A UK-based blockchain start-up has revealed what it is calling a new version of the Internet.

DADI (Decentralized Architecture for a Democratic Internet) will be faster, cheaper and more secure, but most importantly – the control over the network won’t be in the hands of large corporations, but rather in those who use it…

https://www.itproportal.com/news/new-internet-called-dadi-launched/

Installing battery saving apps helps to improve the battery life of smartphones. But, what if that app hacks you? A malicious battery-saver app for that installs ad click malware into hacked android devices along with extracting device information has been identified. Malicious Battery-Saver App Hacked 60,000 Devices Google Play Store now carries a malicious battery-saver […]

https://latesthackingnews.com/2018/06/26/malicious-android-battery-saver-app-installs-adware-and-steals-data/

Internet of Things (IoT) devices aim to make home and office life easier, but also open those networks to a variety of attacks. On Tuesday, developer and researcher Brannon Dorsey uncovered an old network attack that could put many connected devices at risk of being controlled by a hacker, according to a Medium post…

https://www.techrepublic.com/article/how-to-protect-your-wi-fi-router-google-home-roku-and-sonos-speakers-from-attackers/?ftag=COS-05-10aaa0g

At long last, Apple admitted to its customers that its MacBook and MacBook Pro keyboard designs are so flawed and prone to sticking or dead keys, as originally reported by The Outline in October, and that it will cover the cost of repairs beyond the products’ normal warranty. The admission comes after the company has been hit with no fewer than three class action lawsuits concerning the computers and their ultra-thin butterfly-switch keyboards…

https://theoutline.com/post/5052/apple-admits-its-computers-are-broken

Programmer (and artist) Brannon Dorsey wrote up a fascinating and fairly technical piece about the perils of DNS rebinding the other day. It’s worth a read if you have even the slightest interest in how web browsers work to prevent one site—a scammy site, let’s say—from sending a request to another site—your bank—and draining your accounts or manipulating your credentials (without the site’s explicit permission)…

https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291

On some Windows 10 PCs, the “Service Host: Local System (Network Restricted)” process group in the Task Manager can use a high amount of CPU, disk, and memory resources. Here’s how to fix it.

Superfetch Has Some Bugs on Windows 10
We recently noticed this problem on one of our Windows 10 PCs. We determined the Superfetch service was the problem, although the Windows Task Manager didn’t point that out…

https://www.howtogeek.com/356207/how-to-fix-high-cpu-usage-by-system-host-local-system-network-restricted/

Google is beginning to roll out desktop browser support for Android Messages, allowing people to use their PC for sending messages and viewing those that have been received on their Android smartphone. Google says the feature is starting to go out to users today and continuing for the rest of the week. Text, images, and stickers are all supported on the web version…

https://www.theverge.com/2018/6/18/17475390/android-messages-text-from-web-feature

South African insurer Liberty yesterday said that it had refused to pay the money demanded by hackers who infiltrated the group’s information technology systems and extracted data from it.

The chief executive of Liberty, David Munro, said the group had assembled a team of specialists to investigate the data breach…

https://www.iol.co.za/business-report/companies/we-did-not-pay-ransom-after-massive-hack-liberty-15521018

Hardware vulnerabilities seem to be much more prominent of late. Recently, another hardware vulnerability was found in Intel CPUs that would allow hackers to steal data from systems containing the affected chips. The newly discovered vulnerability is a side-channel speculative execution vulnerability, the vulnerability has been termed as Lazy FP State Restore vulnerability…

https://latesthackingnews.com/2018/06/17/another-vulnerability-in-intel-cpus-dubbed-lazy-fp-state-restore/

Almost every service you use on the web that involves a username and password is in some ways collecting information about you. In some cases, that info might just be your email and a few identifying data points like your age or gender. In others, (cough :: Facebook) you’re handing over information about your likes and dislikes, who your friends are, and even where you go during the day…

https://lifehacker.com/request-your-data-from-over-100-different-sites-using-t-1826892866