The Linkielist

Linking ideas with the world

How a Reddit Email Vulnerability Led to Thousands in Stolen Bitcoin Cash

The exploit allowed hackers to request a password reset for a target account and then click the generated link without opening the email it had been sent in. How was this possible? Theories circulated, buoyed by posts on Hacker Noon and The Next Web. It was the r/bitcoin users out to cause trouble; Or was Read more about How a Reddit Email Vulnerability Led to Thousands in Stolen Bitcoin Cash[…]

This Ex-NSA Hacker Is Building an AI to Find Hate Symbols on Twitter

NEMESIS, according to Crose, can help spot symbols that have been co-opted by hate groups to signal to each other in plain sight. At a glance, the way NEMESIS works is relatively simple. There’s an “inference graph,” which is a mathematical representation of trained images, classified as Nazi or white supremacist symbols. This inference graph Read more about This Ex-NSA Hacker Is Building an AI to Find Hate Symbols on Twitter[…]

Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW!

Today, yet another security blunder becomes publicized, and it is really bad. You see, many Western Digital My Cloud NAS drives have a hardcoded backdoor, meaning anyone can access them — your files could be at risk. It isn’t even hard to take advantage of it — the username is “mydlinkBRionyg” and the password is Read more about Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW![…]

Rs 500, 10 minutes, and you have access to billion Aadhaar (Indian social security) details

It took just Rs 500, paid through Paytm, and 10 minutes in which an “agent” of the group running the racket created a “gateway” for this correspondent and gave a login ID and password. Lo and behold, you could enter any Aadhaar number in the portal, and instantly get all particulars that an individual may Read more about Rs 500, 10 minutes, and you have access to billion Aadhaar (Indian social security) details[…]

Major Cryptocurrency Index Excludes Korean Prices Without Warning, creates apparent drop in prices

CoinMarketCap, arguably the most prominent global index of cryptocurrency prices, triggered a wave of anxiety and anger this morning when it removed a group of Korean cryptocurency exchanges from its price calculations.Though the change was apparently made at midnight Sunday U.S. EST, CoinMarketCap did not publicize it until midday on Monday, saying that the Korean Read more about Major Cryptocurrency Index Excludes Korean Prices Without Warning, creates apparent drop in prices[…]

Our Solar System is an exception: most planets have more regular spacing and sizing

They found that planets in the same planetary system have correlated sizes. “Each planet is more likely to be the size of its neighbor than a size drawn at random from the distribution of observed planet sizes,” the paper said. If the system contains three or more planets, the planets are also more likely to Read more about Our Solar System is an exception: most planets have more regular spacing and sizing[…]

SteelSeries’ Dual-Sensor Mouse Could Be the King of Precision

The Rival 600 even has its own CPU and storage tucked inside, so that once you get everything configured just the way you like, you can save those settings directly in the mouse, so you won’t need to re-download the SteelSeries app if you play with it on a different machine. Source: SteelSeries’ Dual-Sensor Mouse Read more about SteelSeries’ Dual-Sensor Mouse Could Be the King of Precision[…]

AI System Sorts News Articles By Whether or Not They Contain Actual Information

In a recent paper published in the Journal of Artificial Intelligence Research, computer scientists Ani Nenkova and Yinfei Yang, of Google and the University of Pennsylvania, respectively, describe a new machine learning approach to classifying written journalism according to a formalized idea of “content density.” With an average accuracy of around 80 percent, their system Read more about AI System Sorts News Articles By Whether or Not They Contain Actual Information[…]

When a North Korean Missile Accidentally Hit a North Korean City

What happens when a North Korean ballistic missile test fails in flight and explodes in a populated area? On April 28, 2017, North Korea launched a single Hwasong-12/KN17 intermediate-range ballistic missile (IRBM) from Pukchang Airfield in South Pyongan Province (the Korean People’s Army’s Air and Anti-Air Force Unit 447 in Ryongak-dong, Sunchon City, to be Read more about When a North Korean Missile Accidentally Hit a North Korean City[…]

Rare Malware Targeting Uber’s Android App Uncovered

Malware discovered by Symantec researchers sneakily spoofs Uber’s Android app and harvests users’ passwords, allowing attackers to take over the effected users’ accounts. The malware isn’t widespread, though, and most Uber users are not effected. […] In order to steal a user’s login information, the malware pops up on-screen regularly and prompts the user to Read more about Rare Malware Targeting Uber’s Android App Uncovered[…]

Asus is turning its old routers into mesh Wi-Fi networks

Mesh routers like Eero, Netgear’s Orbi, and Google Wifi are getting all the hype these days, but replacing your whole network with a bunch of new devices can be kind of expensive. Asus has a good solution with its new AiMesh system, which lets you repurpose your existing Asus routers as part of a mesh Read more about Asus is turning its old routers into mesh Wi-Fi networks[…]

Google’s voice-generating AI is now indistinguishable from humans

A research paper published by Google this month—which has not been peer reviewed—details a text-to-speech system called Tacotron 2, which claims near-human accuracy at imitating audio of a person speaking from text. The system is Google’s second official generation of the technology, which consists of two deep neural networks. The first network translates the text Read more about Google’s voice-generating AI is now indistinguishable from humans[…]

Project Maven brings AI to the fight against ISIS

For years, the Defense Department’s most senior leadership has lamented the fact that US military and spy agencies, where artificial intelligence (AI) technology is concerned, lag far behind state-of-the-art commercial technology. Though US companies and universities lead the world in advanced AI research and commercialization, the US military still performs many activities in a style Read more about Project Maven brings AI to the fight against ISIS[…]

Gamers Want DMCA Exemption for ‘Abandoned’ Online Games

Several organizations and gaming fans are asking the Copyright Office to make a DMCA circumvention exemption for abandoned online games, to preserve them for future generations. The exemption would allow museums and libraries to offer copies of abandoned online servers, so these games won’t turn to dust. The U.S. Copyright Office is considering whether or Read more about Gamers Want DMCA Exemption for ‘Abandoned’ Online Games[…]

Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

My disk is encrypted, but all it takes to bypass this protection is for an attacker — a malicious hotel housekeeper, or “evil maid,” for example — to spend a few minutes physically tampering with it without my knowledge. If I come back and continue to use my compromised computer, the attacker could gain access Read more about Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop[…]

Another view: bitcoin isn’t likely to consume all the world’s electricity in 2020 (anyone reminded of climate change discussions?)

The computer process that generates each coin is said to be on pace to require more electricity than the United States consumes in a year. This bitcoin “mining” allegedly consumes more power than most countries use each year, and its electricity usage is roughly equivalent to Bulgaria’s consumption. But here’s another thing you might want Read more about Another view: bitcoin isn’t likely to consume all the world’s electricity in 2020 (anyone reminded of climate change discussions?)[…]

Acoustic Attacks on HDDs cause them to shut down

The basic principle behind this attack is that sound waves introduce mechanical vibrations into an HDD’s data-storage platters. If the sound is played at a specific frequency, it creates a resonance effect that amplifies the vibration effect.Because hard drives store vasts amounts of information inside small areas of each platter, they are programmed to stop Read more about Acoustic Attacks on HDDs cause them to shut down[…]

These experts figured out why so many bogus US patents get approved

If you’ve read our coverage of the Electronic Frontier Foundation’s “Stupid Patent of the Month” series, you know America has a patent quality problem. People apply for patents on ideas that are obvious, vague, or were invented years earlier. Too often, applications get approved and low-quality patents fall into the hands of patent trolls, creating Read more about These experts figured out why so many bogus US patents get approved[…]

Chrome Extension with 100,000 Users Caught Pushing Cryptocurrency Miner

A Chrome extension with over 105,000 users has been deploying an in-browser cryptocurrency miner to unsuspecting users for the past few weeks.The extension does not ask for user permission before hijacking their CPUs to mine Monero all the time the Chrome browser is open.Named “Archive Poster,” the extension is advertised as a mod for Tumblr Read more about Chrome Extension with 100,000 Users Caught Pushing Cryptocurrency Miner[…]

How to Stop Apps From Listening in on Your TV Habits (it turns out thousands are)

That innocent-looking mobile game you just downloaded might just have an ulterior motive. Behind the scenes, hundreds of different apps could be using your smartphone’s microphone to figure out what you watch on TV, a new report from The New York Times reveals. […] All of these apps need to get your permission before they Read more about How to Stop Apps From Listening in on Your TV Habits (it turns out thousands are)[…]

To drive faster we all need to keep the same distance to the car behind us as the car in front

a new study in IEEE Transactions on Intelligent Transportation Systems mathematically models the implications of the larger problem: You’re not keeping the right distance from the car behind you. That may seem counterintuitive, since you don’t have much control over how far you are from the car behind you—especially when that person is a tailgater. Read more about To drive faster we all need to keep the same distance to the car behind us as the car in front[…]

Forever 21: Yes, hackers breached our payment system for half of 2017

A breach at Forever 21 left customer payment card information exposed to hackers, the retailer confirmed Thursday. The company didn’t specify how many customers had information stolen, but said various point of sales terminals were affected between April 3 and November 18, 2017. Hackers collected credit card numbers, expiration dates, verification codes and sometimes cardholder Read more about Forever 21: Yes, hackers breached our payment system for half of 2017[…]