Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs. Hackers and cybercrooks do the same.
The chart shows the sky at the start of December. The positions of the stars on other nights can be found from previous charts (our last appeared on November 3) for they rise two hours earlier each month.
Europol, Europe’s criminal intelligence agency, has painted a grim picture of threats that will be ushered in alongside the Internet of Things (IoT), even predicting that a death caused by an by internet-connected device may happen within the year.
Next week at the 31st Chaos Communication Congress (31C3) in Hamburg, programmer/hacker Trammell Hudson will present research on ways to infect Apple EFI (Extensible Firmware Interface) firmware using the externally accessible Thunderbolt ports.