The Linkielist

Linking ideas with the world

Kazakhstan may enact law to install false national security certificate on PCs – brouhaha

There is a lot of this on the internet but I’m not sure it’s true as it’s all based on something that was posted on a telcos site and removed, so all the sources link to a google cache site. It’s not clear how this would be implemented and whether users would somehow be forced Read more about Kazakhstan may enact law to install false national security certificate on PCs – brouhaha[…]

Hundreds of thousands of engine immobilisers hackable over the net

Kiwi hacker Lachlan Temple has found holes in a popular cheap car tracking and immobilisation gadget that can allow remote attackers to locate, eavesdrop, and in some cases cut the fuel intake to hundreds of thousands of vehicles, some while in motion. the flaws allow attackers who log into any account — including a universal Read more about Hundreds of thousands of engine immobilisers hackable over the net[…]

First ever EU rules on cybersecurity

Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid management, is robust enough to withstand cyber-attacks, under new rules provisionally agreed by internal market MEPs and the Luxembourg Presidency of the EU Council of Ministers on Monday. […] Read more about First ever EU rules on cybersecurity[…]

AVG, McAfee, Kaspersky Fix Common Vulnerability in Their Antivirus Products

The security bug relates to the fact that the AVG antivirus creates a memory space with full RWX (read-write-execute) privileges where it normally runs. For that particular version of the AVG antivirus, this memory space was not randomized and was often shared with other applications, like, for example, Acrobat Reader or the enSilo product that Read more about AVG, McAfee, Kaspersky Fix Common Vulnerability in Their Antivirus Products[…]

77000 Valve accounts get hacked per month

We see around 77,000 accounts hijacked and pillaged each month. These are not new or naïve users; these are professional CS:GO players, reddit contributors, item traders, etc. Users can be targeted randomly as part of a larger group or even individually. Hackers can wait months for a payoff, all the while relentlessly attempting to gain Read more about 77000 Valve accounts get hacked per month[…]

Why people think total nonsense is really deep

The precise reasons that people see profundity in vague buzzwords or syntactic but completely random sentences are unknown. Some people might not realize the reason they don’t understand something is simply because there is nothing to understand. Or they might just approach things they hear and read less skeptically. There are also a few characteristics Read more about Why people think total nonsense is really deep[…]

GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks

Privacy International battle exposes ‘bulk’ warrants Documents released by GCHQ to the Investigatory Powers Tribunal suggest the agency may be allowed to hack multiple computers in the UK under single “thematic” or “class” warrants. Responding to complaints brought by Privacy International and seven global internet and communication service providers, the British spy agency told the Read more about GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks[…]

Physicists make transparent conductors by means of stamping and growing

The researchers based the new process on a combination of two existing techniques. Using the stamping technique ‘Substrate Conformal Imprint Lithography’, which originates from a collaboration between Philips and AMOLF, they stamped a pattern in a thin layer of plastic on top of a glass substrate. The result looks much like a nanoscale landscape: a Read more about Physicists make transparent conductors by means of stamping and growing[…]

Epic failure of Phone House & Dutch telecom providers to protect personal data: How I could access 12+ million records #phonehousegate

A litany of unsecured portals with generic usernames, sometimes no passwords at all, personnel allowing views of unencrypted Google docs with passwords… Source: Epic failure of Phone House & Dutch telecom providers to protect personal data: How I could access 12+ million records #phonehousegate | Weblog | Sijmen Ruwhof

Microsoft sets stage for massive Windows 10 upgrade strategy

Microsoft has been prepping Windows 7 and Windows 8.1 PCs for a more aggressive Windows 10 upgrade strategy that the company will kick off shortly. Source: Microsoft sets stage for massive Windows 10 upgrade strategy As Windows 10 is a massive privacy invading advertising machine, quite a lot of people are not waiting for this Read more about Microsoft sets stage for massive Windows 10 upgrade strategy[…]

Hacker Leaks Customer Data After a United Arab Emirates Bank Fails to Pay Ransom

A hacker is releasing customer records after a bank in the United Arab Emirates refused to pay a ransom of $3 million in bitcoins. Most of the bank’s customers, however, did not learn that their data had been stolen and published online until the newspaper contacted them. Files purporting to come from the hacker, and Read more about Hacker Leaks Customer Data After a United Arab Emirates Bank Fails to Pay Ransom[…]

Uruguay makes dramatic shift to nearly 95% electricity from clean energy

now that renewables provide 94.5% of the country’s electricity, prices are lower than in the past relative to inflation. There are also fewer power cuts because a diverse energy mix means greater resilience to droughts.It was a very different story just 15 years ago. Back at the turn of the century oil accounted for 27% Read more about Uruguay makes dramatic shift to nearly 95% electricity from clean energy[…]

Event Horizon Telescope reveals magnetic fields at Milky Way’s central black hole

If the black hole is spinning, it can generate strong jets that blast across thousands of light-years and shape entire galaxies. These black hole engines are thought to be powered by magnetic fields. For the first time, astronomers have detected magnetic fields just outside the event horizon of the black hole at the center of Read more about Event Horizon Telescope reveals magnetic fields at Milky Way’s central black hole[…]

Top Programming Languages That Generate Software Vulnerabilities (Hint: PHP)

PHP continues to be one of the main sources for many security bugs With a huge fanbase and used in countless of apps and websites around the Internet, PHP is ranked the worst when it came to command injection bugs, but also came close to the top when it came to SQL injections, cross-site scripting Read more about Top Programming Languages That Generate Software Vulnerabilities (Hint: PHP)[…]