Archive for February, 2016 | Monthly archive page

Windows 10 Is Showing Ads On Your Lockscreen, Here’s How to Turn Them Off

Windows 10’s new Spotlight feature usually shows you neat photographs and fun facts when you first start your computer. Now, it’s started showing ads. Here’s how to turn it off. Source: Windows 10 Is Showing Ads On Your Lockscreen, Here’s How to Turn Them Off So not only is Windows invading your privacy with windows […]

All known battles ever on a world map with links to basic information.

nodegoat is a web-based data management, analysis & visualisation environment. Source: Battles | Public Interface | nodegoat

NL Minister Blok takes flying leap from reality in criticism of open source

The minister states that he thinks (his vision is backed by a bunch of closed source software vendors [Microsoft, Oracle, SAP, KPN, CapGemini, Ordina, ATOS, CGI and IBM]) that not having to buy licenses is offset by the costs of having to manage and pay for the deployments of open source software (OSS). Which is […]

A 19-year-old made a free robot lawyer that has appealed $3 million in parking tickets

It’s a simple bot that helps with court appeals — but could it replace the need for human lawyers? Source: A 19-year-old made a free robot lawyer that has appealed $3 million in parking tickets

Mousejack Attacks Abuse Vulnerable Wireless Keyboard, Mouse Dongles

The issue lies in the wireless USB dongles that the keyboards and mice use to communicate over radio frequencies with the host computer. Bastille says that while communication from most keyboards to the dongle is encrypted, none of the mice it tested encrypt their wireless communication. The dongle, therefore, will accept commands from an attacker […]

Companies Are Using Big Data to Discourage Employees From Having Costly Surgery

Do you work for a big company? Have you been having back pain? Your company probably knows about it already thanks to high-tech healthcare companies that it hired. Welcome to our brave new world of big data. Source: Companies Are Using Big Data to Discourage Employees From Having Costly Surgery They are using this to […]

Confused as to WTF is happening with Apple, the FBI and a killer’s iPhone? Let’s fix that

Here’s a clear, technical Q&A Source: Confused as to WTF is happening with Apple, the FBI and a killer’s iPhone? Let’s fix that It’s a good story by the reg.

glibc getaddrinfo stack-based buffer overflow – patch now

The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack. Google has found some mitigations that may help prevent exploitation if you are not able to […]

Denuvo Anti-Piracy Tech stays good during the sales window of games, which is long enough

More than two months after release, it’s still not possible to pirate Just Cause 3. The same is true for Rise of the Tomb Raider, released for PC in late January. Cracking computer games used to be measured in hours or days, but now, it’s turning into weeks and months. The nature of piracy is […]

Eternal 5D data storage could record the history of humankind for billions of years

Using nanostructured glass, scientists from the University’s Optoelectronics Research Centre (ORC) have developed the recording and retrieval processes of five dimensional (5D) digital data by femtosecond laser writing. The storage allows unprecedented properties including 360 TB/disc data capacity, thermal stability up to 1,000°C and virtually unlimited lifetime at room temperature (13.8 billion years at 190°C […]

Air Spaces: Where the Planes Fly – Views of the World

The following map is a gridded cartogram visualisation of global flight tracks taken from the OpenFlights database. The map distorts the land area by the number of flights that pass a certain space Source: Air Spaces: Where the Planes Fly – Views of the World

Crims unleashed IRS-stabbing malware in bid to rob 464,000 people

Fraudsters, armed with stolen social security numbers and other personal information on nearly half a million people, used malware to systematically request PINs corresponding to those taxpayers, allowing the crooks to potentially file paperwork on their behalf. The swindlers could put their own bank account details on the tax returns, thus channelling people’s rebates into […]

Rabbit brain frozen completely intact – now to thaw it…

Using a combination of ultrafast chemical fixation and cryogenic storage, it is the first demonstration that near­ perfect, long­-term structural preservation of an intact mammalian brain is achievable. Source: The Brain Preservation Foundation – Small Mammal BPF Prize Winning Announcement Renewal of cryogenics?

Google retires Picasa for Photos, no desktop alternative in sight

As of March 15, 2016, we will no longer be supporting the Picasa desktop application. For those who have already downloaded this—or choose to do so before this date—it will continue to work as it does today, but we will not be developing it further, and there will be no future updates. If you choose […]

Adobe Creative Cloud update deletes first file in directories. Kills backups.

How about this for bizarre bug of the week: the latest version of Adobe Creative Cloud deletes the first hidden directory in root directories on Macs. That’s bad news for users of BackBlaze: the backup software stores a .bzvol folder in the top level of every drive it backs up, and uses these folders to […]

GCHQ hacking phones and computers is legal, says top UK court

Computer, smartphone and network hacking by UK intelligence agency GCHQ is legal, a security tribunal has said. The Investigatory Powers Tribunal ruled on Friday that computer network exploitation (CNE) – which can include remotely activating microphones and cameras on electronic devices such as iPhones without the owner’s knowledge – is legal. The case, which was […]

GPS/INS accuracy to within a centimetre: A Common-Position-Shift Approach

This has been done in the past, but the computing power required has made it impractical. A new algorithm makes it possible to do this with much less computational grunt. Source: Computationally Efficient Carrier Integer Ambiguity Resolution in Multiepoch GPS/INS: A Common-Position-Shift Approach

Vodafone network allows you to copy yourself into someone elses conversation

The Vodafone network does not generate random TMSI numbers, which allows you to copy them and thereby listen in to other ongoing conversations. The network won’t throw off duplicates. If you have an IMSI catcher you can exploit this. It does, however, put the phone into conference call mode, which shows up on the screen. […]

A 3D bioprinting system to produce human-scale tissue constructs with structural integrity

We present an integrated tissue–organ printer (ITOP) Source: A 3D bioprinting system to produce human-scale tissue constructs with structural integrity : Nature Biotechnology : Nature Publishing Group It can print an ear with enough structural integrity to be transplanted

Kanboard tasking software

It looks nice 🙂 Better than a todo list, better than a scrum board, software kept simple. Download it here

Amazon releases Lumberyard game engine and assets for free, based on CryEngine

Happy game building! Source: Amazon Lumberyard Downloads

The size of your pupil shows which letter you are reading

We present a new human-computer interface that is based on decoding of attention through pupillometry. Our method builds on the recent finding that covert visual attention affects the pupillary light response: Your pupil constricts when you covertly (without looking at it) attend to a bright, compared to a dark, stimulus. In our method, participants covertly […]

NASA announces that Pluto has icebergs floating on glaciers of nitrogen ice

The most recent finding from New Horizons show that ice bergs have broken off from the hills surrounding the Sputnik Planum, a glacier of nitrogen ice, and are floating slowly across its surface, eventually to cluster together in places like the Challenger Colles, informally named after the crew of the space shuttle Challenger, which was […]

Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks

Today at the Security Analyst Summit, researchers from Kaspersky Lab Global Research & Analysis Team unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more […]

Hacker Publishes Personal Info of 20,000 FBI Agents

As promised, hacker publishes personal information of 20,000 FBI agents, allegedly stolen from a hacked Department of Justice computer. Source: Hacker Publishes Personal Info of 20,000 FBI Agents | Motherboard

 
Skip to toolbar