Future iPhones might grab a thief’s photo and fingerprint when stolen
A device would snap a photo of (what the device assumes may be) a thief, capture their fingerprint, shoot some video and/or record audio.
Naked Security – Sophos
A device would snap a photo of (what the device assumes may be) a thief, capture their fingerprint, shoot some video and/or record audio.
Naked Security – Sophos
OregonLive.com |
Fish/Wildlife officials: No Oregon data breach, but online site now closed 'until further notice'
OregonLive.com Phil Pope, of McMinnville, casts out into Siletz Bay in this 2015 photo. A possible data breach earlier this week prompted Oregon Department of Fish and Wildlife officials to suspend online sales of fishing and hunting licenses. No breach was detected … Fish and Game halts online tag sales after breach Idahoans can still buy hunting, fishing tags in person, while data breach investigated Washington Fishing, Hunting License Sales Suspended After Cyber Breach |
Toronto Star |
Son of Canadian jailed in China on espionage charges hopes for Trudeau's help
Toronto Star OTTAWA—The son of a Canadian man jailed in China on espionage charges is hoping Justin Trudeau's upcoming visit to the East Asian country will help his father's case — but Simeon Garratt is not getting his hopes up. The prime minister has vowed to … Why Justin Trudeau's trip to China matters |
BleepingComputer |
C&C Servers? Too Risky! Android Botnet Goes with Twitter Instead
BleepingComputer For the first time ever, researchers have detected an Android botnet leveraging a Twitter command-and-control (C&C) account to manage communications across all enslaved devices. Lukáš Štefanko, a malware researcher at Slovakian security firm ESET, … Android botnet relies on Twitter for commands Is your Android phone being controlled by a rogue Twitter account? Botnet is first to receive commands via tweets Twitter-Controlled Android Botnet Discovered |