Archive for November, 2016 | Monthly archive page

TensorFlow — Googles’ Open Source Software Library for Machine Intelligence

TensorFlow™ is an open source software library for numerical computation using data flow graphs. Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional data arrays (tensors) communicated between them. The flexible architecture allows you to deploy computation to one or more CPUs or GPUs in a desktop, server, or mobile […]

Everything finds every file you search for in your Windows

“Everything” is search engine that locates files and folders by filename instantly for Windows.Unlike Windows search “Everything” initially displays every file and folder on your computer (hence the name “Everything”).You type in a search filter to limit what files and folders are displayed. Source: Everything

Acquired administrator level access to all of the Microsoft Azure managed Red Hat Update Infrastructure that supplies all the packages for all Red Hat Enterprise Linux instances booted from the Azure marketplace.

Acquired administrator level access to all of the [Microsoft Azure](https://azure.microsoft.com) managed [Red Hat Update Infrastructure](https://access.redhat.com/documentation/en/red-hat-update-infrastructure/3.0.beta.1/paged/system-administrator-guide/chapter-1-about-red-hat-update-infrastructure) that supplies all the packages for all [Red Hat Enterprise Linux](https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux) instances booted from the Azure marketplace. Basically it’s easy to find all servers, then bump up a package version number, upload it to the update host and get all […]

These Are The 48 Organizations That Now Have Access To Every Brit’s Browsing History

While the UK was obsessing with Brexit and its aftermath, parliament quietly passed a contentious snooping law that gives authorities, everyone from police and spies to food regulators, fire officials and tax inspectors, the right to legally look at the internet browsing records of everyone in the country. […] Which government agencies have access to […]

Battery breakthrough will let phones charge in seconds and last for a week

charge has been created by researchers at the University of Central Florida. The high-powered battery is packed with supercapacitors that can store a large amount of energy. It looks like a thin piece of flexible metal that is about the size of a finger nail and could be used in phones, electric vehicles and wearables, […]

Google’s AI translation tool seems to have invented its own secret internal language

If you can translate from A to B and from B to C can you translate from A to C without learning the translations directly? Well yes you can. So the translate AI has created its’ own language B (we think) that can function as a midpoint between not only A and C, but also […]

The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger. In all, the FBI obtained over 8,000 IP […]

Thermoelectric paint enables walls to convert heat into electricity

Already researchers have developed photovoltaic paint, which can be used to make “paint-on solar cells” that capture the sun’s energy and turn it into electricity. Now in a new study, researchers have created thermoelectric paint, which captures the waste heat from hot painted surfaces and converts it into electrical energy. “I expect that the thermoelectric […]

Surveillance camera compromised in 98 seconds

Robert Graham, CEO of Errata Security, on Friday documented his experience setting up a $55 JideTech security camera behind a Raspberry Pi router configured to isolate the camera from his home network. According to Graham’s series of Twitter posts, his camera was taken over by the Mirai botnet in just 98 seconds. Note: it was […]

Royal Navy to lose missiles and be left only with guns

Royal Navy warships will be left without anti-ship missiles and be forced to rely on naval guns because of cost-cutting, the Ministry of Defence has admitted. The Navy’s Harpoon missiles will retire from the fleet’s frigates and destroyers in 2018 without a replacement, while there will also be a two year gap without helicopter-launched anti-shipping […]

Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The UK has just passed a massive expansion in surveillance powers, which critics have called “terrifying” and “dangerous”. The new law, dubbed the “snoopers’ charter”, was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general […]

NIH Scientists Identify Potent Antibody that Neutralizes Nearly All HIV Strains

Scientists from the National Institutes of Health have identified an antibody from an HIV-infected person that potently neutralized 98 percent of HIV isolates tested, including 16 of 20 strains resistant to other antibodies of the same class. The remarkable breadth and potency of this antibody, named N6, make it an attractive candidate for further development […]

Siri on apple lockscreens leads to people being able to break into the device

A series of YouTube videos are pointing out a flaw that could allow users to access photos on an iPhone without entering in a passcode. This requires physical access to the device, and Siri on the lock screen needs to be enabled. Source: This Weird Trick Apparently Lets You Bypass Any iPhone’s Lock Screen It […]

The Secret Service Has Lost 1,024 Computers Since 2001

The US Secret Service is tasked with keeping the President and members of his family safe. But newly released documents show that the agency has had trouble keeping tabs on its own equipment. Since 2001, the agency has lost at least 1,024 computers, 736 mobile phones, and 121 guns. Judicial Watch obtained the numbers through […]

Three Mobile hack: millions of UK customers breached

hree has suffered a massive data breach in which the personal information and contact details of millions of customers could have been accessed. It is believed to one of the largest hacks of its kind to affect people living in Britain. Here’s everything you need to know about the hack. What happened? UK-based cyber criminals […]

Apple Will Fix ‘Touch Disease’ on Your iPhone for Just $150

Apple now has a repair program in place to address the so-called “Touch Disease” problem that the iPhone repair community first raised in August. Over time, some iPhone 6 Plus users reported that the touchscreen on the phones became unresponsive, with a flickering gray bar eventually showing up at the top of the screen. Dubbed […]

Miles Deep – AI Porn Video Editor

Using a deep convolutional neural network with residual connections, Miles Deep quickly classifies each second of a pornographic video into 6 categories based on sexual act with 95% accuracy. Then it uses that classification to automatically edit the video. It can remove all the scenes not containing sexual contact, or edit out just a specific […]

Hard Drive Test Data – Determining Failure Rates and More

Since 2013, Backblaze has published statistics and insights based on the hard drives in our data center. You’ll find links to those reports below. We also publish the data underlying these reports, so that anyone can reproduce them. You’ll find an overview of this data and the download links further down this page. Source: Hard […]

CRISPR gene-editing tested in a person for the first time

A Chinese group has become the first to inject a person with cells that contain genes edited using the revolutionary CRISPR–Cas9 technique. On 28 October, a team led by oncologist Lu You at Sichuan University in Chengdu delivered the modified cells into a patient with aggressive lung cancer as part of a clinical trial at […]

A.I. Experiments by Google

AI Experiments is a showcase for simple experiments that let anyone play with artificial intelligence and machine learning in hands-on ways, through pictures, drawings, language, music, and more. Source: A.I. Experiments

Virgin Galactic and Boom unveil Concorde 2.0 tester to restart supersonic travel

At a Colorado aircraft hangar, the two firms unveiled the triple-engined XB-1 prototype, a one-third sized prototype of the airliner they hope will be able to blast from London to New York in three hours and 15 minutes – air traffic control allowing. “60 years after the dawn of the jet age, we’re still flying […]

Google’s Photo Scan App Makes Backing Up Old Snapshots Easy as Hell

The Photo Scan app launched by Google today for iOS and Android lets you scan printed photos in just a couple of seconds, using machine learning to correct imperfections in the capture process that they look great every time. Here’s how it works: Download the app, and open it up. You’ll see a viewfinder. Hold […]

Enter 30 to shell: Cryptsetup Initram Shell / instant access to encrypted linux machines

An attacker with access to the console of the computer and with the ability to reboot the computer can launch a shell (with root permissions) when he/she is prompted for the password to unlock the system partition. The shell is executed in the initrd environment. Obviously, the system partition is encrypted and it is not […]

Bangladesh hopes to recover $30 million more from $81m cyber heist

Bangladesh’s central bank hopes to retrieve $30 million more of the $81 million stolen from its account at the New York Federal Reserve in February, two bank officials said on Monday. Hackers used stolen Bangladesh Bank credentials to try to send three dozen SWIFT messages to transfer nearly $1 billion from its Fed account. They […]

Origin of the beasties: Mirai botnet missing link revealed as DVR player

CCTV cameras? You’ve been looking in the wrong place Source: Origin of the beasties: Mirai botnet missing link revealed as DVR player Looks like digital video recorders offer more functionalities than IP cams and were used in 4/5 attack vectors.

 
Skip to toolbar