msm1267 quotes a report from Threatpost: A little more than two weeks after the latest ShadowBrokers leak of NSA hacking tools, experts are certain that the DoublePulsar post-exploitation Windows kernel attack will have similar staying power to the Conficker bug,…
Slashdot Asks: Which Wireless Carrier Do You Prefer?
Earlier this year, telecommunications giants like T-Mobile, AT&T, Verizon and Sprint were battling to see who could release the best unlimited data plan(s). T-Mobile started the domino chain reaction with the launch of its “One” unlimited plan in August. But…
Square Said To Acquire Team From Struggling Social App Yik Yak
According to Bloomberg, Square has acquired the engineering team of Yik Yak for “less than $3 million.” From the report: The payments processor paid less than $3 million for between five and ten of Yik Yak’s engineers, according to the…
Uber Gets Sued Over Alleged 'Hell' Program To Track Lyft Drivers
An anonymous reader quotes a report from TechCrunch: Uber has another lawsuit on its hands. This time, it’s about Uber’s alleged use of a program called “Hell.” The plaintiff, Michael Gonzales, drove for Lyft during the time Uber allegedly used…
A Caterpillar May Lead To a 'Plastic Pollution' Solution
New submitter FatdogHaiku quotes a report from BBC: Researchers at Cambridge University have discovered that the larvae of the moth, which eats wax in bee hives, can also degrade plastic. Experiments show the insect can break down the chemical bonds…
No Fix for SquirrelMail Remote Code Execution Vulnerability
SquirrelMail suffers from a remote code execution vulnerability that could let attackers execute arbitrary commands on the target and compromise the remote system.
Locky Ransomware Roars Back to Life Via Necurs Botnet
The first large scale Locky campaign in months has been detected via the Necurs botnet.
NSA’s DoublePulsar Kernel Exploit In Use Internet-Wide
Scans show tens of thousands of Windows servers infected with the DoublePulsar kernel exploit leaked by the ShadowBrokers two weeks ago.
Monday review – the hot 18 stories of the week
From Burger King’s Google Home trigger and how tech scammer have made millions to the many vulnerabilities found in Linksys routers, & more!
Ransomware hidden inside a Word document that’s hidden inside a PDF
Spam campaign delivers Locky ransomware that, like a Russian matryoshka doll, is nested inside not one but two layers