Archive for August, 2014 | Monthly archive page

FAA Bans Planesharing Startups

Airpooler – an Uber for plane rides – fucked up private pilots in the US flying people to destinations for the price of fuel (and so to get their hours) by asking the FAA for clarification of a 1964 rule. The FAA clarification not only extends to ride sharing services, but also to the old […]

Researchers find security flaws in backscatter X-ray scanners

In laboratory tests, the team was able to successfully conceal firearms and plastic explosive simulants from the Rapiscan Secure 1000 scanner. The team was also able to modify the scanner operating software so it presents an “all-clear” image to the operator even when contraband was detected via Researchers find security flaws in backscatter X-ray scanners […]

Ancient Space | The Game

Ancient Space is a story driven single player real time strategy game where you take command of a fleet embarking on a scientific mission to chart undiscovered reaches of space called ‘The Black Zone’. Overcome overwhelming odds and fight for your life and the survival of your ship and its crew. Ancient Space features real […]

UPS: We’ve Been Hacked – Credit Card data compromised since January

The United Parcel Service announced Wednesday that customers’ credit and debit card information at 51 franchises in 24 states may have been compromised. There are 4,470 franchised center locations throughout the U.S., according to UPS. via UPS: We’ve Been Hacked – TIME. So you don’t know when UPS found out about the hack, but if […]

Internet provider Ziggo promises unlimited acces to internet with all devices. Limits access.

Ziggo claims: “Unlimited access to WifiSpots” (WifiSpot is a wifi sharing service whereby you can access wifi from all Ziggo subscribers). Also claims: “Internet on multiple devices silmutaneously” and “The whole famile online easily at the same time. Via computer, tablet and mobile”. Unfortunately they only allow access to two devices on Wifispots at the […]

Banking apps: Handy, can grab all your money… and RIDDLED with coding flaws

Turns out that huge amounts of them are apt to input validation and SSL hacks. This is caused by poor programming practices, which the government does better at avoiding than private companies. Banking apps: Handy, can grab all your money… and RIDDLED with coding flaws • The Register.

It’s very easy to hack traffic lights

The lights use a wireless radio at 900MHz or 5.8GHz to transmit data to each other. They are all on the same subnet. Entering the network doesn’t require a password and the data is unencrypted. The controller for a network has a debug port opened by default. It’s thus easy to get into the controller […]

Another way to see stealth aircraft

Aside from using a mobile network, you can use low frequency radar to detect stealth aircraft. Chinese and Russian Radars On Track To See Through U.S. Stealth | USNI News.

Propeller 1: Open Source CPU

The Parallax Propellor 1 microcontroller has been completely open sourced. Propeller 1 Open Source | Parallax Inc.

Use a video of a crisps bag to hear what is said in the room

Researchers at MIT, Microsoft, and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video. In one set of experiments, they were able to recover intelligible speech from the vibrations of a potato-chip bag photographed from 15 feet away through soundproof glass. via Extracting audio […]

Cisco’s need upgrading – routing tables are up for grabs!

Multiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic. via Cisco Security Advisory: OSPF LSA Manipulation Vulnerability […]

US Terrorist-Tracking System tracks many many non-terrorists

Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local […]

Monkey selfie at heart of copyright controversy

A photographer who set up a load of cameras in the wild can’t get pictures of a monkey removed from Wikipedia, as the monkey pressed the shutter. Wikipedia argues that this means that nobody owns the copyright. I wonder what the BBC series Earth has to say about this? Wikipedia refuses to delete photo as […]

Child porn used to justify reading of cloud data by Google, MicroSoft

With privacy concerns being raised more and more about the use of cloud storage, tech giants are turning to the age old scare tactic of using child porn as an excuse to burrow through users data. Google Spotted Explicit Images Of A Child In A Man's Email And Tipped Off The Authorities – Business Insider. […]

Twitch TV shows why copyright is ridiculous as it shuts down music in videos

Twitch TV – a gaming TV channel with billions of watchers – will attempt to detect music playing in the background. If a 10 second spell seems to be copyrighted, they will remove the sound for half an hour. I suppose the rationale is that the music companies and the RIAA think this is a […]

Russia gang hacks 1.2 billion usernames and passwords

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses, according to Hold Security – a US firm specialising in discovering breaches. Hold Security described the hack as the "largest data breach known to date". It claimed the stolen information came from more than 420,000 websites, including […]

seL4 – Open source formally verified bug free microkernel OS released

General Dynamics C4 Systems and NICTA are pleased to announce the open sourcing of seL4, the world’s first operating-system kernel with an end-to-end proof of implementation correctness and security enforcement. It is still the world’s most highly-assured OS. What’s being released? It includes all of the kernel’s source code, all the proofs, plus other code […]

Aero Glass – AR for pilots using Epson Moverio glasses

Using the Epson Moverio glasses, Augmented reality projects the following features onto the lenses in 3D. Airports Navigation Aids ADS-B traffic Flight Plan route & waypoints Airways Geographic points of interest (cities, villages, visual navigation points) Soon followed by: Airspaces Terrain elevation Procedures ILS approach cones FLARM traffic (for glider) Weather Dynamic Data (NOTAM, TFRs) […]

Malware without files on the PC, encoded in the registry

As the entry point, they exploit a vulnerability in Microsoft Word with the help of a crafted Word document they spread via email. The same approach would work with any other exploit. After that, they make sure that the malicious activities survive system re-boot by creating an encoded autostart registry key. To remain undetected, this […]

Russia wants SAP and Apple source code

“to ensure users’ rights to privacy of their personal data and personal information, and information security for government agencies and corporate clients” Google Translate.

BadUSB – Turning USB peripherals into hacking vectors

Once reprogrammed, benign devices can turn malicious in many ways, including: A device can emulate a keyboard and issue commands on behalf of the logged-in user, for example to exfiltrate files or install malware. Such malware, in turn, can infect the controller chips of other USB devices connected to the computer. The device can also […]

Passport Database Outage: US Citizens can’t return home

US State Department database used to process passports and visas still hasn’t recovered from a crash last week — leaving tens of thousands of people stranded overseas. via Passport Database Outage: 'We Regret The Inconvenience' – InformationWeek. Yep, the power of big centralised databases!

Nasa validates ‘impossible’ space drive

British scientist Roger Shawyer has been trying to interest people in his EmDrive for some years through his company SPR Ltd. Shawyer claims the EmDrive converts electric power into thrust, without the need for any propellant by bouncing microwaves around in a closed container. He has built a number of demonstration systems[…]a US scientist, Guido […]

Which Creative Commons License is Right for me? as an image

Which Creative Commons License is Right for me?.

Skip to toolbar