By timothy from Slashdot's legitimacy-generally-is-too department
writes with a selection from The Intercept describing instructions for commercial spyware sold by Italian security firm Hacking Team. The manuals describe Hacking Team's software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team's manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software.
(Here are the manuals themselves
.)Read Replies (0)
By samzenpus from Slashdot's save-the-date department
An anonymous reader writes Google today announced it will be hosting the second iteration of its Project Ara Module Developers Conference for its modular device project early next year. The first event will be in Mountain View on January 14, 2015, with satellite locations at Google offices in New York City, Buenos Aires, and London. The same agenda will be repeated in Singapore on January 21, 2015, with satellite locations at Google offices in Bangalore, Tokyo, Taipei, and Shanghai. The company also released a video showing off the first prototype from Project Ara. Until now, all we've seen so far are industrial design models. This one actually boots up.Read Replies (0)