetaNews: WikiLeaks continues to release revealing documents from its Vault 7 cache. This time around the organization introduces us to a CIA tool called Archimedes — previously known as Fulcrum. As before, there is little to…
Court Allows Case Over Violating Open Source License
Slashdot reader destinyland writes: The District Court for the Northern District of California recently issued an opinion that is being hailed as a victory for open source software. In this case, the court denied a motion to dismiss a lawsuit…
Oracle And Cisco Both Support The FCC's Rollback Of Net Neutrality
An anonymous reader quotes The Hill: Oracle voiced support on Friday for FCC Chairman Ajit Pai’s controversial plan to roll back the agency’s net neutrality rules. In a letter addressed to the FCC, the company played up its “perspective as…