The Linkielist

Linking ideas with the world

glibc getaddrinfo stack-based buffer overflow – patch now

The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack. Google has found some mitigations that may help prevent exploitation if you are not able to Read more about glibc getaddrinfo stack-based buffer overflow – patch now[…]

Denuvo Anti-Piracy Tech stays good during the sales window of games, which is long enough

More than two months after release, it’s still not possible to pirate Just Cause 3. The same is true for Rise of the Tomb Raider, released for PC in late January. Cracking computer games used to be measured in hours or days, but now, it’s turning into weeks and months. The nature of piracy is Read more about Denuvo Anti-Piracy Tech stays good during the sales window of games, which is long enough[…]

Eternal 5D data storage could record the history of humankind for billions of years

Using nanostructured glass, scientists from the University’s Optoelectronics Research Centre (ORC) have developed the recording and retrieval processes of five dimensional (5D) digital data by femtosecond laser writing. The storage allows unprecedented properties including 360 TB/disc data capacity, thermal stability up to 1,000°C and virtually unlimited lifetime at room temperature (13.8 billion years at 190°C Read more about Eternal 5D data storage could record the history of humankind for billions of years[…]

Crims unleashed IRS-stabbing malware in bid to rob 464,000 people

Fraudsters, armed with stolen social security numbers and other personal information on nearly half a million people, used malware to systematically request PINs corresponding to those taxpayers, allowing the crooks to potentially file paperwork on their behalf. The swindlers could put their own bank account details on the tax returns, thus channelling people’s rebates into Read more about Crims unleashed IRS-stabbing malware in bid to rob 464,000 people[…]

Google retires Picasa for Photos, no desktop alternative in sight

As of March 15, 2016, we will no longer be supporting the Picasa desktop application. For those who have already downloaded this—or choose to do so before this date—it will continue to work as it does today, but we will not be developing it further, and there will be no future updates. If you choose Read more about Google retires Picasa for Photos, no desktop alternative in sight[…]

Adobe Creative Cloud update deletes first file in directories. Kills backups.

How about this for bizarre bug of the week: the latest version of Adobe Creative Cloud deletes the first hidden directory in root directories on Macs. That’s bad news for users of BackBlaze: the backup software stores a .bzvol folder in the top level of every drive it backs up, and uses these folders to Read more about Adobe Creative Cloud update deletes first file in directories. Kills backups.[…]

GCHQ hacking phones and computers is legal, says top UK court

Computer, smartphone and network hacking by UK intelligence agency GCHQ is legal, a security tribunal has said. The Investigatory Powers Tribunal ruled on Friday that computer network exploitation (CNE) – which can include remotely activating microphones and cameras on electronic devices such as iPhones without the owner’s knowledge – is legal. The case, which was Read more about GCHQ hacking phones and computers is legal, says top UK court[…]

Vodafone network allows you to copy yourself into someone elses conversation

The Vodafone network does not generate random TMSI numbers, which allows you to copy them and thereby listen in to other ongoing conversations. The network won’t throw off duplicates. If you have an IMSI catcher you can exploit this. It does, however, put the phone into conference call mode, which shows up on the screen. Read more about Vodafone network allows you to copy yourself into someone elses conversation[…]

The size of your pupil shows which letter you are reading

We present a new human-computer interface that is based on decoding of attention through pupillometry. Our method builds on the recent finding that covert visual attention affects the pupillary light response: Your pupil constricts when you covertly (without looking at it) attend to a bright, compared to a dark, stimulus. In our method, participants covertly Read more about The size of your pupil shows which letter you are reading[…]

NASA announces that Pluto has icebergs floating on glaciers of nitrogen ice

The most recent finding from New Horizons show that ice bergs have broken off from the hills surrounding the Sputnik Planum, a glacier of nitrogen ice, and are floating slowly across its surface, eventually to cluster together in places like the Challenger Colles, informally named after the crew of the space shuttle Challenger, which was Read more about NASA announces that Pluto has icebergs floating on glaciers of nitrogen ice[…]

Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks

Today at the Security Analyst Summit, researchers from Kaspersky Lab Global Research & Analysis Team unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more Read more about Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks[…]

France to build 1000km of road with solar panels

According to France’s minister of ecology and energy, Ségolène Royal, the tender for this project is already issued under the “Positive Energy” initiative and the test for the solar panels will begin by this spring.The photo voltaic solar panels called “Wattway” which will be used in the project is jointly developed by the French infrastructure Read more about France to build 1000km of road with solar panels[…]

Winning a competition predicts dishonest behavior

Winning a competition engenders subsequent unrelated unethical behavior. Five studies reveal that after a competition has taken place winners behave more dishonestly than competition losers. Studies 1 and 2 demonstrate that winning a competition increases the likelihood of winners to steal money from their counterparts in a subsequent unrelated task. Studies 3a and 3b demonstrate Read more about Winning a competition predicts dishonest behavior[…]

Arrow: Fraudsters impersonated one of our execs to steal money • $13m

Enterprise tech distributor Arrow Inc will take a $13m charge on the chin after a fraudster posing as a company exec transferred money from the corporate bank account to an external one. […] Deloitte has previously highlighted what it reckoned is the growing threat from ‘fake president frauds, “affecting many companies at the moment”. It Read more about Arrow: Fraudsters impersonated one of our execs to steal money • $13m[…]

Cheap USB-C Cables Could Kill Your Phone or Laptop – especially Type-A -> C, type C -> C is safe.

Benson Leung, an engineer on Google’s Pixel team, was doing God’s work by risking his Chromebook Pixel, which charges via USB-C, to test every single USB-C to USB-A cord available to general consumers. One crappy cord, and his $1500 computer would be fried. Source: Cheap USB-C Cables Could Kill Your Phone or Laptop There’s a Read more about Cheap USB-C Cables Could Kill Your Phone or Laptop – especially Type-A -> C, type C -> C is safe.[…]

Brain – Computer interfaces could be built from graphene: shown to safely interact with neurons in the brain

Researchers have successfully demonstrated how it is possible to interface graphene – a two-dimensional form of carbon – with neurons, or nerve cells, while maintaining the integrity of these vital cells. The work may be used to build graphene-based electrodes that can safely be implanted in the brain, offering promise for the restoration of sensory Read more about Brain – Computer interfaces could be built from graphene: shown to safely interact with neurons in the brain[…]