NASA QueSST goes supersonic quietly

NASA has achieved a significant milestone in its effort to make supersonic passenger jet travel over land a real possibility by completing the preliminary design review (PDR) of its Quiet Supersonic Transport or QueSST aircraft design. QueSST is the initial design stage of NASA’s planned Low Boom Flight Demonstration (LBFD) experimental airplane, otherwise known as Read more about NASA QueSST goes supersonic quietly[…]

HMS QE: Britain’s newest Aircraft Carrier runs Windows XP

The Royal Navy’s brand new £3.5bn aircraft carrier HMS Queen Elizabeth is currently* running Windows XP in her flying control room, according to reports. Defence correspondents from The Times and The Guardian, when being given a tour of the carrier’s aft island – the rear of the two towers protruding above the ship’s main deck Read more about HMS QE: Britain’s newest Aircraft Carrier runs Windows XP[…]

Intel’s Skylake and Kaby Lake CPUs have nasty microcode bug

The Debian advisory says affected users need to disable hyper-threading “immediately” in their BIOS or UEFI settings, because the processors can “dangerously misbehave when hyper-threading is enabled.” Symptoms can include “application and system misbehaviour, data corruption, and data loss”. Henrique de Moraes Holschuh, who authored the Debian post, notes that all operating systems, not only Read more about Intel’s Skylake and Kaby Lake CPUs have nasty microcode bug[…]

Anthem to shell out $115m in largest-ever data theft settlement: 1/3rd goes to lawyers, 10% to Experian, much to taxes, leaves around 10% for victims. Shows you what use the Law is for justice.

If you were one of those hit by the intrusion, don’t expect a big payout. Plenty of others will be getting their cuts first. According to the terms of the settlement, a full third of the package ($37,950,000) has been earmarked to cover attorney fees. An additional $17m will be paid out to Experian, who Read more about Anthem to shell out $115m in largest-ever data theft settlement: 1/3rd goes to lawyers, 10% to Experian, much to taxes, leaves around 10% for victims. Shows you what use the Law is for justice.[…]

Password Reset man in the middle attack

The Password Reset Man in the Middle (PRMITM) attack exploits the similarity of the registration and password reset processes. To launch such an attack, the attacker only needs to control a website. To entice victims to make an account on the malicious website, the attacker can offer free access to a wanted resource (e.g. free Read more about Password Reset man in the middle attack[…]

Gmail no longer will scan your emails – because they allready know enough about you through other channels

G Suite’s Gmail is already not used as input for ads personalization, and Google has decided to follow suit later this year in our free consumer Gmail service. Consumer Gmail content will not be used or scanned for any ads personalization after this change. This decision brings Gmail ads in line with how we personalize Read more about Gmail no longer will scan your emails – because they allready know enough about you through other channels[…]

CIA airgaps using Brutal Kangaroo software

The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as “primary host”) and installs the BrutalKangaroo malware on it. When a user is using the primary host and Read more about CIA airgaps using Brutal Kangaroo software[…]

NSA opens Github repo

THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, Read more about NSA opens Github repo[…]

Humanity uploaded an AI to Mars and lets it shoot rocks with lasers

AEGIS doesn’t cover general operations, which are still directed by humans. Instead it lets Curiosity pick its own targets on which to focus its ChemCam, an instrument that first vaporizes Martian rocks with a laser and then studies the resulting gases. AEGIS does so after analysing images captured by Curiosity’s NavCam, which snaps stereo images, Read more about Humanity uploaded an AI to Mars and lets it shoot rocks with lasers[…]

Navistone saves filled in form data on hundreds of sites before you submit it!

[As you fill out a form] You change your mind and close the page before clicking the Submit button and agreeing to Quicken’s privacy policy.[…]Your email address and phone number have already been sent to a server at “murdoog.com,” which is owned by NaviStone, a company that advertises its ability to unmask anonymous website visitors Read more about Navistone saves filled in form data on hundreds of sites before you submit it![…]

Walmart Gears Up Anti-Amazon Stance in Wake of Whole Foods Deal

Days after arch-rival Amazon announced plans to buy Whole Foods for $13.7 billion, Walmart is apparently ramping up its defense. That acquisition takes square aim at Walmart’s bread-and-butter grocery business by giving the online retailer 465 new retail locations—thus a much bigger brick-and-mortar presence. Now, Walmart is telling some partners and suppliers that their software Read more about Walmart Gears Up Anti-Amazon Stance in Wake of Whole Foods Deal[…]

Inventory insurers in NL sneakily exclude smartphones

It turns out they won’t cover the cost of your smartphone breakages, because they are the most popular claims. And if they do cover your tablet, there are surcharges and other difficulties. Allrisk inboedelverzekeraars hebben zich gewapend tegen kwetsbare smartphones, zo blijkt uit onderzoek van financieel communicatiebureau SevenEight onder 23 grote allrisk inboedelverzekeraars. Source: Inboedelverzekeraar Read more about Inventory insurers in NL sneakily exclude smartphones[…]

Personal data on 198 million voters, including analytics data that suggests who a person is likely to vote for and why, was stored on an unsecured Amazon server.

A huge trove of voter data, including personal information and voter profiling data on what’s thought to be every registered US voter dating back more than a decade, has been found on an exposed and unsecured server, ZDNet has learned. It’s believed to be the largest ever known exposure of voter information to date. The Read more about Personal data on 198 million voters, including analytics data that suggests who a person is likely to vote for and why, was stored on an unsecured Amazon server.[…]

Revealed: Facebook exposed identities of moderators to suspected terrorists

A security lapse that affected more than 1,000 workers forced one moderator into hiding – and he still lives in constant fear for his safety Source: Revealed: Facebook exposed identities of moderators to suspected terrorists Facebook moderators like him first suspected there was a problem when they started receiving friend requests from people affiliated with Read more about Revealed: Facebook exposed identities of moderators to suspected terrorists[…]

Scientists win Nobel Prize in Chemistry for making tiny machines out of molecules

https://www.theverge.com/2016/10/5/13162476/nobel-prize-chemistry-tiny-machine-molecules-nanocar-stoddart-ferringa-sauvage This year’s Nobel Prize in Chemistry has been awarded to three scientists who figured out how to build tiny machines out of molecules. The machines, which include a nano-sized car, are invisible to the human eye and have important implications in medicine and other fields. The researchers — Jean-Pierre Sauvage, J. Fraser Stoddart, and Bernard Feringa Read more about Scientists win Nobel Prize in Chemistry for making tiny machines out of molecules[…]

Facebook’s Emotion Tech: Patents Show New Ways For Detecting And Responding To Users’ Feelings

Facebook’s newest patent, granted May 25, aims to monitor users’ typing speed to predict emotions and adapt messages in response. We took a look at some of Facebook’s emotion-based patents to understand how the company is thinking about capturing and responding to people’s emotional reactions, which has been a tricky area for consumer tech companies Read more about Facebook’s Emotion Tech: Patents Show New Ways For Detecting And Responding To Users’ Feelings[…]

Dutch Usenetprovider Eweka forced by judge to hand over personal details to BREIN without judicial oversight

A Dutch judge has said that the usenet provider needs to hand over personal details to BREIN (the Dutch version of the RIAA) without any reason other than that BREIN wants them or face a fine of EUR 1000,- per day. It’s pretty bizarre that some commercial entity can raid anyones private data because they Read more about Dutch Usenetprovider Eweka forced by judge to hand over personal details to BREIN without judicial oversight[…]

Artificial tongues can discriminate between whiskeys

We present simple tongues consisting of fluorescent polyelectrolytes or chimeric green fluorescent proteins (GFPs) to discriminating 33 different whiskies according to their country of origin (Ireland, US, or Scotland), brand, blend status (blend or single malt), age, and taste (rich or light). The mechanism of action for these tongues is differential quenching of the fluorescence Read more about Artificial tongues can discriminate between whiskeys[…]

The “Doubleswitch” social media attack: how to lock people out of social media accounts and use them to spread fake news

With the Doubleswitch attack, a hijacker takes control of a victim’s account through one of several attack vectors. People who have not enabled an app-based form of multifactor authentication for their accounts are especially vulnerable. For instance, an attacker could trick you into revealing your password through phishing. If you don’t have multifactor authentication, you Read more about The “Doubleswitch” social media attack: how to lock people out of social media accounts and use them to spread fake news[…]