Hotel CEO openly celebrates higher prices after NYC anti-Airbnb law passes

A hotel executive said a recently-passed New York law cracking down on Airbnb hosts will enable the company to raise prices for New York City hotel rooms, according to the transcript of the executive’s words on a call with shareholders last week. The law, signed by New York’s Governor Andrew Cuomo on Friday, slaps anyone Read more about Hotel CEO openly celebrates higher prices after NYC anti-Airbnb law passes[…]

Mike Kelley Aviation Art

Mike Kelley is a Los Angeles based artist specializing in architectural, aerial, and aviation photography. Source: Mike Kelley Art This stuff is made by sitting at an airport, taking pictures of everything that flies by and then creating a composite.

US Copyright Office stalls a year, but finally allows pentesting

Long-overdue rules protecting security research and vehicle repair have finally taken effect, as they should have done last year. Though the Copyright Office and the Librarian of Congress unlawfully and pointlessly delayed their implementation, for the next two years the public can take advantage of the freedom they offer. Source: Why Did We Have to Read more about US Copyright Office stalls a year, but finally allows pentesting[…]

Recording Keystroke Sounds Over Skype to Steal User Data

The researchers found that when connected to a target user on a Skype call, they could record the audio of the user’s keystrokes. With a small amount of knowledge about the victim’s typing style and the keyboard he’s using, the researchers could accurately get 91.7 percent of keystrokes. The attack does not require any malware Read more about Recording Keystroke Sounds Over Skype to Steal User Data[…]

Kids today are so stupid they fall for security scams more often than greybeards

Redmond’s digital crimes unit senior attorney Courtney Gregoire says half of respondents between the age of 18 and 34 had followed tech support scammer instructions, handing over remote access to their machines or downloading software after encountering a scam page. Only 17 per cent of respondents 55 years and older took the bait. Meanwhile, one Read more about Kids today are so stupid they fall for security scams more often than greybeards[…]

Meanwhile, in America: Half of adults’ faces are in police databases

Images representing 117 million American adults – almost half the grownups in the country – can be found in the facial recognition databases maintained by US law enforcement agencies, according to a study conducted by the Center on Privacy and Technology at Georgetown Law School. That figure is expected to grow as facial recognition technology Read more about Meanwhile, in America: Half of adults’ faces are in police databases[…]

Intel CPU memory location randomisation weakness broken by flooding branch buffer

The BTB provides a history of branches taken by the processor as it runs through its code: after the CPU is told to make a decision, it usually jumps to another part of the program based on the outcome of that decision. For example, if something fetched from memory has a value greater than zero, Read more about Intel CPU memory location randomisation weakness broken by flooding branch buffer[…]

Consumer Reports Now Ranks Tesla Among the Least Reliable Carmakers

When it gave the Tesla Model S an unprecedented 103 out of 100 score last August, Consumer Reports looked like it might try to marry Elon Musk’s company and have its little electric car babies. But after a year of disappointments, trust violations and janky-ass door handles, it seems the magazine can no longer advocate Read more about Consumer Reports Now Ranks Tesla Among the Least Reliable Carmakers[…]

Rowhammer Attack Can Now Root Android Devices

For the past two years, since researchers discovered the attack, the term Rowhammer has been used to describe a procedure through which attackers launch read & write operations at a row of memory bits inside a RAM memory card. The repeated read and write operations cause an electromagnetic field to appear, which changes local memory Read more about Rowhammer Attack Can Now Root Android Devices[…]

The Microsoft Cognitive Toolkit now on Github: deep learning AI that recognises human speech at very low error rates

The Microsoft Cognitive Toolkit—previously known as CNTK—helps you harness the intelligence within massive datasets through deep learning. Source: The Microsoft Cognitive Toolkit – Microsoft Research They also offer RESTful APIs on another site, Cognitive Services, with applications you can tap into and APIs for vison, speech, language, knowledge and search. They usually offer free testing, Read more about The Microsoft Cognitive Toolkit now on Github: deep learning AI that recognises human speech at very low error rates[…]

Projection mapping on a moving surface

This research aims at overcoming this limitation and realizes dynamic projection mapping in which dynamically-changing real-world and virtual visual information are completely merged in the level of human visual perception. This high-speed dynamic projection mapping requires a high-speed projector enabling high-frame-rate and low-latency projection. In order to meet this demand, we have developed a high-speed Read more about Projection mapping on a moving surface[…]

Adding a phone number to your Google account can make it LESS secure (because telco insecurity).

On Oct 1, after a 2h absence from his phone, Bob attempted to check his email and discovered he’d been logged out of his gmail account. Upon trying to log back in, Google notified him that his email password had been changed less than an hour ago. He then tried to make a call and Read more about Adding a phone number to your Google account can make it LESS secure (because telco insecurity).[…]

Dirty COW (CVE-2016-5195) Linux privilege escalation

What is the CVE-2016-5195? CVE-2016-5195 is the official reference to this bug. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names maintained by MITRE. Why is it called the Dirty COW bug? “A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of Read more about Dirty COW (CVE-2016-5195) Linux privilege escalation[…]

DNS devastation: Top websites whacked offline as Dyn dies again

An extraordinary, focused attack on DNS provider Dyn continues to disrupt internet services for hundreds of companies, including online giants Twitter, Amazon, AirBnB, Spotify and others. The worldwide assault started at approximately 11am UTC on Friday. It was a massive denial-of-service blast that knocked Dyn’s DNS anycast servers offline, resulting in knock-on impacts across the Read more about DNS devastation: Top websites whacked offline as Dyn dies again[…]

Using search warrants to get into fingerprint-locked phones

Investigators in Lancaster, Calif., were granted a search warrant last May with a scope that allowed them to force anyone inside the premises at the time of search to open up their phones via fingerprint recognition, Forbes reported Sunday.The government argued that this did not violate the citizens’ Fifth Amendment protection against self incrimination because Read more about Using search warrants to get into fingerprint-locked phones[…]

making paralysed people feel through fake hands

Touch is essential for hand use. Yet, brain-controlled prosthetic limbs have not been endowed with this critical sense. In a new study by Flesher et al ., microelectrode arrays were implanted into the primary somatosensory cortex of a person with spinal cord injury and, by delivering current through the electrodes, generated sensations of touch that Read more about making paralysed people feel through fake hands[…]

Court finds GCHQ and MI5 engaged in illegal bulk data collection

The mysterious Investigatory Powers Tribunal, which oversees Blighty’s snoops, has ruled that the bulk collection of personal data — conducted by GCHQ and MI5 between 1998 and 2015 — was illegal. Responding to a claim brought by Privacy International, the 70-page judgment handed down this morning [PDF] found that the spooks’ surveillance activities had been Read more about Court finds GCHQ and MI5 engaged in illegal bulk data collection[…]

UK wants to monitor fake boobs, claims event 6 years ago is catalyst

The Breast and Cosmetic Implant Registry (BCIR) is intended to prevent a repeat of faulty Poly Implant Prothèse (PIP) silicone breast implants scandal in 2010, in which fraudulently manufactured silicone gel implants affected thousands of women. Its establishment is in response to recommendation 21 in Sir Bruce Keogh’s Review of the Regulation of Cosmetic interventions, Read more about UK wants to monitor fake boobs, claims event 6 years ago is catalyst[…]