Plus: Our tip on keeping Mac files encrypted
Roundup This week you had to deal with AI security panic, fake Fortnite, and, if you use OpenBSD, the end of Intel HyperThread support?
How to extract 256-bit signing keys with 99.8% success
Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.?
Tel Aviv treated to Brucey's bonus views
Israel Cyber Week With insecure computers in charge, the healthcare and transportation sectors have become a nexus of security problems, infosec veteran Bruce Schneier warned delegates at Israel Cyber Week.?
Researchers confirm hardware vulnerable to remote attacks
Security researchers say they can back up a mother's claim that her baby monitor had been remotely hacked and used to spy on her family.?
Spymaster whines about smartphone privacy
Israel Cyber Week Facebook ? already kicked around the block by politicians in the US and Europe over privacy in the wake of the Cambridge Analytica scandal ? has come under fire from Israel.?
Malware writers preying on the game-curious with fake apps
With online gaming hit Fornite set to make its debut on Android, malware writers are already playing on the game's hype to ensnare victims.?
Spamming scum fire out phishing frighteners
An unusually large wave of phishing emails was spewed out this morning, with recipients warned that all their devices had been infected by WannaCry.?
PM pops in to brag about industry wins
Israel Cyber Week Israel is planning to develop a "state-level cyber-shield" to improve its resilience against hacking and malware, the country's newly appointed cyberczar said on Wednesday.?
Data breach at Flightradar24 scored some email addresses and hashed passwords
Aviation professionals enthusiasts have been told to change their passwords after flight-tracking site flightradar24 warned of a data breach.?
Fancy website, code emitted ? Roku, Google, etc stuff at risk
A technique for attacking computer networks, first disclosed more than a decade ago, has resurfaced as a way to manipulate Internet-of-Things gadgets, smart home equipment, and streaming entertainment gizmos.?