Monthly Archives: August 2014

Researchers find it’s terrifyingly easy to hack traffic lights | Ars Technica

This is the kind of thing which crosses into the movie realm. Yes, it is possible to hack traffic lights.

Taking over a city’s intersections and making all the lights green to cause chaos is a pretty bog-standard Evil Techno Bad Guy tactic on TV and in movies, but according to a research team at the University of Michigan, doing it in real life is within the realm of anyone with a laptop and the right kind of radio.

via Researchers find it’s terrifyingly easy to hack traffic lights | Ars Technica.

Low-cost 3D printers and crowdfunding suicide – 3D Prototypes and Models

3D printing, IoT, big data. These are buzzwords of the day. 3D printing projects, especially, is extremely popular on crowdfunding sites such as KickStarter. The following article talks about the surge of non-viable 3D printing projects on crowdfunding sites, and the problems they face and poses to legitimate projects. I like the systematic way the author analyzes about the problem and how he presents it.

Line of Viability

Low-cost 3D printers and crowdfunding suicide – 3D Prototypes and Models.

Read this if you are planning to fund a 3D printing project.

IPViking map – real-time visualization of cyber attacks

This is a cool real-time visualization of cyber attacks that is happening right. Ok it’s not exactly monitoring the entire Internet. The attacks shown are based on honeypots set up by the company Norse. They claimed to “emulate over 5m users, severs, infrastructures on the Internet” in various countries and the visualization is only based on a small subset of the live flows. I guess this can be taken to mean the real number of attacks is much larger and probably won’t run as smoothly on a web-powered application in real-time. It is still quite impressive and can be strangely mesmerizing to watch.

Incidentally, the application is powered by D3 and it runs best on Chrome.

IPViking map: Cybercrime hunting just got real-time – Real Business:

Unsurprisingly, IPViking has been likened with 1983 movie WarGames starring Matthew Broderick and Introversion’s classic game called Defcon. It’s true, the map is simply astonishing to behold – and slightly unnerving – when activity starts happening.

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED.

On some levels this is one of the scariest vulnerability of recent times. Just think of how many things are at risk if exploitation becomes prevalent. Your usual anti-virus is useless against this type of attacks. It’ll be interesting to know if Stuxnet is using this delivery mechanism.

More detailed info can be found here.