DIY Overhead Control Panel for your PC
Using Arduino
Linking ideas with the world
Using Arduino
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi. Source: How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux
There is a lot of this on the internet but I’m not sure it’s true as it’s all based on something that was posted on a telcos site and removed, so all the sources link to a google cache site. It’s not clear how this would be implemented and whether users would somehow be forced Read more about Kazakhstan may enact law to install false national security certificate on PCs – brouhaha[…]
Kiwi hacker Lachlan Temple has found holes in a popular cheap car tracking and immobilisation gadget that can allow remote attackers to locate, eavesdrop, and in some cases cut the fuel intake to hundreds of thousands of vehicles, some while in motion. the flaws allow attackers who log into any account — including a universal Read more about Hundreds of thousands of engine immobilisers hackable over the net[…]
Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid management, is robust enough to withstand cyber-attacks, under new rules provisionally agreed by internal market MEPs and the Luxembourg Presidency of the EU Council of Ministers on Monday. […] Read more about First ever EU rules on cybersecurity[…]
WordPress hosting outfit WP Engine has confessed to a security breach, prompting it to reset 30,000 customers’ passwords. Security firm Trend Micro has also warned that The Independent newspaper’s WordPress-based blog section has been compromised Source: WordPress hosting biz confesses to breach, urgently contacts 30,000 users
The security bug relates to the fact that the AVG antivirus creates a memory space with full RWX (read-write-execute) privileges where it normally runs. For that particular version of the AVG antivirus, this memory space was not randomized and was often shared with other applications, like, for example, Acrobat Reader or the enSilo product that Read more about AVG, McAfee, Kaspersky Fix Common Vulnerability in Their Antivirus Products[…]
We see around 77,000 accounts hijacked and pillaged each month. These are not new or naïve users; these are professional CS:GO players, reddit contributors, item traders, etc. Users can be targeted randomly as part of a larger group or even individually. Hackers can wait months for a payoff, all the while relentlessly attempting to gain Read more about 77000 Valve accounts get hacked per month[…]
Source: Home Page There is a review here at cloudwards
The precise reasons that people see profundity in vague buzzwords or syntactic but completely random sentences are unknown. Some people might not realize the reason they don’t understand something is simply because there is nothing to understand. Or they might just approach things they hear and read less skeptically. There are also a few characteristics Read more about Why people think total nonsense is really deep[…]
Privacy International battle exposes ‘bulk’ warrants Documents released by GCHQ to the Investigatory Powers Tribunal suggest the agency may be allowed to hack multiple computers in the UK under single “thematic” or “class” warrants. Responding to complaints brought by Privacy International and seven global internet and communication service providers, the British spy agency told the Read more about GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks[…]
The researchers based the new process on a combination of two existing techniques. Using the stamping technique ‘Substrate Conformal Imprint Lithography’, which originates from a collaboration between Philips and AMOLF, they stamped a pattern in a thin layer of plastic on top of a glass substrate. The result looks much like a nanoscale landscape: a Read more about Physicists make transparent conductors by means of stamping and growing[…]
A litany of unsecured portals with generic usernames, sometimes no passwords at all, personnel allowing views of unencrypted Google docs with passwords… Source: Epic failure of Phone House & Dutch telecom providers to protect personal data: How I could access 12+ million records #phonehousegate | Weblog | Sijmen Ruwhof
Microsoft has been prepping Windows 7 and Windows 8.1 PCs for a more aggressive Windows 10 upgrade strategy that the company will kick off shortly. Source: Microsoft sets stage for massive Windows 10 upgrade strategy As Windows 10 is a massive privacy invading advertising machine, quite a lot of people are not waiting for this Read more about Microsoft sets stage for massive Windows 10 upgrade strategy[…]
Nasty maintenance software allows all kinds of privilege escalation. Please uninstall! Source: Lenovo: Verwijder onze bloatware
A hacker is releasing customer records after a bank in the United Arab Emirates refused to pay a ransom of $3 million in bitcoins. Most of the bank’s customers, however, did not learn that their data had been stolen and published online until the newspaper contacted them. Files purporting to come from the hacker, and Read more about Hacker Leaks Customer Data After a United Arab Emirates Bank Fails to Pay Ransom[…]
What a wonderful thing working in the cloud is! Source: Part of the world’s IT brought down by Azure Active Directory issue
New PHP 7 engine is focused on speed, speed, and speed Source: PHP 7 Released After Years of Development, Worth the Wait
now that renewables provide 94.5% of the country’s electricity, prices are lower than in the past relative to inflation. There are also fewer power cuts because a diverse energy mix means greater resilience to droughts.It was a very different story just 15 years ago. Back at the turn of the century oil accounted for 27% Read more about Uruguay makes dramatic shift to nearly 95% electricity from clean energy[…]
If the black hole is spinning, it can generate strong jets that blast across thousands of light-years and shape entire galaxies. These black hole engines are thought to be powered by magnetic fields. For the first time, astronomers have detected magnetic fields just outside the event horizon of the black hole at the center of Read more about Event Horizon Telescope reveals magnetic fields at Milky Way’s central black hole[…]
App Engine task queue tasks sloo…ooww for ~10% of instances Source: Google in 24-hour cloud brownout
A database containing personally identifiable information was accessed, potentially compromising the names, email addresses, dates of birth, and phone numbers of 656,723 customers. Source: JD Wetherspoon: A ‘hacker’ nicks 650,000 pub-goers’ data
But continues challenging validity of patents Source: Rounded corners on Android phones cost Samsung $548m: It will pay up to Apple after all So, Apple managed to patent the square and also the square with rounded corners. Seriously? We still have patents with this kind of crap?!
Namco patented this idea in 1995 and since then no one has been able to releive the boredom of the loading screen. I’m sure this demonstrates how patents lead to innovation. Not. Source: Loading Screen Jam – itch.io
PHP continues to be one of the main sources for many security bugs With a huge fanbase and used in countless of apps and websites around the Internet, PHP is ranked the worst when it came to command injection bugs, but also came close to the top when it came to SQL injections, cross-site scripting Read more about Top Programming Languages That Generate Software Vulnerabilities (Hint: PHP)[…]