Lighteater goes through BIOS owns your PC

Because people don’t every patch their BIOSes, it is extremely likely that the vast majority of systems in the wild are vulnerable to at least one known exploit. We made public the details of the new SMM “Incursion” vulnerabilities (CERT VU# 631788, reported Oct 29th), that can be found automatically from SMM dumps. We showed the “LightEater” SMM implant stealing GPG keys/passwords/decrypted messages from Tails on an MSI system. We also showed how an unskilled attacker can infect a BIOS with an off-the-shelf Dediprog programmer, by just pressing the start button.

Source: Research

CloneApp – backs up windows program settings so you can copy them to a fresh install.

A fresh re-install always makes Windows much faster but that means you lose all your program settings. When you’re switching to a new PC CloneApp will Clone your App Content (Configuration files and folders from Windows directories, Registry entries, Pictures, Documents etc.) to Another Workspace to simplify the re-install process or only for Backup purposes.

Source: Downloads – CloneApp – Portable – CloneApp

Be paranoid: 10 terrifying extreme hacks

These extreme hacks rise above the unending morass of everyday, humdrum hacks because of what they target or because they employ previously unknown, unused, or advanced methods. They push the limit of what we security pros previously thought possible, opening our eyes to new threats and systemic vulnerabilities, all while earning the begrudging respect of those who fight malicious hackers.

This is a look at the handful of hacks that have truly raised eyebrows in the security community in the past few years. Here’s to hoping that the good guys find the most dangerous exploits before the bad guys can use them against us.

Source: Be paranoid: 10 terrifying extreme hacks | InfoWorld

Scientists Just Invented the Neural Lace

A group of chemists and engineers who work with nanotechnology published a paper this month in Nature Nanotechnology about an ultra-fine mesh that can merge into the brain to create what appears to be a seamless interface between machine and biological circuitry. Called “mesh electronics,” the device is so thin and supple that it can be injected with a needle — they’ve already tested it on mice, who survived the implantation and are thriving. The researchers describe their device as “syringe-injectable electronics,” and say it has a number of uses, including monitoring brain activity, delivering treatment for degenerative disorders like Parkinson’s, and even enhancing brain capabilities.

Source: Scientists Just Invented the Neural Lace

South Korean 3d printer prints thinner than red blood cell

a team of researchers at UNIST has announced that they have developed a high-resolution 3D printing technology that is capable of printing electronic circuits on plastic, metallic or magnetic nanoparticles that are curved and much flexible. According to the team, led by Prof. Jang-Ung Park (School of Materials Science and Engineering), they have succeeded in imprinting ultra-fine 3D patterns that are as small as 0.001 mm in size. This is thinner than a red blood cell.

Source: Realizing Futuristic 3D Printing TechnologyUNIST News Center | UNIST News Center

Malloy Hoverbike

Better than a flying car!

The Hoverbike is the result of years worth of R&D. We combined the simplicity of a motorbike and the freedom of a helicopter to create the world’s first flying motorcycle.When compared with a helicopter, the Hoverbike is cheaper, more rugged and easier to use – and represents a whole new way to fly. The Hoverbike flies like a quadcopter, and can be flown unmanned or manned, while being a safe – low level aerial workhorse with low on-going maintenance.

US Space Resource Exploration and Utilization Act of 2015

Basically the US is saying that it’s the wild west out in space: if you can get there, you can mine your asteroid.

Any asteroid resources obtained in outer space are the property of the entity that obtained such resources

Source: Text of H.R. 1508: Space Resource Exploration and Utilization Act of 2015 (Introduced version) – GovTrack.us

I’m very curious what other countries have to say about this?

The Richard Prince – Suicide Girls Circus

Mooney aka Suicide Girl has her picturers reused by Prince. Prince’s images, which consist of screen shots of other people’s Instagram photos enlarged to 4×5 foot inkjet prints with a single banal comment by Prince, have reportedly sold for $90,000.In response Mooney produced her own prints, identical in every way to Prince’s except for an additional, equally banal comment. She is offering them for peanuts – $90.The question of day:Could Richard Prince’s work be considered fair use while at the same time Selena Mooney’s print of Prince’s appropriation, whose primary element is her own photograph, be copyright infringement?

Source: The Richard Prince – Suicide Girls Circus

The LaZagnen – recover various passwords from within Windows

DescriptionThe LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these password for the most commonly-used software. At this moment, it supports 22 Programs on Microsoft Windows and 12 on a Linux/Unix-Like OS.Usage Launch all modules cmd: laZagne.exe all Launch only a specific module cmd: laZagne.exe example: laZagne.exe browsers help: laZagne.exe -h Laun

Source: The LaZagnen – Credentials Recovery Project | Mayur Agnihotri | LinkedIn

lenovo thinkpad t520 – last of the master laptops

This is the last ThinkPad with the old keyboard, before they introduced the chicklet style. Of course, the backlighting they got with the new keyboard of the T530 was nice, and the replacement of the page up / pagedown / escape keys was debated, but the spacing between the keys and the lower quality was a turn off for most people.

Source: lenovo thinkpad t520 | eBay

Of course the T530 keyboard was built in different qualities:

“New FRU for keyboard that is great:  04W3063
Old FRU of keyboard that was lousy:  04W3137

It’s also easy to tell which one you have – remove the trackpoint cap:

04W3063 = yellow under trackpoint
04W3137 = blue under trackpoint”

from https://forums.lenovo.com/t5/T400-T500-and-newer-T-series/Thinkpad-T520-vs-T530-keyboard/td-p/787997/page/2

One way to improve your T520 is to upgrade the screen for under $100,- to full HD

https://www.ifixit.com/Guide/Upgrading+the+Lenovo+ThinkPad+T520+Display/9763

And there is a way to get the T520 keyboard onto a T530. You can remap a lot of the keys and get quite a way, but not all the way…

http://www.thinkwiki.org/wiki/Install_Classic_Keyboard_on_xx30_Series_ThinkPads

Good luck!

EXACTO Guided Bullet Demonstrates Repeatable Performance against Moving Targets

DARPA’s Extreme Accuracy Tasked Ordnance (EXACTO) program, which developed a self-steering bullet to increase hit rates for difficult, long-distance shots, completed in February its most successful round of live-fire tests to date. An experienced shooter using the technology demonstration system repeatedly hit moving and evading targets. Additionally, a novice shooter using the system for the first time hit a moving target.

This video shows EXACTO rounds maneuvering in flight to hit targets that are moving and accelerating. EXACTO’s specially designed ammunition and real-time optical guidance system help track and direct projectiles to their targets by compensating for weather, wind, target movement and other factors that can impede successful hits.

via 2015/04/27 EXACTO Guided Bullet Demonstrates Repeatable Performance against Moving Targets.

Debian 8 “Jessie” released

After almost 24 months of constant development the Debian project is proud to present its new stable version 8 (code name "Jessie"), which will be supported for the next 5 years thanks to the combined work of the Debian Security team and of the Debian Long Term Support team.

"Jessie" ships with a new default init system, systemd. The systemd suite provides many exciting features such as faster boot times, cgroups for services, and the possibility of isolating part of the services. The sysvinit init system is still available in "Jessie".

The UEFI ("Unified Extensible Firmware Interface") support introduced in "Wheezy" has also been greatly improved in Jessie. This includes workarounds for many known firmware bugs, support for UEFI on 32-bit systems, and support for 64-bit kernels with 32-bit UEFI firmware (with the latter being included only on our amd64/i386 "multi-arch" installation media).

via Debian — News — Debian 8 "Jessie" released.

How to crash any iPhone or iPad within WiFi range

Security researchers presenting at this week’s RSA Conference in San Francisco, have uncovered a whole new compelling reason to switch off your phone.

Skycure’s Yair Amit and Adi Sharabani have demonstrated a startling vulnerability in iOS that can allow malicious hackers to crash any iOS device within range of a WiFi hotspot.

And it doesn’t even matter if targeted devices are trying to deliberately connect to the WiFi network or not. The researchers have dubbed their discovery “No iOS Zone”,

via How to crash any iPhone or iPad within WiFi range.

Recon Jet finally ships – HUD sunglasses, not as creepy as Glassholes and works better

Jet’s display is equivalent to a 30” screen viewed from 7 feet (2 m) away. It’s crisp and vibrant in all lighting conditions—and thanks to our patented Glance Detection technology, it wakes up instantly when you glance down, then turns off again when you look away, minimizing distractions and maximizing power efficiency.

Only $699

Recon Jet – Smart eyewear for your active lifestyle.

Google Handwriting Input – Finally Graffiti but better!

Google Handwriting Input allows you to handwrite text on your phone or tablet in 82 languages. It supports printed and cursive writing, with or without a stylus. Google Handwriting Input also supports hundreds of emojis, so you can express yourself in any Android app.

via Google Handwriting Input – Android Apps on Google Play.

I’ve been trying this out on my tablet and my smartphone and I’m completely impressed! About time that Android got this basic Palm functionality 🙂

How To Make A Secret Phone Call

His step-by-step instructions for making a clandestine phone call are as follows:

Analyze your daily movements, paying special attention to anchor points (basis of operation like home or work) and dormant periods in schedules (8-12 p.m. or when cell phones aren’t changing locations);
Leave your daily cell phone behind during dormant periods and purchase a prepaid no-contract cell phone (“burner phone”);
After storing burner phone in a Faraday bag, activate it using a clean computer connected to a public Wi-Fi network;
Encrypt the cell phone number using a onetime pad (OTP) system and rename an image file with the encrypted code. Using Tor to hide your web traffic, post the image to an agreed upon anonymous Twitter account, which signals a communications request to your partner;
Leave cell phone behind, avoid anchor points, and receive phone call from partner on burner phone at 9:30 p.m.—or another pre-arranged “dormant” time—on the following day;
Wipe down and destroy handset.

http://m.fastcompany.com/3044637/secret-phone-network

this is part of an art project which was looking at the surveillance state we live in

How Washington State Could Turn Aircraft Carriers Into Bridges

Washington State just received federal funds to study a totally unique toll bridge concept, one made out of decommissioned US Navy Super Carriers. The bridge would consist of two or three carriers and would link Bremerton and Port Orchard, Washington, spanning the Sinclair Inlet.

http://foxtrotalpha.jalopnik.com/how-washington-state-could-turn-aircraft-carriers-into-1696976267

apparently they are fighting an uphill battle but what an awesome idea!