KeySweeper - covert Microsoft wireless keyboard sniffer using Arduino and nRF24L01+
KeySweeper (http://samy.pl/keysweeper) is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniff...
5 Information Security Trends That Will Dominate 2015
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these five trends.
This Little USB Necklace Hacks Your Computer In No Time Flat – TechCrunch
Quick! The bad guy/super villain has left the room! Plug in a mysterious device that'll hack up their computer while an on-screen progress bar ticks forward to convey to the audience that things are working! It's a classic scene from basically every spy movie in history. In this case, however, that mystery device is real.
Massive cyber-spying program 'the Equation Group' discovered
An incredibly sophisticated cyber espionage operation, likely originating in the U.S., has been discovered by the security researchers at Kaspersky Lab.
Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients – TechCrunch
Since its founding in 2004, Palantir has managed to grow into a billion dollar company while being very surreptitious about what it does exactly. Conjecture abounds. The vague facts dredged up by reporters confirm that Palantir has created a data mining system used extensively by law enforcement agencies and security companies to connect the dots between known […]