Researchers find security flaws in backscatter X-ray scanners

In laboratory tests, the team was able to successfully conceal firearms and plastic explosive simulants from the Rapiscan Secure 1000 scanner. The team was also able to modify the scanner operating software so it presents an “all-clear” image to the operator even when contraband was detected via Researchers find security flaws in backscatter X-ray scanners Read more about Researchers find security flaws in backscatter X-ray scanners[…]

UPS: We’ve Been Hacked – Credit Card data compromised since January

The United Parcel Service announced Wednesday that customers’ credit and debit card information at 51 franchises in 24 states may have been compromised. There are 4,470 franchised center locations throughout the U.S., according to UPS. via UPS: We’ve Been Hacked – TIME. So you don’t know when UPS found out about the hack, but if Read more about UPS: We’ve Been Hacked – Credit Card data compromised since January[…]

Internet provider Ziggo promises unlimited acces to internet with all devices. Limits access.

Ziggo claims: “Unlimited access to WifiSpots” (WifiSpot is a wifi sharing service whereby you can access wifi from all Ziggo subscribers). Also claims: “Internet on multiple devices silmutaneously” and “The whole famile online easily at the same time. Via computer, tablet and mobile”. Unfortunately they only allow access to two devices on Wifispots at the Read more about Internet provider Ziggo promises unlimited acces to internet with all devices. Limits access.[…]

Use a video of a crisps bag to hear what is said in the room

Researchers at MIT, Microsoft, and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video. In one set of experiments, they were able to recover intelligible speech from the vibrations of a potato-chip bag photographed from 15 feet away through soundproof glass. via Extracting audio Read more about Use a video of a crisps bag to hear what is said in the room[…]

Cisco’s need upgrading – routing tables are up for grabs!

Multiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic. via Cisco Security Advisory: OSPF LSA Manipulation Vulnerability Read more about Cisco’s need upgrading – routing tables are up for grabs![…]

US Terrorist-Tracking System tracks many many non-terrorists

Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local Read more about US Terrorist-Tracking System tracks many many non-terrorists[…]

Monkey selfie at heart of copyright controversy

A photographer who set up a load of cameras in the wild can’t get pictures of a monkey removed from Wikipedia, as the monkey pressed the shutter. Wikipedia argues that this means that nobody owns the copyright. I wonder what the BBC series Earth has to say about this? Wikipedia refuses to delete photo as Read more about Monkey selfie at heart of copyright controversy[…]

Child porn used to justify reading of cloud data by Google, MicroSoft

With privacy concerns being raised more and more about the use of cloud storage, tech giants are turning to the age old scare tactic of using child porn as an excuse to burrow through users data. Google Spotted Explicit Images Of A Child In A Man's Email And Tipped Off The Authorities – Business Insider. Read more about Child porn used to justify reading of cloud data by Google, MicroSoft[…]

Twitch TV shows why copyright is ridiculous as it shuts down music in videos

Twitch TV – a gaming TV channel with billions of watchers – will attempt to detect music playing in the background. If a 10 second spell seems to be copyrighted, they will remove the sound for half an hour. I suppose the rationale is that the music companies and the RIAA think this is a Read more about Twitch TV shows why copyright is ridiculous as it shuts down music in videos[…]

Russia gang hacks 1.2 billion usernames and passwords

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses, according to Hold Security – a US firm specialising in discovering breaches. Hold Security described the hack as the "largest data breach known to date". It claimed the stolen information came from more than 420,000 websites, including Read more about Russia gang hacks 1.2 billion usernames and passwords[…]

seL4 – Open source formally verified bug free microkernel OS released

General Dynamics C4 Systems and NICTA are pleased to announce the open sourcing of seL4, the world’s first operating-system kernel with an end-to-end proof of implementation correctness and security enforcement. It is still the world’s most highly-assured OS. What’s being released? It includes all of the kernel’s source code, all the proofs, plus other code Read more about seL4 – Open source formally verified bug free microkernel OS released[…]

Aero Glass – AR for pilots using Epson Moverio glasses

Using the Epson Moverio glasses, Augmented reality projects the following features onto the lenses in 3D. Airports Navigation Aids ADS-B traffic Flight Plan route & waypoints Airways Geographic points of interest (cities, villages, visual navigation points) Soon followed by: Airspaces Terrain elevation Procedures ILS approach cones FLARM traffic (for glider) Weather Dynamic Data (NOTAM, TFRs) Read more about Aero Glass – AR for pilots using Epson Moverio glasses[…]

Malware without files on the PC, encoded in the registry

As the entry point, they exploit a vulnerability in Microsoft Word with the help of a crafted Word document they spread via email. The same approach would work with any other exploit. After that, they make sure that the malicious activities survive system re-boot by creating an encoded autostart registry key. To remain undetected, this Read more about Malware without files on the PC, encoded in the registry[…]

BadUSB – Turning USB peripherals into hacking vectors

Once reprogrammed, benign devices can turn malicious in many ways, including: A device can emulate a keyboard and issue commands on behalf of the logged-in user, for example to exfiltrate files or install malware. Such malware, in turn, can infect the controller chips of other USB devices connected to the computer. The device can also Read more about BadUSB – Turning USB peripherals into hacking vectors[…]

Nasa validates ‘impossible’ space drive

British scientist Roger Shawyer has been trying to interest people in his EmDrive for some years through his company SPR Ltd. Shawyer claims the EmDrive converts electric power into thrust, without the need for any propellant by bouncing microwaves around in a closed container. He has built a number of demonstration systems[…]a US scientist, Guido Read more about Nasa validates ‘impossible’ space drive[…]