Categories
security

Fun with your friend’s Facebook and Tinder sessions | Robert Heaton

Humorously written article of how to hijack Facebook+Tinder sessions if someone left their machine unlocked while away. Then again, if you had physical access there are other means of getting what you want.

Fun with your friend's Facebook and Tinder sessions | Robert Heaton.

Categories
privacy

How browsers get to know you in milliseconds – O’Reilly Radar

It’s amazing how advanced the online ads business have gotten. This is the current state as of 2014. I’m sure it will evolve even more as we progress (or some will say regress).

How browsers get to know you in milliseconds – O'Reilly Radar.

Categories
security

Sprites mods – Hard disk hacking – Intro

This falls under the category of uncommon hardware hacks. Increasingly, people are realizing that there are many places that could be compromised, like your USB firmware, SIM card, mobile baseband, and now hard disk firmware. Fascinating and scary at the same time, ‘cos it could lead to undetectable compromises.

Sprites mods - Hard disk hacking - Intro

Sprites mods – Hard disk hacking – Intro.

Categories
security

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus – The Intercept

Fascinating story of Duqu, the successor (or predecessor?) of Stuxnet.

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus – The Intercept.

Categories
security

JPMorgan Says Data Breach Affected 76 Million Households – Bloomberg

Another serious data breach. This is getting more common, though that certainly doesn’t mean it should be treated as such. The industry has to get used to responding to such security breaches.

JPMorgan Says Data Breach Affected 76 Million Households – Bloomberg.

Categories
security

oss-sec: CVE-2014-6271: remote code execution through bash

oss-sec: CVE-2014-6271: remote code execution through bash.

This is serious. Bash is the default shell used by most *nix users. Lots of public web servers out there will be vulnerable if not updated. Someone could write an exploit that infects one machine and turn that machine into an agent for infecting others.

Update (2014-09-25): Ok it is happening.

Update (2014-09-26): Everything you need to know about the Shellshock Bash bug

The headlines state everything through 4.3 or in other words, about 25 years’ worth of Bash versions

Update (2014-10-07): Winzip and possibly Yahoo has been compromised

Categories
security

New Web Order > Nik Cubrilovic – – » Notes on the Celebrity Data Theft

We are likely to see more and more of such high profile hacks, as devices become more transparent/integrated and IoT takes off. Be very afraid when your next Smart TV comes with a built-in webcam.

With more information than ever being stored and shared online and on connected devices hacking stories are frequent and are mainstream news. This was the case yesterday as dozens of celebrities fell victim to hackers who leaked hundreds of private photographs and videos stolen from web based storage services.

New Web Order > Nik Cubrilovic – – » Notes on the Celebrity Data Theft.

Categories
security

Researchers find it’s terrifyingly easy to hack traffic lights | Ars Technica

This is the kind of thing which crosses into the movie realm. Yes, it is possible to hack traffic lights.

Taking over a city’s intersections and making all the lights green to cause chaos is a pretty bog-standard Evil Techno Bad Guy tactic on TV and in movies, but according to a research team at the University of Michigan, doing it in real life is within the realm of anyone with a laptop and the right kind of radio.

via Researchers find it’s terrifyingly easy to hack traffic lights | Ars Technica.

Categories
diy

Low-cost 3D printers and crowdfunding suicide – 3D Prototypes and Models

3D printing, IoT, big data. These are buzzwords of the day. 3D printing projects, especially, is extremely popular on crowdfunding sites such as KickStarter. The following article talks about the surge of non-viable 3D printing projects on crowdfunding sites, and the problems they face and poses to legitimate projects. I like the systematic way the author analyzes about the problem and how he presents it.

Line of Viability

Low-cost 3D printers and crowdfunding suicide – 3D Prototypes and Models.

Read this if you are planning to fund a 3D printing project.

Categories
security

IPViking map – real-time visualization of cyber attacks

This is a cool real-time visualization of cyber attacks that is happening right. Ok it’s not exactly monitoring the entire Internet. The attacks shown are based on honeypots set up by the company Norse. They claimed to “emulate over 5m users, severs, infrastructures on the Internet” in various countries and the visualization is only based on a small subset of the live flows. I guess this can be taken to mean the real number of attacks is much larger and probably won’t run as smoothly on a web-powered application in real-time. It is still quite impressive and can be strangely mesmerizing to watch.

Incidentally, the application is powered by D3 and it runs best on Chrome.

IPViking map: Cybercrime hunting just got real-time – Real Business:

Unsurprisingly, IPViking has been likened with 1983 movie WarGames starring Matthew Broderick and Introversion’s classic game called Defcon. It’s true, the map is simply astonishing to behold – and slightly unnerving – when activity starts happening.