Even as Bitcoin hits its all-time high, people’s interest in other cryptocurrencies hasn’t waned, especially Ethereum. But what makes Ethereum popular among some? From an article on VentureBeat: Despite its recent appreciation in value, as a technology, Bitcoin has stagnated…
Wisconsin Speech Bill Might Allow Students To Challenge Science Professors
An anonymous reader quotes a report from Ars Technica: There have been some well-publicized incidents in which student groups or other protesters have interfered with scheduled appearances by right-wing speakers at U.S. universities. In response, a number of states have…
Man Sentenced to Death For Blasphemous Facebook Comments In Pakistan
In what is believed to be “the first time the death penalty had been awarded in a case related to social media,” a 30-year-old man in Pakistan has been sentenced to death for blasphemy in comments made on Facebook. Gizmodo…
Hackers Can Spoof Phone Numbers, Track Users Via 4G VoLTE Mobile Technology
An anonymous reader writes: “A team of researchers from French company P1 Security has detailed a long list of issues with the 4G VoLTE telephony, a protocol that has become quite popular all over the world in recent years and…
Attackers Mining Cryptocurrency Using Exploits for Samba Vulnerability
Kaspersky Lab said it has seen some of the first exploits targeting a patched Samba vulnerability, and those are being used to mine Monero cryptocurrency.
Blinking Router LEDs Leak Data From Air-Gapped Networks
Researchers say sensitive data can be extracted from air-gapped networks via a wireless router’s blinking LEDs.
Free Mac-Based Ransomware-as-a-Service MacRansom Surfaces
A new, free macOS-based ransomware as a service has surfaced on the darkweb. Researchers say once the malware encrypts users’ files, they’re “pretty much gone for good.”
Monday review – the hot 24 stories of the week
From secret posts that aren’t secret and Facebook denying parents access to dead daughter’s account to why ‘I forgot my password’ won’t cut it, and more!
Word exploits weaponised in quick time
The normal lifecycle of an Office exploit can take months – what makes this latest Word exploit different?
Facebook wants to feel your pain (and your joy)
Feeling happy? Feeling sad? Facebook plans to harness your phone’s keyboard and camera to find out.