U.S. government begins asking foreign travelers about social media

NEW YORK — The U.S. government quietly began requesting that select foreign visitors provide their Facebook, Twitter and other social media accounts upon arriving in the country […] Since Tuesday, foreign travelers arriving in the United States on the visa waiver program have been presented with an “optional” request to “enter information associated with your Read more about U.S. government begins asking foreign travelers about social media[…]

It’s not just your browser: Your machine can be fingerprinted easily

The group – Yinzhi Cao and Song Li of from Lehigh University in Pennsylvania, and Erik Wijmans from Washington University in St. Louis – have worked out how to access various operating system and hardware-level features that can fingerprint an individual machine, regardless of browser. These include screen resolution with zoom; CPU virtual cores; installed Read more about It’s not just your browser: Your machine can be fingerprinted easily[…]

MongoDB hackers now sacking ElasticSearch

Some 35,000 mostly Amazon Web Services ElasticSearch servers are open to the internet and to ransoming criminals, Shodan boss John Matherly says. So far more than 360 instances have had data copied and erased, held to ransom using the same techniques that blitzed tens of thousands of MongoDB servers this week. Affected ElasticSearch administrators are Read more about MongoDB hackers now sacking ElasticSearch[…]

NL MoD plans for flexible defence

Minister Jeanine Hennis-Plasschaert van Defensie heeft vandaag een brief naar Tweede Kamer gestuurd over de invoering van het Total Force Concept. In Nederland ‘de Adaptieve Krijgsmacht’ genoemd. Hierin presenteert de bewindsvrouw hoe zij de krijgsmacht nog flexibeler en duurzamer wil laten samenwerken met bedrijven en organisaties. De krijgsmacht heeft bijvoorbeeld niet meer alles zelf op Read more about NL MoD plans for flexible defence[…]

WhatsApp backdoor allows snooping on encrypted messages

WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communications are secure and cannot be intercepted by a middleman. However, WhatsApp has the ability to force the generation of new encryption keys for offline Read more about WhatsApp backdoor allows snooping on encrypted messages[…]

Way More People Will Now Have Access to the NSA’s Raw, Unfiltered Data

Previously, when the NSA passed data it collected through its secretive, advanced, and sometimes illegal methods, an NSA analyst would strip the data that pertained to innocent people, and would only pass on what they deemed necessary. Now, when the NSA shares information with another intelligence agency, it will pass on the raw data, with Read more about Way More People Will Now Have Access to the NSA’s Raw, Unfiltered Data[…]

New Android-infecting malware brew hijacks devices and then attacks your wifi router

Hackers have brewed up a strain of Android malware that uses compromised smartphones as conduits to attack routers.The Switcher trojan does not attack Android device users directly. Instead, the malware uses compromised smartphones and tablets as tools to attack any wireless networks they connect to.Switcher brute-forces access to the network’s router and then changes its Read more about New Android-infecting malware brew hijacks devices and then attacks your wifi router[…]

KLIC-WIN shows the underground infrastructure of your neigbourhood – in NL

De graafsector heeft het initiatief genomen voor het programma KLIC-WIN. Dit programma moderniseert de uitwisseling van kabel- en leidinginformatie volgens de WION en sluit systemen en processen beter aan op de Europese richtlijn INSPIRE. Op deze manier bereiden de graafsector en het Kadaster zich voor op de toekomst. De naam KLIC-WIN is een samenvoeging van Read more about KLIC-WIN shows the underground infrastructure of your neigbourhood – in NL[…]

‘Tooth repair drug’ may replace fillings

The team at King’s College London showed that a chemical could encourage cells in the dental pulp to heal small holes in mice teeth. A biodegradable sponge was soaked in the drug and then put inside the cavity. The study, published in Scientific Reports, showed it led to “complete, effective natural repair”. […] They discovered Read more about ‘Tooth repair drug’ may replace fillings[…]

MIT Unveils New Material That’s Strongest and Lightest On Earth

Graphene, which was heretofore, the strongest material known to man, is made from an extremely thin sheet of carbon atoms arranged in two dimensions. But there’s one drawback: while notable for its thinness and unique electrical properties, it’s very difficult to create useful, three-dimensional materials out of graphene. Now, a team of MIT researchers discovered Read more about MIT Unveils New Material That’s Strongest and Lightest On Earth[…]

MongoDB ransom attacks soar, body count hits 27,000 in hours

MongoDB databases are being decimated in soaring ransomware attacks that have seen the number of compromised systems more than double to 27,000 in a day. Criminals are accessing, copying and deleting data from unpatched or badly-configured databases. Administrators are being charged ransoms to have data returned. Initial attacks saw ransoms of 0.2 bitcoins (US$184) to Read more about MongoDB ransom attacks soar, body count hits 27,000 in hours[…]

Autocomplete hidden form fields a novel phishing hole for Chrome, Safari crims

The attack vector is manifest when victims select autofill while filling out registration forms: attackers hide sensitive fields like street address, date of birth, and phone number, displaying only basic entry boxes like name and email. Users who type the start of their names will generate a prompt that when selected will throw an option Read more about Autocomplete hidden form fields a novel phishing hole for Chrome, Safari crims[…]

One interview question that shows true character

http://www.inc.com/betsy-mikel/1-interview-question-that-cuts-through-the-bs-to-reveal-someones-true-character.html Are you a giver or a taker? Ask for the names of 4 people the interviewee has boosted their career. If the positions of the people are lower than the interviewee you have a giver. If higher then the interviewee is a taker – a self serving backstabber…