Cybersecurity

Debugging mechanism in Intel CPUs allows seizing control via USB port

https://www.scmagazine.com/debugging-mechanism-in-intel-cpus-allows-seizing-control-via-usb-port/article/630480/ Some Intel CPUs have JTAG over USB 3 debugging built-in. This could be good for debugging but is really bad for computer security. “starting with the Skylake processor family in 2015, Intel introduced the Direct Connect Interface (DCI) which provides access to the JTAG debugging interface via common USB 3.0 ports.” Having the DCI

John McAfee’s 3 major cybersecurity predictions for 2017 | CSO Online

http://www.csoonline.com/article/3155572/internet-of-things/john-mcafees-3-major-cybersecurity-predictions-for-2017.html Cybersecurity predictions: 1. IoT denial of service attacks on major Internet carriers will become commonplace 2. The anti-virus paradigm will finally been seen as a dead paradigm 3. Intelligence agencies will finally accept the fact that a sophisticated Nation State can perpetrate any hack and make it point to any Nation or agency that

White House fails to make case that Russian hackers tampered with election | Ars Technica

http://arstechnica.com/security/2016/12/did-russia-tamper-with-the-2016-election-bitter-debate-likely-to-rage-on/ Released report does not have good solid evidence who was behind the attacks. This article also tells why it is hard to know who is really behind those attacks – it is well possible that hackers faked some of the evidence. Whoever did this, if they wanted to cause disruption and lack of faith,