Brain – Computer interfaces could be built from graphene: shown to safely interact with neurons in the brain

Researchers have successfully demonstrated how it is possible to interface graphene – a two-dimensional form of carbon – with neurons, or nerve cells, while maintaining the integrity of these vital cells. The work may be used to build graphene-based electrodes that can safely be implanted in the brain, offering promise for the restoration of sensory functions for amputee or paralysed patients, or for individuals with motor disorders such as epilepsy or Parkinson’s disease.

Source: Graphene shown to safely interact with neurons in the brain

Israeli Drone Feeds Hacked By British and American Intelligence

MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world.

Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.

Source: Israeli Drone Feeds Hacked By British and American Intelligence

The Jobs Most Likely to Be Taken Over by Robots In the Near Future

The World Economic Forum expects automation and robots will eliminate 5.1 million jobs within the next five years. That’s a scary thought, especially if you have one of these jobs that could theoretically be done more efficiently (and for less cost) with an automated machine.

Source: The Jobs Most Likely to Be Taken Over by Robots In the Near Future

NSA’s top hacking boss explains how his guys work

Rare public appearance from Tailored Access Operations leader

NSA tiger teams follow a six-stage process when attempting to crack a target, he explained. These are reconnaissance, initial exploitation, establish persistence, install tools, move laterally, and then collect, exfiltrate and exploit the data.

Source: NSA’s top hacking boss explains how to protect your network from his attack squads

Maybe not all accurate, considering where it came from, but interesting points anyway.

Microsoft Edge Browser private mode leaks data through cache

there are plenty of open source utilities available to offer a look inside the ESE Database on a standalone mode, i.e. without external support required. However, this entirely depends on the state in which the database is present. Being ESE database, in case of a dirty shutdown of the machine, there is high possibility of the extracted artifacts to be found in a dirty dismount state. Therefore, in that case, the examiner would first have to process it with Extensible Storage Engine Utilities provided by Microsoft Windows in order to further parse it in search of evidence.

History being the most majorly important database has been used an example for explaining the exploration of evidence in an ESE Database using a viewer or open source ESE DB reader.

Source: Microsoft Edge Browser Forensics – Exploring Project Spartan

Built-in LG smartphone app created data hack risk

“SNAP” allows an attacker to run arbitrary JavaScript code on the vulnerable LG devices, according to security researchers from Israeli security firms BugSec and Cynet. This might be easily exploited to allow private data leakage, phishing attacks and/or crash a vulnerable device, say the researchers.

The security flaw is rooted in a bug in one of the pre-installed LG applications, Smart Notice, which exists on every new LG G3 device. That’s why this device – but not other Android smartphone and tablets from other manufacturers, or earlier smartphones from LG – is vulnerable. LG debuted its Smart Notice app with the G3.

Source: Built-in LG smartphone app created data hack risk

Newegg sues patent troll that dropped its case

A patent-holding company called Minero Digital seeks to exact royalty payments on a wide range of USB hubs, suing more than two dozen retailers and manufacturers last year. But the “non-practicing entity” dropped its East Texas lawsuit against Newegg subsidiary Rosewill within days of getting a call from the company’s lawyer.

Newegg Chief Legal Officer Lee Cheng says the move is necessary since Minero dismissed its Texas lawsuit without prejudice, meaning it can refile the case at a time of its choosing.

“We just don’t believe Rosewill’s products and customers infringed on valid patent claims,” said Cheng. “Minero’s case does not have merit, and its patent is not only expired but would suck even if it wasn’t expired. Now that they have started the litigation, it would be irresponsible for Newegg to not finish it.”

Source: Newegg sues patent troll that dropped its case

Good for NewEgg! Patent Trolls represent only part of what is bad from the patenting system, hopefully one day it will be possible to sue these guys in such a way that patent trolling becomes impossible.

Anaheim cops in Disneyland’s backyard have had plane based mass mobile phone hacking stuff going for years

Pentagon: DRTBox can usually nab phone’s crypto session keys in under a second.

Source: City cops in Disneyland’s backyard have had “stingray on steroids” for years

Military grade Dirtboxes have been flying for the police without requiring a warrant for years. The 4th Reich irrepresive surveillance machine strikes again – Anaheim won’t be the only police force using this stuff.

GPS was broken for a while

On 26 January at 12:49 a.m. MST, the 2nd Space Operations Squadron at the 50th Space Wing, Schriever Air Force Base, Colo., verified users were experiencing GPS timing issues. Furtheri nvestigation revealed an issue in the Global Positioning System ground software which only affected the time on legacy L-band signals. This change occurred when the oldest vehicle, SVN 23, was removed from the constellation. While the core navigation systems were working normally, the coordinated universal time timing signal was off by 13 microseconds which exceeded the design specifications. The issue was
resolved at 6:10 a.m. MST, however global users may have experienced GPS timing issues for several hours.

Source: [time-nuts] Fwd: CGSIC: FW: Official Press Release – GPS Ground System Anomaly

Timing issues of 13 microseconds can make huge huge differences in accuracy. Very scary, especially considering the BAe / Russian / European systems are not fully implemented as a backup for most people.

Java getting rid of b0rked plugin

developers of applications that rely on the Java browser plugin need to consider alternative options such as migrating from Java Applets (which rely on a browser plugin) to the plugin-free Java Web Start technology.

Oracle plans to deprecate the Java browser plugin in JDK 9. This technology will be removed from the Oracle JDK and JRE in a future Java SE release.

Source: Moving to a Plugin-Free Web (Java Platform Group, Product Management blog)

I wonder how you get to access all the applets that currently need the java plugin? Many switches, routers and NAS appliances need the plugin and you don’t want to throw away your routing infrastructure just because they’re not forward compatible to Java Web Start…

A Health Insurer Lost Six Hard Drives Holding Data About 1 Million Customers

Centene, based in St Louis, says that the hard drives in question contain personal data about people who received laboratory services between 2009 and 2015. Stored on the drives are details including names, addresses, dates of birth, social security numbers, member ID numbers and health information.

Source: A Health Insurer Lost Six Hard Drives Holding Data About 1 Million Customers

Apple’s Safari browser is crashing on iPhones and Macs worldwide – turn off search suggestions helps.

Apple’s Safari browser appears to be experiencing issues worldwide this morning. Searching from the address bar in both iOS and OS X is causing the browser to crash in some instances. The Verge has confirmed the problem on several of our own iOS devices and at least one OS X machine.”Safari’s search suggestions are to blame”Steven Troughton-Smith, an iOS developer, notes that the problems are related to Safari’s search suggestions feature. Simply disabling this feature will stop Safari crashing, or using the private mode option in the browser as a temporary workaround

Source: Apple’s Safari browser is crashing on iPhones and Macs worldwide | The Verge

Lenovo ShareIT comes with hardcoded password and directory traversal

Hard-coded password in Lenovo SHAREit for Windows

[CVE-2016-1491] When Lenovo SHAREit for Windows is configured to receive files, a Wifi HotSpot is set with an easy password (12345678). Any system with a Wifi Network card could connect to that Hotspot by using that password. The password is always the same.

Remote browsing of file system on Lenovo SHAREit for Windows

[CVE-2016-1490] When the WiFi network is on and connected with the default password (12345678), the files can be browsed but not downloaded by performing an HTTP Request to the WebServer launched by Lenovo SHAREit

Source: Lenovo ShareIT Multiple Vulnerabilities

It’s not going well with Lenovo security

Quantum mechanics: Put three pigeons in two holes and none of them will be in the same hole.

We show that quantum mechanics violates one of the fundamental principles of nature: If you put three particles in two boxes, necessarily two particles will end up in the same box. We find instances when three quantum particles are put in two boxes, yet no two particles are in the same box, a seemingly impossible and absurd effect. This is only one of a host of related quantum effects which we discovered and which point to a very interesting structure of quantum mechanics that was hitherto unnoticed and has major implications for our understanding of nature. It requires us to revisit some of the most basic notions of quantum physics––the notions of separability, of correlations, and of interactions.

Source: Quantum violation of the pigeonhole principle and the nature of quantum correlations

Oxford Prof calulates how long it would take for large-scale conspiracies to reveal themselves

Dr Grimes initially created an equation to express the probability of a conspiracy being either deliberately uncovered by a whistle-blower or inadvertently revealed by a bungler. This factors in the number of conspirators, the length of time, and even the effects of conspirators dying, whether of old age or more nefarious means, for those conspiracies that do not require active maintenance.

Source: Equation shows that large-scale conspiracies would quickly reveal themselves

The equation was compared to known conspiracies to validate it. Turns out most conspiracies will make themselves known pretty quickly.

Skype finally hides IP adresses

Skype is fully committed to delivering as safe and secure of an experience as possible to our customers. We have recently introduced the ability to hide a Skype user’s IP address and we’ve set this as a default status in the latest versions of Skype. Starting with this update to Skype and moving forward, your…

Source: To our gamers: IP will now be hidden by default in latest update

About bloody time!

Microsoft struggles against self-inflicted Office 365 IMAP outage. 7 days and counting.

Microsoft engineers are struggling to fix a seven-day-old, self-inflicted Office 365 IMAP outage.

IMAP access to Office 365 tanked on January 18, meaning customers could not access emails using Exchange Online via IMAP or connect third-party mail clients via IMAP.

Microsoft told disgruntled Office 365 customers that the problem affected a limited number of licensees – but that those customers hit had a “large number of users.”

The culprit was found to be a botched Microsoft update that stopped the IMAP protocol automatically loading data from Exchange Online databases.

Source: Microsoft struggles against self-inflicted Office 365 IMAP outage

Cloud is a great idea. Not always.

Terrible infections, bad practices, unclean kit – welcome to hospital IT

Medicine is world’s worst industry for data security, it seems

Source: Terrible infections, bad practices, unclean kit – welcome to hospital IT

Hospitals running unpatched XP and 95, hardware vendors that ship 36 trojans with their patches, people running around pressing keyboard keys to make sure none of the PCs ever logs out, pacemakers with open debug routines that allow interruption of service, it’s quite an article.