FBI iPhone Unlock Trick Remains Secret

A court says the FBI won’t have to reveal how it broke into an encrypted iPhone belonging to the San Bernadino shooter. The US district court rejected a freedom of information request to find out who got paid – and how much – to access the phone. The phone belonged to Syed Farook, the man […]

Free eBook: Linux Networking Cookbook (a $17 Value) – FREE For a Limited Time

For today’s free eBook, we’re offering you the Linux Networking Cookbook (a $17 value) for free! Move beyond the basics of how a Linux machine works and gain a better understanding of Linux networks and their configuration. This is a hands-on solution guide to building, maintaining, and securing a network using Linux. What You Will […]

FREE eBook: Penetration Testing – A Survival Guide ($55 Value)

Today on Geeks are Sexy, we’re offering you “Penetration Testing – A Survival Guide” ($55 Value) from Packt Publishing for free! The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine whether a business is truly secure. […]

Gadget Tracks Car Movements In Your Street

A new sensor tracks and photographs every car that drives past your house. It appears to be legal but has raised privacy questions. The BBC reports that the gadget from Flock costs $50 a year to use and the company says it will only make it available to “neighborhood leaders” with an emphasis on fighting […]

Robot Cuts Safe-Crack Time From Months To Minutes

A $200 robot cracked a safe in 30 minutes, thanks largely to exploiting weaknesses in a physical rather than digital lock. The safe makers say it would be difficult to replicate in a real attack. The SentrySafe uses a combination with three pairs of digits, making for 970,299 different possible codes. A brute force attack […]

Teen Hackers Sent To Rehab Camp

British teenagers accused of hacking offenses have taken part in a weekend ‘rehab’ camp. The event involved coding challenges and talks on careers in cybersecurity. According to a BBC report, the camp was conceived following research that found both criminal hackers and legitimate security researchers had largely similar skills and backgrounds, with the main difference […]

Google Rebadges App Scanner

Google is rolling out a security measure called Play Protect for Android devices. It’s actually just a clearer way of informing users about security scans that were already being made. Play Protect is effectively a higher-profile user interface for the existing Verify Apps tool that regularly scans in the background to look for any potentially […]

Microwaving An Airbag: Slowmo Video

These days you can’t move for videos attempting to blend unconventional objects or pit them against red hot lava balls. But way back in 2009, Youtuber Jogwheel was microwaving inappropriate objects for (potentially perilous) research. Now the people behind a slow motion video channel have decided to replicate one of his more spectacular experiments…

Self-Healing Gel Could Protect Phone Screens

Melbourne University researchers are working on a self-healing gel that could mean cracked phone screens could repair themselves. The gel is made from poly(hydroxyl ethyl methacrylate), which is one of the key materials used to create contact lenses. The researchers have manipulated it such that it is normally firm, but can flow more like a […]

Windows 10 To Protect Folder Access

Windows 10 is testing a way to make it harder for ransomware to encrypt files. The optional feature would only allow approved apps to access, read from or write to a particular folder. “Controlled folder access” is planned to be part of Windows Defender and is already being tested by some users in the Windows […]

FREE eBook: Practical Linux Security Cookbook (a $22 Value) FREE For a Limited Time

For today’s free eBook, get “Practical Linux Security Cookbook” (a $22 Value,) FREE For a Limited Time! Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. What You Will Learn: -Learn about various vulnerabilities and exploits in relation to Linux systems -Configure […]

Media Player Subtitles ‘A Security Risk’

Researchers say popular media players could pose a security risk through their subtitles feature. Several firms have issued or will soon issue a security update. The issue is with media players that search online for repositories of subtitle files and select the highest rated ones, the idea being to pick the ones with the best […]