Metasploit hwbridge connects to your car

We recently announced a new addition to Metasploit to help you do exactly that: the Hardware Bridge API. The Hardware Bridge API extends Metasploit’s capabilities into the physical world of hardware devices. Much in the same way that the Metasploit framework helped unify tools and exploits for networks and software, the Hardware Bridge looks to Read more about Metasploit hwbridge connects to your car[…]

Facebook’s AI unlocks the ability to search photos by what’s in them

Initially used to improve the experience for visually impaired members of the Facebook community, the company’s Lumos computer vision platform is now powering image content search for all users. This means you can now search for images on Facebook with key words that describe the contents of a photo, rather than being limited by tags Read more about Facebook’s AI unlocks the ability to search photos by what’s in them[…]

Google, unlike Microsoft, must turn over foreign emails: U.S. judge

A U.S. judge has ordered Google to comply with search warrants seeking customer emails stored outside the United States, diverging from a federal appeals court that reached the opposite conclusion in a similar case involving Microsoft Corp (MSFT.O). U.S. Magistrate Judge Thomas Rueter in Philadelphia ruled on Friday that transferring emails from a foreign server Read more about Google, unlike Microsoft, must turn over foreign emails: U.S. judge[…]

GM Salmonella destroys cancer

A genetically modified bacterium destroys tumors by provoking an immune response, according to a study published Wednesday. Using mice and cultures of human cancer cells, a South Korean-led scientific team demonstrated that Salmonella typhimurium engineered to make a foreign protein caused immune cells called macrophages and neutrophils to mobilize against the cancer. […] Tumors shrank Read more about GM Salmonella destroys cancer[…]

Vizio coughs up $2.2m after its smart TVs spied on millions of families

California electronics maker Vizio will cough up $2.2m after its smart TVs spied on millions of people. America’s trade watchdog, the FTC, said today the payment will settle a complaint filed by the state of New Jersey accusing Vizio of violating privacy regulations: the biz had collected the viewing habits of 11 million television sets Read more about Vizio coughs up $2.2m after its smart TVs spied on millions of families[…]

600 Goldman traders replaced by 200 computer engineers

Average compensation for staff in sales, trading, and research at the 12 largest global investment banks, of which Goldman is one, is $500,000 in salary and bonus, according to Coalition. Seventy-five percent of Wall Street compensation goes to these highly paid “front end” employees, says Amrit Shahani, head of research at Coalition. For the highly Read more about 600 Goldman traders replaced by 200 computer engineers[…]

Want to come to the US? Be prepared to hand over your passwords if you’re on Trump’s hit list

Previously, tourists, travelers and visa holders were warned they may have to hand over their online account names and handles so their public profiles can be studied by border agents and immigration officials. Now Kelly wants to take that further, by demanding passwords from some visa applicants so g-men can log into Twitter, Facebook, online Read more about Want to come to the US? Be prepared to hand over your passwords if you’re on Trump’s hit list[…]

71% NL population likes cash

Even though cash payments have decreased to 49% of our daily payments, people in the eurozone still think cash is important and shouldn’t be banned. DNBulletin: Contant betalen moet mogelijk blijven Source: DNBulletin: Contant betalen moet mogelijk blijven There has been a movement to try to shame cash payments, into creating a shady overtone to Read more about 71% NL population likes cash[…]

Germany Is Threatening Biohackers With Prison

Over the last few years, advances in science have made the kind of experiments once only accessible to PhDs with fancy labs far more attainable. College undergrads are constructing gene drives. Anyone can buy a kit on the internet to concoct their own bioluminescent beer. […] The German government, it seems, is none too pleased Read more about Germany Is Threatening Biohackers With Prison[…]

New smartphone app looks inside objects, shows what else is in there

A new app from Fraunhofer development engineers looks directly inside objects and displays specific constituents. It has numerous uses: For instance, apples can be scanned for pesticide residues. Applications will be added successively following the Wikipedia principle. […] Such scans usually require a special hyperspectral camera: It adjusts to different colored light each time and Read more about New smartphone app looks inside objects, shows what else is in there[…]

Blueprint for a microwave trapped ion quantum computer released

The availability of a universal quantum computer may have a fundamental impact on a vast number of research fields and on society as a whole. An increasingly large scientific and industrial community is working toward the realization of such a device. An arbitrarily large quantum computer may best be constructed using a modular approach. We Read more about Blueprint for a microwave trapped ion quantum computer released[…]

Cisco’s Prime Home lets hackers hijack people’s routers, from one single point at the ISP

“An attacker could exploit this vulnerability by sending API commands via HTTP to a particular URL without prior authentication,” Cisco said today. “An exploit could allow the attacker to perform any actions in Cisco Prime Home with administrator privileges.” Note that “administrator” was italicized by the networking giant. Super serious. Cisco pitches Prime Home as Read more about Cisco’s Prime Home lets hackers hijack people’s routers, from one single point at the ISP[…]

Our galaxy is being pushed towards Shapley attractor from Dipole repeller by gravity flows

The presence of a large underdensity, the dipole repeller, is predicted based on a study of the velocity field of our Local Group of galaxies. The combined effects of this super-void and the Shapley concentration control the local cosmic flow. […] Our Local Group of galaxies is moving with respect to the cosmic microwave background Read more about Our galaxy is being pushed towards Shapley attractor from Dipole repeller by gravity flows[…]

Linux encryption app Cryptkeeper has universal password: ‘p’

The flawed version is in Debian 9 (Stretch), currently in testing, but not in Debian 8 (Jessie). The bug appears to be a result of a bad interaction with the encfs encrypted filesystem’s command line interface: Cryptkeeper invokes encfs and attempts to enter paranoia mode with a simulated ‘p’ keypress – instead, it sets passwords Read more about Linux encryption app Cryptkeeper has universal password: ‘p’[…]

PostScript printers extremely vulnerable outside of the network

If PostScript is the printer driver, the printer is vulnerable to what they call Cross-Site Printing attacks, documented in detail at Hacking Printers here. The bugs range from attackers exfiltrating copies of what’s sent to printers, to denial-of-service, code execution, forced resets and even bricking the targets. The work from the University Alliance Ruhr landed Read more about PostScript printers extremely vulnerable outside of the network[…]

Suffered a breach? Expect to lose cash, opportunities, and customers – report

More than a third of organisations that experienced a breach last year reported substantial customer, opportunity and revenue loss. The finding is one of the key takeaways from the latest edition of Cisco’s annual cybersecurity report, which also suggests that defenders are struggling to improve defences against a growing range of threats. The vast majority Read more about Suffered a breach? Expect to lose cash, opportunities, and customers – report[…]

Trump’s ‘Extreme Vetting’ for US Visitors Could Involve Social Media Posts and Browser Histories

Phone numbers, browser histories, and social media posts are all examples of the sort of data that could be mined from those entering the US under Trump’s “extreme vetting” policy, Department of Homeland Security secretary John Kelly said today. As Talking Points Memo reported, Kelly held a press conference this afternoon to discuss the president’s Read more about Trump’s ‘Extreme Vetting’ for US Visitors Could Involve Social Media Posts and Browser Histories[…]

2016 Hard Drive Reliabilty Benchmark Stats by Backblaze

Backblaze has recorded and saved daily hard drive statistics from the drives in our data centers since April 2013. At the end of 2016 we had 73,653 spinning hard drives. Of that number, there were 1,553 boot drives and 72,100 data drives. […] In 2016, three drives models ended the year with zero failures, albeit Read more about 2016 Hard Drive Reliabilty Benchmark Stats by Backblaze[…]

Secret Rules Make It Pretty Easy for the FBI to Spy on Journalists

Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures. The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without Read more about Secret Rules Make It Pretty Easy for the FBI to Spy on Journalists[…]