Project Zero: FireEye security appliance Exploited by passing jar file through it

FireEye sell security appliances to enterprise and government customers. FireEye’s flagship products are monitoring devices designed to be installed at egress points of large networks, i.e. where traffic flows from the intranet to the internet. Source: Project Zero: FireEye Exploitation: Project Zero’s Vulnerability of the Beast All you need to do is send the jar Read more about Project Zero: FireEye security appliance Exploited by passing jar file through it[…]

Bionic eye will send images direct to the brain to restore sight via 500 pixel “display”

The plan is to implant up to 11 small tiles, each loaded with 43 electrodes, into areas of the brain that deal with vision. When these areas are stimulated, people report seeing flashes of light. Lowery believes that each electrode could create a dot of light that is similar to seeing one pixel. In total, Read more about Bionic eye will send images direct to the brain to restore sight via 500 pixel “display”[…]

Microsoft: Upgrade to Windows 10 NOW or TONIGHT!

The large pop-up screen, which first appeared over the weekend, gives users the option of upgrading straight away or … that evening. Users can still opt out by clicking on the red ‘X’ in the top right corner of the window, but less savvy computer users (part of Redmond’s core market segments) might not figure Read more about Microsoft: Upgrade to Windows 10 NOW or TONIGHT![…]

Machine Learning Inspired by Human Learning  – AI can learn handwriting using a single example

Taking inspiration from the way humans seem to learn, scientists have created AI software capable of picking up new knowledge in a far more efficient and sophisticated way. The new AI program can recognize a handwritten character about as accurately as a human can, after seeing just a single example. The best existing machine-learning algorithms, Read more about Machine Learning Inspired by Human Learning  – AI can learn handwriting using a single example[…]

Congress strips out privacy protections from CISA ‘security’ bill

Under the original CISA legislation, companies would share their users’ information with federal government departments once it had been anonymized. The government could then analyze it for online threats, while the companies received legal immunity from prosecution for breaking existing privacy agreements. But as the bill was amended, the privacy parts of the proposed law Read more about Congress strips out privacy protections from CISA ‘security’ bill[…]

Grub2 Authentication Bypass: press backspace 28 times

A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009) to 2.02 (December, 2015) are affected. The vulnerability can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And so, the attacker may take control of the computer. Source: Back to 28: Grub2 Authentication Read more about Grub2 Authentication Bypass: press backspace 28 times[…]

Cox Is Liable for Pirating Subscribers, Ordered to pay $25 million

Internet provider Cox Communications is responsible for the copyright infringements of its subscribers, a Virginia federal jury has ruled. The ISP is guilty of willful contributory copyright infringement and must pay music publisher BMG $25 million in damages. cox-logoToday marks the end of a crucial case that will define how U.S. Internet providers deal with Read more about Cox Is Liable for Pirating Subscribers, Ordered to pay $25 million[…]