Predator UAV feeds unencrypted

It looks like the Iranians have found out that the video feeds  from Predator drones are in some cases unencrypted and can be tapped into using a $26,- program called Skygrabber. FOXNews.com – Iranian-Backed Insurgents Hack U.S. Drones. Now it turns out that the ROVER system, a hand held video system for infantry, also recieves Read more about Predator UAV feeds unencrypted[…]

Oops – global warming researchers hacked

And allthough the authenticity of the 1079 emails and 72 documents hasn’t been verified, it shows that the researchers have manipulated the data to fit their models, can’t explain the lack of global warming and have plans set up to destroy the credibility of any scientist doubting their stance. Michelle Malkin » The global warming Read more about Oops – global warming researchers hacked[…]

Dutch Hacker informs Jailbroken iPhones that they’re insecure

Fantastic – this guy port scans the T-Mobile range and finds the jailbroken iphones on the network, then SSH’s in using the default password and blips a message to the iphone telling the user the iphone has been hacked. Users can find out how to close the hole by visiting a website and paying EUR. Read more about Dutch Hacker informs Jailbroken iPhones that they’re insecure[…]

Windows 7 officially supports logon UI background customization

” Although this functionality was designed with OEMs in mind, it is pretty easy to turn on and off using regedit and some images lying around your hard drive. First, a check is made to determine if the customization functionality is enabled or not. More precisely, a DWORD value named OEMBackground in the HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key Read more about Windows 7 officially supports logon UI background customization[…]

Wireless network modded to see through walls

the way radio signals vary in a wireless network can reveal the movement of people behind closed doors. Joey Wilson and Neal Patwari have developed a technique called variance-based radio tomographic imaging which processes the signals to reveal signs of movement. They’ve even tested the idea with a 34-node wireless network using the IEEE 802.15.4 Read more about Wireless network modded to see through walls[…]

Dutch passports require unsecure fingerprints

We should all know by now that the fingerprint biometric is a bad one: not only can you duplicate it fairly easily using just gummy bears, or increase the risk of having your finger cut off for you, they also give too many false negatives; some people will never be able to use fingerprint scanners. Read more about Dutch passports require unsecure fingerprints[…]

Augmented Google Earth Gets Real-Time People, Cars, Clouds | Popular Science

Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth. They Read more about Augmented Google Earth Gets Real-Time People, Cars, Clouds | Popular Science[…]

XP no longer being patched by MS

Even though they keep supporting Internet Explorer 6, they’re not going to support XP? Microsoft had stated the reason for continuing support for IE6 was that it came with Windows XP and so they had to keep supporting it. Now it turns out that they’re not supporting XP either. Not exactly their road map, but Read more about XP no longer being patched by MS[…]

Skype trojan

Pretty soon there will be released into the wild a Skype trojan that, once installed, logs calls as mp3’s and mails the conversations to a remote server. Megapanzer » Blog Archive » Interview on gulli.com about the Skype trojan and trojans in general (english)..