Windyty, wind map & forecast
Wind map and weather forecast Source: Windyty, wind map & forecast Absolutely gorgeous interactive moving windmap
Linking ideas with the world
Wind map and weather forecast Source: Windyty, wind map & forecast Absolutely gorgeous interactive moving windmap
Infowars, created by famed radio host and conspiracy theorist Alex Jones, produces radio, documentaries and written pieces. The dumped data relates to Prison Planet TV, which gives paying subscribers access to a variety of Infowars content. The data includes email addresses, usernames, and poorly hashed passwords. The administrator of breach notification site Databases.Land provided a Read more about Tens of Thousands of Infowars Accounts Hacked: thats the sound of thousands of conspiracy loons crinkling up their tin foil hats as the pull them on tighter[…]
The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials. The FBI warning, contained in a “flash” alert from Read more about FBI says foreign hackers penetrated two seperate state election systems[…]
DuoSkin is a fabrication process that enables anyone to create customized functional devices that can be attached directly on their skin. Using gold metal leaf, a material that is cheap, skin-friendly, and robust for everyday wear, we demonstrate three types of on-skin interfaces: sensing touch input, displaying output, and wireless communication. Source: DuoSkin | MIT Read more about DuoSkin – turn a temporary gold tattoo into a controller, communicator or display[…]
Kids design their dresses hands-on. Parents send us a picture of their art. We send back your custom cut-and-sewn dress, ready to wear! Source: Picture This Clothing – Wear your Imagination!
Now that WhatsApp is sharing phone numbers with Facebook, it’s no longer the security oasis users relied on. Source: WhatsApp’s Privacy Cred Just Took a Big Hit | WIRED
Since Facebook owns WhatsApp, it’s finally time for the purchase to pay off. Facebook now wants your WhatsApp data, including your phone number. Here’s how to opt out. Source: How to opt out of WhatsApp sharing your information with Facebook You have 30 days. Why is this a problem, what have they done? What do Read more about How to opt out of WhatsApp sharing your information with Facebook[…]
The National Aeronautics and Space Act of 1958 challenged our Nation to grow our technical and scientific abilities in air and space. Since the 1970s, numerous economic reports and articles have demonstrated that NASA investments help grow the US economy. Perhaps most importantly NASA-funded R&D helped stimulate our long-term capacity for innovation and economic growth Read more about NASA publishes all papers funded by it for free![…]
Microsoft and a team of concerned engineers from across the security sector have joined forces to suggest a major re-write of the arms control pact the Wassenaar Arrangement, as they fear the document’s terms are a threat tot he information security industry. The pitch is the result of brainstorming by the group to redefine the Read more about Microsoft and pals attempt to re-write Wassenaar cyber arms control pact written by people who have no idea about IT and will make IT security business almost impossible[…]
To get started, head to facebook.com/ads/preferences. Here, you’ll find a large collection of “interests” Facebook thinks you have, sorted into categories. Click on “Lifestyle and Culture” to find, among other things, where you land politically. If you haven’t explicitly Liked the Facebook page of a particular politician, Facebook will guess and place that guess here. Read more about Find Out How Facebook Thinks You Think With This Setting[…]
Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target’s mobile phone, was responsible for the intrusions. The NSO Group’s software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the Read more about IPhones completely compromised by NSO Group. Update now![…]
When a team of hackers discovered that St. Jude Medical Inc.’s pacemakers and defibrillators had security vulnerabilities that could put lives at risk, they didn’t warn St. Jude. Instead, the hackers, who work for cybersecurity startup MedSec, e-mailed Carson Block, who runs the Muddy Waters Capital LLC investment firm, in May. They had a money-making Read more about Hackers discover flaws in hospital security capitalise on it by shorting shares in the hospital[…]
Microsoft’s update for version 1607 doesn’t fix two widespread problems with Windows 10 Anniversary Update, and it causes problems with PowerShell DSC operations Source: Windows 10 cumulative update KB 3176934 breaks PowerShell This update contained a fix for the borked update below: The Windows 10 Anniversary Update has reportedly broken millions of webcams. If your Read more about Windows 10 shows why automatic updates are bad, breaking powershell, webcams and rebooting randomly during activities.[…]
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect Read more about NSA cyberweapons being sold by hackers are real, Snowden Documents Confirm[…]
Select a color and size for your brush. Then, Splash paint on the canvas and see matching photos appear in your search results. Keep adding colors to see your results change, and adjust the category filter to see different images. 500px
Facebook knows more about your personal life than you probably realize. As part of the company’s increasingly aggressive advertising operation, Facebook goes to great lengths to track you across the web. The company compiles a list of personal details about every user that includes major life events and general interests. For years, details have been Read more about All of the Creepy Things Facebook Knows About You[…]
Exactly a year ago, attackers used an advertisement on Yahoo to redirect users to a site infected by the Angler exploit kit. Just weeks before, users were exposed to more malicious software through compromised advertisements that showed up across the web. In total, at least 910 million users were potentially exposed to malware through these Read more about With TLS encryption, attackers can use this as a tunnel to hide attacks from legacy packet inspection tools.[…]
Microsolderer Jessa Jones can fix practically anything. But these days, she spends most of her time fixing just one thing. Because every single month, more and more iPhone 6 and (especially) 6 Plus devices show up at her shop with the same problem: a gray, flickering bar at the top of the display and an Read more about A Design Defect Is Breaking a Ton of iPhone 6 Pluses: touchscreen controllers are dying[…]
Anti-Beacon is small, simple to use, and is provided free of charge. It was created to address the privacy concerns of users of Windows 10 who do not wish to have information about their PC usage sent to Microsoft. Simply clicking “Immunize” on the main screen of Anti-Beacon will immediately disable any known tracking features Read more about Spybot Anti-Beacon for Windows[…]
Report: Penetration testers’ five most reliable methods of compromising targets include four different ways to use stolen credentials, but zero ways to exploit software. Playing whack-a-mole with software vulnerabilities should not be top of security pros’ priority list because exploiting software doesn’t even rank among the top five plays in the attacker’s playbook, according to Read more about Attacker’s Playbook Top 5 Is High On Passwords, Low On Malware[…]
Popular online cosmetics site Strawberrynet has asked customers if a function that allows anyone to retrieve its customers names, billing addresses, and phone numbers with nothing more than an email address is a bug or a feature […] The feature means customers are able to checkout quickly by just putting their email address into a Read more about Strawberrynet Beauty site lets anyone read customers’ personal information[…]
hahahahahahahaha HAHAHAHAHAHAHA Really? People still trust Wikipedia?! Source: Microsoft’s maps lost Melbourne because it used bad Wikipedia data
Two hackers were able to steal email addresses and easily crackable passwords from three separate forums in this latest hack. Two hackers carried out attacks on three separate game-related forums in July and August. One forum alone accounted for almost half of the breached data — a little under 13 million records; the other two Read more about >25m accounts stolen after Russian mail.ru forums hacked[…]
Protecting GPS From Spoofers Is Critical to the Future of Navigation – IEEE Spectrum http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation
When placed in an acoustic field, small objects experience a net force that can be used to levitate the objects in air. In a new study, researchers have experimentally demonstrated the acoustic levitation of a 50-mm (2-inch) solid polystyrene sphere using ultrasound—acoustic waves that are above the frequency of human hearing. The demonstration is one Read more about Researchers demonstrate acoustic levitation of a large sphere[…]