The 773 Million Record “Collection #1” Data Breach

Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows. It’s made up of many different individual data breaches from literally thousands of different sources. (And yes, fellow techies, that’s a sizeable amount more than a 32-bit integer can hold.) In total, there are 1,160,253,228 unique combinations of email addresses and passwords. Read more about The 773 Million Record “Collection #1” Data Breach[…]

Modlishka allows for very easy fishing / MITM

You basically just put it on a local domain, point people there and it forwards the traffic up and down to the target website – so no templates, no warnings. It will also push through two factor authentication requests and answers. Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns Read more about Modlishka allows for very easy fishing / MITM[…]

Pornhub 2018 in review

Follow along to see the most interesting data points amassed by our team of statisticians, all presented with colorful charts and insightful commentary. Enjoy! The Year in Numbers Top Searches & Pornstars Traffic & Time on Site Gender Demographics Age Demographics Devices & Technology Celebrity Searches Movie & Game Searches Events, Holidays & Sports Top Read more about Pornhub 2018 in review[…]

Security Breaches Don’t Affect Stock Price. Or don’t they?

Abstract: This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies’ stock, with a focus on the results relative to the performance of the firms’ peer industries, as represented through selected indices rather than the market as a whole. Financial performance is considered over a Read more about Security Breaches Don’t Affect Stock Price. Or don’t they?[…]

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

Perhaps you’ve been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else’s voice. If so, you haven’t necessarily lost your mind. Instead, if you own one of a few models of internet-connected speaker and you’ve been careless with your network settings, you might be one Read more about Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet[…]

Vault7 – CIA loses control of its’ hacking arsenal, information being provided on Wikileaks

WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Read more about Vault7 – CIA loses control of its’ hacking arsenal, information being provided on Wikileaks[…]

One interview question that shows true character

http://www.inc.com/betsy-mikel/1-interview-question-that-cuts-through-the-bs-to-reveal-someones-true-character.html Are you a giver or a taker? Ask for the names of 4 people the interviewee has boosted their career. If the positions of the people are lower than the interviewee you have a giver. If higher then the interviewee is a taker – a self serving backstabber…

ReactOS Project: A free OS to run Windows programmes in

ReactOS is a free and open source operating system written from scratch. It’s design is based on Windows in the same way Linux is based on Unix, however ReactOS is _not_ linux. ReactOS looks and feels like Windows, is able to your run Windows software and your Windows drivers, and is familiar for Windows users Read more about ReactOS Project: A free OS to run Windows programmes in[…]

TrackMeNot – run random searches in the background

TrackMeNot runs in Firefox and Chrome as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and Bing. It hides users’ actual search trails in a cloud of ‘ghost’ queries, significantly increasing the difficulty of aggregating such data into accurate or identifying user profiles. TMN serves as Read more about TrackMeNot – run random searches in the background[…]

Parcl – forwards packages from e-tailers in countries that don’t ship to yours

Shop anywhere, choose your forwarder, ship anywhere and save. Worldwide shipping assistance of your buys for less. Source: Parcl Neat idea, if you want that package and the shop doesn’t want to send it to you, you pay a forwarder in the country for their time to order it for you and send it on Read more about Parcl – forwards packages from e-tailers in countries that don’t ship to yours[…]

utorrent client comes with litecoin mining and other stuff if you just next the install

Epic’s software tries to do more than mine crypto-currencies, we’re told: like the distributed SETI@home and BOINC projects, it spreads workloads over a large number of home computers, and can use their spare processor cycles to analyze genomes, fold proteins, and so on. But it mostly mines Litecoin. via Litecoin-mining code found in BitTorrent app, Read more about utorrent client comes with litecoin mining and other stuff if you just next the install[…]

FSF certify Libreboot X200 laptop

The Free Software Foundation (FSF) has certified another laptop by the UK based supplier The Gnulug. This is the second laptop by the company to get FSF certification. […] They also had to replace Intel’s Management Engine (ME) system and Intel’s Active Management Technology (AMT) firmware which are proprietary. FSF have previously addresses ME and Read more about FSF certify Libreboot X200 laptop[…]

Twine is an open-source tool for telling interactive, nonlinear stories.

Twine is an open-source tool for telling interactive, nonlinear stories. You don’t need to write any code to create a simple story with Twine, but you can extend your stories with variables, conditional logic, images, CSS, and JavaScript when you’re ready. Twine publishes directly to HTML, so you can post your work nearly anywhere. Anything Read more about Twine is an open-source tool for telling interactive, nonlinear stories.[…]

new role for proteins: assembling amino acids without DNA and RNA

Results from a study published on Jan. 2 in Science defy textbook science, showing for the first time that the building blocks of a protein, called amino acids, can be assembled without blueprints – DNA and an intermediate template called messenger RNA (mRNA). A team of researchers has observed a case in which another protein Read more about new role for proteins: assembling amino acids without DNA and RNA[…]

Project un1c0rn – a search engine for (heartbleed, Mysql, Mongodb) vulnerable sites

Think of Project Un1c0rn as a Google for site security. Launched on May 15th, the site’s creators say that so far it has indexed 59,000 websites and counting. The goal, according to its founders, is to document open leaks caused by the Heartbleed bug, as well as “access to users’ databases” in Mongo DB and Read more about Project un1c0rn – a search engine for (heartbleed, Mysql, Mongodb) vulnerable sites[…]