Brain – Computer interfaces could be built from graphene: shown to safely interact with neurons in the brain

Researchers have successfully demonstrated how it is possible to interface graphene – a two-dimensional form of carbon – with neurons, or nerve cells, while maintaining the integrity of these vital cells. The work may be used to build graphene-based electrodes that can safely be implanted in the brain, offering promise for the restoration of sensory functions for amputee or paralysed patients, or for individuals with motor disorders such as epilepsy or Parkinson’s disease.

Source: Graphene shown to safely interact with neurons in the brain

Israeli Drone Feeds Hacked By British and American Intelligence

MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world.

Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.

Source: Israeli Drone Feeds Hacked By British and American Intelligence

The Jobs Most Likely to Be Taken Over by Robots In the Near Future

The World Economic Forum expects automation and robots will eliminate 5.1 million jobs within the next five years. That’s a scary thought, especially if you have one of these jobs that could theoretically be done more efficiently (and for less cost) with an automated machine.

Source: The Jobs Most Likely to Be Taken Over by Robots In the Near Future

NSA’s top hacking boss explains how his guys work

Rare public appearance from Tailored Access Operations leader

NSA tiger teams follow a six-stage process when attempting to crack a target, he explained. These are reconnaissance, initial exploitation, establish persistence, install tools, move laterally, and then collect, exfiltrate and exploit the data.

Source: NSA’s top hacking boss explains how to protect your network from his attack squads

Maybe not all accurate, considering where it came from, but interesting points anyway.

Microsoft Edge Browser private mode leaks data through cache

there are plenty of open source utilities available to offer a look inside the ESE Database on a standalone mode, i.e. without external support required. However, this entirely depends on the state in which the database is present. Being ESE database, in case of a dirty shutdown of the machine, there is high possibility of the extracted artifacts to be found in a dirty dismount state. Therefore, in that case, the examiner would first have to process it with Extensible Storage Engine Utilities provided by Microsoft Windows in order to further parse it in search of evidence.

History being the most majorly important database has been used an example for explaining the exploration of evidence in an ESE Database using a viewer or open source ESE DB reader.

Source: Microsoft Edge Browser Forensics – Exploring Project Spartan

Built-in LG smartphone app created data hack risk

“SNAP” allows an attacker to run arbitrary JavaScript code on the vulnerable LG devices, according to security researchers from Israeli security firms BugSec and Cynet. This might be easily exploited to allow private data leakage, phishing attacks and/or crash a vulnerable device, say the researchers.

The security flaw is rooted in a bug in one of the pre-installed LG applications, Smart Notice, which exists on every new LG G3 device. That’s why this device – but not other Android smartphone and tablets from other manufacturers, or earlier smartphones from LG – is vulnerable. LG debuted its Smart Notice app with the G3.

Source: Built-in LG smartphone app created data hack risk

Newegg sues patent troll that dropped its case

A patent-holding company called Minero Digital seeks to exact royalty payments on a wide range of USB hubs, suing more than two dozen retailers and manufacturers last year. But the “non-practicing entity” dropped its East Texas lawsuit against Newegg subsidiary Rosewill within days of getting a call from the company’s lawyer.

Newegg Chief Legal Officer Lee Cheng says the move is necessary since Minero dismissed its Texas lawsuit without prejudice, meaning it can refile the case at a time of its choosing.

“We just don’t believe Rosewill’s products and customers infringed on valid patent claims,” said Cheng. “Minero’s case does not have merit, and its patent is not only expired but would suck even if it wasn’t expired. Now that they have started the litigation, it would be irresponsible for Newegg to not finish it.”

Source: Newegg sues patent troll that dropped its case

Good for NewEgg! Patent Trolls represent only part of what is bad from the patenting system, hopefully one day it will be possible to sue these guys in such a way that patent trolling becomes impossible.

Anaheim cops in Disneyland’s backyard have had plane based mass mobile phone hacking stuff going for years

Pentagon: DRTBox can usually nab phone’s crypto session keys in under a second.

Source: City cops in Disneyland’s backyard have had “stingray on steroids” for years

Military grade Dirtboxes have been flying for the police without requiring a warrant for years. The 4th Reich irrepresive surveillance machine strikes again – Anaheim won’t be the only police force using this stuff.

GPS was broken for a while

On 26 January at 12:49 a.m. MST, the 2nd Space Operations Squadron at the 50th Space Wing, Schriever Air Force Base, Colo., verified users were experiencing GPS timing issues. Furtheri nvestigation revealed an issue in the Global Positioning System ground software which only affected the time on legacy L-band signals. This change occurred when the oldest vehicle, SVN 23, was removed from the constellation. While the core navigation systems were working normally, the coordinated universal time timing signal was off by 13 microseconds which exceeded the design specifications. The issue was
resolved at 6:10 a.m. MST, however global users may have experienced GPS timing issues for several hours.

Source: [time-nuts] Fwd: CGSIC: FW: Official Press Release – GPS Ground System Anomaly

Timing issues of 13 microseconds can make huge huge differences in accuracy. Very scary, especially considering the BAe / Russian / European systems are not fully implemented as a backup for most people.

Java getting rid of b0rked plugin

developers of applications that rely on the Java browser plugin need to consider alternative options such as migrating from Java Applets (which rely on a browser plugin) to the plugin-free Java Web Start technology.

Oracle plans to deprecate the Java browser plugin in JDK 9. This technology will be removed from the Oracle JDK and JRE in a future Java SE release.

Source: Moving to a Plugin-Free Web (Java Platform Group, Product Management blog)

I wonder how you get to access all the applets that currently need the java plugin? Many switches, routers and NAS appliances need the plugin and you don’t want to throw away your routing infrastructure just because they’re not forward compatible to Java Web Start…