A team of researchers from MIT, Microsoft and Adobe have figured out how to use sound vibrations in objects that are quivering too imperceptibly for the naked eye to discern, but when captured on video can be used to decipher intelligible speech.
Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. This data haul may yet turn out to be a 'Heartbleed' moment for website owners who assume their sites are too small to be of interest to hackers.
The FBI has been silently installing spyware in its quest to identify and prosecute criminals hiding behind the powerful Tor anonymity system. The technique's a classic tool in the malware writer's kit. Do the ends justify the means when it's the law, using it to capture child abusers?
TVs, webcams, thermostats, remote power outlets, sprinkler controllers, door locks, home alarms, scales and garage door openers: they're all flunking Security 101, with issues as bad as "Sure, go ahead, we consider '1234' to be a perfectly acceptable password."
Cambridge University are working on a technology-oriented approach where multiple small devices create an "electronic aura", enabling a main device to transmit a unique identification signal. Meanwhile a company spun out of an Oxford University programme is developing more biomechanical methods of recognising people based on the way they move, behave and interact with devices.
A Californian plaintiff says that nobody at Apple ever told her about tracking her whereabouts, nor did anybody ever ask for her permission. She says she only found out about it by watching a recent Chinese state TV report about iPhone being a security risk to the state.