Archive for August, 2016 | Monthly archive page

USBee stings air-gapped PCs: Wirelessly leak secrets with a file write on a USB stick, measuring the voltage changes

Dubbed USBee, the technique turns a computer’s USB ports into mini RF transmitters by modulating the data fed at high speed to plugged-in devices. By banging out a string of ‘0’ bits to a USB port, the voltage changes in the interface generate detectable emissions between 240MHz and 480MHz, according to Guri. Next, by writing […]

Dropbox: 2012 credentials file is real

A data dump purported to contain 60 million Dropbox user IDs [and passwords] is the real thing, with the company confirming it to The Register, and independent verification from security researcher Troy Hunt. Source: Dropbox: 2012 credentials file is real

Angler’s obituary: Super exploit kit was the work of Russia’s Lurk group

At its then peak, Angler was behind a whopping 40 percent of all exploit kit infections having compromised nearly 100,000 websites and tens of millions of users, generating some US$34 million annually for its authors. Source: Angler’s obituary: Super exploit kit was the work of Russia’s Lurk group

ReactOS Project: A free OS to run Windows programmes in

ReactOS is a free and open source operating system written from scratch. It’s design is based on Windows in the same way Linux is based on Unix, however ReactOS is _not_ linux. ReactOS looks and feels like Windows, is able to your run Windows software and your Windows drivers, and is familiar for Windows users […]

Research outlines cellular communication processes that show it’s a majority rule in your body

Scientists have long known that cells have various types of sensory abilities that are key to their function, such as sensing light, heat, nerve signals, damage, chemicals or other inputs. In this process, a chemical stimulus called ATP functions as a signaling molecule, which in turn causes calcium levels in a cell to rise and […]

Wine Worlds

The world’s annual consumption of wine is almost 250 million hectolitres (one hectolitre = 100 litres). That corresponds to the volume of 10,000 Olympic-size swimming pools. The United States accounts for 30 million hectolitres and has, in recent years, become the world’s largest market for wine – a position it took over from France in […]

Interactive cross-platform JavaScript HTML5 Charts, Maps, Stocks and Gantts for your project | AnyChart

AnyChart is a flexible JavaScript (HTML5) based solution that allows you to create interactive and great looking charts. It is a cross-browser and cross-platform charting solution intended for everybody who deals with creation of dashboard, reporting, analytics, statistical, financial or any other data visualization solutions. PCs, Macs, iPhones, iPads, Android devices – AnyChart works everywhere, […]

HERT explains man in the middle attack for non-technical people using Tinder very well

The explanation is first rate and will allow anyone to perform a non-technical man in the middle attack, going from eavesdropping to exploitation. Source: Tinder Social Engineering Attack – HERT

Windyty, wind map & forecast

Wind map and weather forecast Source: Windyty, wind map & forecast Absolutely gorgeous interactive moving windmap

Tens of Thousands of Infowars Accounts Hacked: thats the sound of thousands of conspiracy loons crinkling up their tin foil hats as the pull them on tighter

Infowars, created by famed radio host and conspiracy theorist Alex Jones, produces radio, documentaries and written pieces. The dumped data relates to Prison Planet TV, which gives paying subscribers access to a variety of Infowars content. The data includes email addresses, usernames, and poorly hashed passwords. The administrator of breach notification site Databases.Land provided a […]

FBI says foreign hackers penetrated two seperate state election systems

The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials. The FBI warning, contained in a “flash” alert from […]

DuoSkin – turn a temporary gold tattoo into a controller, communicator or display

DuoSkin is a fabrication process that enables anyone to create customized functional devices that can be attached directly on their skin. Using gold metal leaf, a material that is cheap, skin-friendly, and robust for everyday wear, we demonstrate three types of on-skin interfaces: sensing touch input, displaying output, and wireless communication. Source: DuoSkin | MIT […]

Picture This Clothing – design your own kids dress

Kids design their dresses hands-on. Parents send us a picture of their art. We send back your custom cut-and-sewn dress, ready to wear! Source: Picture This Clothing – Wear your Imagination!

WhatsApp’s Privacy Cred Just Took a Big Hit

Now that WhatsApp is sharing phone numbers with Facebook, it’s no longer the security oasis users relied on. Source: WhatsApp’s Privacy Cred Just Took a Big Hit | WIRED

How to opt out of WhatsApp sharing your information with Facebook

Since Facebook owns WhatsApp, it’s finally time for the purchase to pay off. Facebook now wants your WhatsApp data, including your phone number. Here’s how to opt out. Source: How to opt out of WhatsApp sharing your information with Facebook You have 30 days. Why is this a problem, what have they done? What do […]

NASA publishes all papers funded by it for free!

The National Aeronautics and Space Act of 1958 challenged our Nation to grow our technical and scientific abilities in air and space. Since the 1970s, numerous economic reports and articles have demonstrated that NASA investments help grow the US economy. Perhaps most importantly NASA-funded R&D helped stimulate our long-term capacity for innovation and economic growth […]

Microsoft and pals attempt to re-write Wassenaar cyber arms control pact written by people who have no idea about IT and will make IT security business almost impossible

Microsoft and a team of concerned engineers from across the security sector have joined forces to suggest a major re-write of the arms control pact the Wassenaar Arrangement, as they fear the document’s terms are a threat tot he information security industry. The pitch is the result of brainstorming by the group to redefine the […]

Find Out How Facebook Thinks You Think With This Setting

To get started, head to Here, you’ll find a large collection of “interests” Facebook thinks you have, sorted into categories. Click on “Lifestyle and Culture” to find, among other things, where you land politically. If you haven’t explicitly Liked the Facebook page of a particular politician, Facebook will guess and place that guess here. […]

IPhones completely compromised by NSO Group. Update now!

Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target’s mobile phone, was responsible for the intrusions. The NSO Group’s software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the […]

Hackers discover flaws in hospital security capitalise on it by shorting shares in the hospital

When a team of hackers discovered that St. Jude Medical Inc.’s pacemakers and defibrillators had security vulnerabilities that could put lives at risk, they didn’t warn St. Jude. Instead, the hackers, who work for cybersecurity startup MedSec, e-mailed Carson Block, who runs the Muddy Waters Capital LLC investment firm, in May. They had a money-making […]

Windows 10 shows why automatic updates are bad, breaking powershell, webcams and rebooting randomly during activities.

Microsoft’s update for version 1607 doesn’t fix two widespread problems with Windows 10 Anniversary Update, and it causes problems with PowerShell DSC operations Source: Windows 10 cumulative update KB 3176934 breaks PowerShell This update contained a fix for the borked update below: The Windows 10 Anniversary Update has reportedly broken millions of webcams. If your […]

NSA cyberweapons being sold by hackers are real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect […]

Splash allows you to search for pictures on 500px by drawing your own colours

Select a color and size for your brush. Then, Splash paint on the canvas and see matching photos appear in your search results. Keep adding colors to see your results change, and adjust the category filter to see different images. 500px

All of the Creepy Things Facebook Knows About You

Facebook knows more about your personal life than you probably realize. As part of the company’s increasingly aggressive advertising operation, Facebook goes to great lengths to track you across the web. The company compiles a list of personal details about every user that includes major life events and general interests. For years, details have been […]

With TLS encryption, attackers can use this as a tunnel to hide attacks from legacy packet inspection tools.

​Exactly a year ago, attackers used an advertisement on Yahoo to redirect users to a site infected by the Angler exploit kit. Just weeks before, users were exposed to more malicious software through compromised advertisements that showed up across the web. In total, at least 910 million users were potentially exposed to malware through these […]

Skip to toolbar