Company blames credentials stolen from another company for string of rogue transactions
Russian Hacker Conspiracy Theory is Weak, But the Case For Paper Ballots is Strong
On Wednesday, J. Alex Halderman, the director of the University of Michigan’s Center for Computer Security & Society and a respected voice in computer science and information society, said that the Clinton Campaign should ask for a recount of the…
Apple Releases macOS 10.12 Sierra Open Source Darwin Code
An anonymous reader writes:Apple has released the open source Darwin code for macOS 10.12 Sierra. The code, located on Apple’s open source website, can be accessed via direct link now, although it doesn’t yet appear on the site’s home page….
Microsoft Set To Win EU Approval for LinkedIn Buy
Microsoft is set to gain EU approval for its $26 billion buy of professional social network LinkedIn with tweaks to concessions aimed at addressing competition concerns, three people close to the matter said on Wednesday. From a report on Reuters:…
Faraday Future's Factory Construction Paused; Shipping Timelines at Risk
Electric vehicle maker Faraday Future may not be able to make its first cars in time to hits its 2017 shipping deadlines, according to a new report by the Financial Times. From a report on TechCrunch: It’s hard to ship…
Finland Set To Become First Country To Ban Coal Use For Energy
Finland could become the first country to ditch coal for good. As part of a new energy and climate strategy due to be announced tomorrow, the government is considering banning the burning of coal for energy by 2030. From a…
Fake news still rattling cages, from Facebook to Google to China
Chrome extension cobbled together by students offers at least one way to tackle ‘fake news’ problems
Cyber Monday: What to watch out for when you hit the web
Here’s the second of our three seasonal articles to help to keep you safe during discount-season shopping… and on into the New Year.
Stop wasting time making the wrong passwords stronger
Much of the effort that goes into making passwords stronger has no effect on security
How your speakers could be turned into eavesdropping microphones
A proof of concept attack uses malware to turn headphones into microphones that can eavesdrop from across a room.