Hijacking drones
Rahul Sasi will present a way to hijack a Parrot drone without using any authentication. nullcon – Rahul Sasi.
Linking ideas with the world
Rahul Sasi will present a way to hijack a Parrot drone without using any authentication. nullcon – Rahul Sasi.
Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). via Lynis – Security auditing tool for Unix/Linux systems.
Very cleverly put together USB hub and ethernet USB adapter for travellers Must-Own Dongle for Travelers, Upgraded Earbuds, and More Deals.
Toyota is opening the door to the hydrogen future, making available thousands of hydrogen fuel cell patents royalty free. Announced today at the 2015 Consumer Electronics Show, this Toyota initiative will spur development and introduction of innovative fuel cell technologies around the world. Toyota will invite royalty-free use of approximately 5,680 fuel cell related patents Read more about Toyota understands that patents stifle innovation, allows the use of Hydrogen Fuel Cell patents royalty free to foster innovation[…]
These are 2 tiny dots that connect from a distance without WiFi at 6Gbit per second. This sounds like a wonderful replacement of USB / Firewire cabling you have to fidget to plug in. Our Technology – Keyssa.
To authorities responsible for the measurement and distribution of time UTC TIME STEP on the 1st of July 2015 A positive leap second will be introduced at the end of June 2015. The sequence of dates of the UTC second markers will be: 2015 June 30, 23h 59m 59s 2015 June 30, 23h 59m 60s Read more about We get an extra second on june 30th 2015[…]
He wants to use it to couple databases such as the license plate data they gather everywhere in NL with the tax database, creating huge centralised databases. Because centralised databases are great! Especially when everyone can access them. Do people never learn? Centralised databases are a very very bad idea. Privacy volgende slachtoffer van Charlie Read more about NL old spyboss uses Charlie Hebdo to invade your privacy[…]
CompuLab is introducing fitlet – a miniature 0.22l fanless quad-core PC that is not only packing more features than any other PC in its class, but is also designed from the ground up for unprecedented openness: Memory, storage, networking, extension cards and operating system can all be easily installed and upgraded by the user. The Read more about fitlet – tiny fanless pc, competes with Intel NUC[…]
Refuse to just let it die and give people some form of privacy. Does the US never learn? House Dem revives major cyber bill | TheHill.
There were a lot of controversies generated at the Indian Science Congress earlier this month, including claims of ancient aircraft in India, the use of plastic surgery there, and ways to divine underground water sources using herbal paste on the feet. One argument that could be tested using some form of evidence was the assertion Read more about Indian Science Congress doing well.[…]
By installing a back door into encrypted communications and storage, they not only allow the government unfettered access, but also criminals. Although I’m not sure where the distinction lies, nowadays. WhatsApp and iMessage could be banned under new surveillance plans – News – Gadgets and Tech – The Independent.
Basically they say they won’t touch anything older than the current OS and also smartphone vendors then need to update their old devices, which they won’t do either. Google won’t fix bug hitting 60 percent of Android phones | Ars Technica.
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back all keystrokes from any Microsoft wireless keyboards (which use a proprietary 2.4GHz RF protocol) in the area. Keystrokes are sent back to the KeySweeper operator over the Internet via an optional GSM Read more about KeySweeper – a DIY usb wall charger that logs keystrokes from MS wireless keyboards[…]
Scientists have discovered an antibiotic capable of fighting infections that kill hundreds of thousands of people each year, a breakthrough that could lead to the field’s first major new drug in more than a quarter-century.The experimental drug, which was isolated from a sample of New England dirt, is called teixobactin. It hasn’t yet been tested Read more about Antibiotic Pulled From Dirt Ends 25-Year Drug Drought – Bloomberg[…]
C3TV – 31C3: a new dawn.
Results from a study published on Jan. 2 in Science defy textbook science, showing for the first time that the building blocks of a protein, called amino acids, can be assembled without blueprints – DNA and an intermediate template called messenger RNA (mRNA). A team of researchers has observed a case in which another protein Read more about new role for proteins: assembling amino acids without DNA and RNA[…]
The researchers, from the Johns Hopkins University School of Medicine in Baltimore, analyzed published scientific papers to identify the number of stem cells, and the rate of stem-cell division, among 31 tissue types, though not for breast and prostate tissue, which they excluded from the analysis. Then they compared the total number of lifetime stem-cell Read more about Besides Lifestyle and Inherited Genes, Cancer Risk Also 66% Tied to Bad Luck[…]
America’s $400 billion Joint Strike Fighter, or F-35, is slated to join fighter squadrons next year—but missing software will render its 25mm cannon useless. The Pentagon’s newest stealth jet, the nearly $400 billion Joint Strike Fighter, won’t be able to fire its gun during operational missions until 2019, three to four years after it becomes Read more about F-35 Can’t Fire Its Gun Until 2019 – And even then hardly[…]
Current US law extends copyright for 70 years after the date of the author’s death, and corporate “works-for-hire” are copyrighted for 95 years after publication. But prior to the 1976 Copyright Act (which became effective in 1978), the maximum copyright term was 56 years—an initial term of 28 years, renewable for another 28 years. Under Read more about What Could Have Entered the Public Domain on January 1, 2015?[…]
Skiplagged.com found out that you can buy a cheaper ticket from A – B if you buy a ticket to C where B is a stop on the way (A – B – C) and then just get off at B. For example, a customer buying a ticket from New York to Los Angeles, where Read more about United Airlines and Orbitz resort to suing Skiplagged.com which is better and takes advantage of airlines’ stupid fee structure[…]
Hint: Truecrypt, Tor, PGP, ZRTP Inside the NSA's War on Internet Security – SPIEGEL ONLINE.
Gefahren von Kameras für (biometrische) Authentifizierungsverfahren [31c3] von starbug/Jan Krissler – YouTube.
How Dumb Cluster Bombs Are Becoming Heinously Smart.
When you’re on the path to becoming a power user, you begin to notice certain things that the average person might not. One of those is the difference between typing on a sweet mechanical keyboard with luxurious key action versus pounding away on a run-of-the-mill squishy plank that relies on mushy membranes to register your Read more about Five Mechanical Gaming Keyboards Compared[…]
Ah the wonders of big data. Needlessly scaring twice as many people as guilty people you find with a valid search warrant and invasion of innocent people’s privacy is being lauded as a success by the NL Government and will result in 30000 people’s houses being needlessly searched next year. 30.000 onschuldige Nederlanders opgejaagd door Read more about Dutch gov sends cops to 3 times as many houses as there are guilty parties at those houses, scares 4500 people witless, will scare 30000 next year[…]