How to Turn a USB Stick into an Ultra Portable PC

Image: Gizmodo Who doesn’t hate carrying around their laptop? Even the lightest ones weigh a couple of pounds and can be a huge burden to lug around the city. That’s where portable apps, ones stored on a USB drive, come in. Read more…

Read More:
How to Turn a USB Stick into an Ultra Portable PC

There’s A New Way People Can Break Into Cars With Keyless Entry Systems And Drive Off

It’s freaky enough when hackers can disable brakes, control a steering wheel or shut down an engine as a vehicle goes down the road. But hacking can happen when a car is vacant, and there’s apparently a device making its way over from Europe that tricks keyless systems into unlocking and starting a car for theft. Read more…

Visit link:
There’s A New Way People Can Break Into Cars With Keyless Entry Systems And Drive Off

Bank Glitch Allows Man to Spend Over $1 Million and Walk Away Free

Normally a glitch is a bad thing. Maybe it means your video game character gets stuck in a wall or maybe a glitch gets you wrongfully arrested . For an Australian man named Luke Moore, a simple bank glitch meant that he was able to blow $1.3 million on cars, travel, strippers and drugs over the course of two years. Read more…

Read More:
Bank Glitch Allows Man to Spend Over $1 Million and Walk Away Free

5-Year-Old Critical Linux Vulnerability Patched

msm1267 quotes Kaspersky Lab’s ThreatPost: A critical, local code-execution vulnerability in the Linux kernel was patched more than a week ago, continuing a run of serious security issues in the operating system, most of which have been hiding in the code for years. Details on the vulnerability were published Tuesday by researcher Philip Pettersson, who said the vulnerable code was introd in August 2011. A patch was pushed to the mainline Linux kernel December 2, four days after it was privately disclosed. Pettersson has developed a proof-of-concept exploit specifically for Ubuntu distributions, but told Threatpost his attack could be ported to other distros with some changes. The vulnerability is a race condition that was discovered in the af_packet implementation in the Linux kernel, and Pettersson said that a local attacker could exploit the bug to gain kernel code execution from unprivileged processes. He said the bug cannot be exploited remotely. “Basically it’s a bait-and-switch, ” the researcher told Threatpost. “The bug allows you to trick the kernel into thinking it is working with one kind of object, while you actually switched it to another kind of object before it could react.” Read more of this story at Slashdot.

View original post here:
5-Year-Old Critical Linux Vulnerability Patched

Researchers Point Out ‘Theoretical’ Security Flaws In AMD’s Upcoming Zen CPU

An anonymous reader writes from a report via BleepingComputer: The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, according to two German researchers. The technology, called Secure Encrypted Virtualization (SEV), is designed to encrypt parts of the memory shared by different virtual machines on cloud servers. AMD, who plans to ship SEV with its upcoming line of Zen processors, has published the technical documentation for the SEV technology this past April. The German researchers have analyzed the design of SEV, using this public documentation, and said they managed to identify three attack channels, which work, at least in theory. [In a technical paper released over the past weekend, the researchers described their attacks:] “We show how a malicious hypervisor can force the guest to perform arbitrary read and write operations on protected memory. We describe how to completely disable any SEV memory protection configured by the tenant. We implement a replay attack that uses captured login data to gain access to the target system by solely exploiting resource management features of a hypervisor.” AMD is scheduled to ship SEV with the Zen processor line in the first quarter of 2017. Read more of this story at Slashdot.

Read More:
Researchers Point Out ‘Theoretical’ Security Flaws In AMD’s Upcoming Zen CPU

How to Perfectly Fake a Glowing Lightsaber in Photoshop

It’s time to face the facts: lightsabers aren’t real, and they’re simply not going to exist in your lifetime. The closest you can get to realizing your Jedi fantasies is through this excellent tutorial by Mathieu Stern showing you how to properly fake a lightsaber using Photoshop. Read more…

Continued here:
How to Perfectly Fake a Glowing Lightsaber in Photoshop

Qualcomm Debuts 10nm Server Chip To Attack Intel Server Stronghold

An anonymous reader quotes a report from Tom’s Hardware: Qualcomm and its Qualcomm Datacenter Technologies subsidiary announced today that the company has already begun sampling its first 10nm server processor. The Centriq 2400 is the second generation of Qualcomm server SOCs, but it is the first in its new family of 10nm FinFET processors. The Centriq 2400 features up to 48 custom Qualcomm ARMv8-compliant Falkor cores and comes a little over a year after Qualcomm began developing its first-generation Centriq processors. Qualcomm’s introduction of a 10nm server chip while Intel is still refining its 14nm process appears to be a clear shot across Intel’s bow–due not only to the smaller process, but also its sudden lead in core count. Intel’s latest 14nm E7 Broadwell processors top out at 24 cores. Qualcomm isn’t releasing more information, such as clock speeds or performance specifications, which would help to quantify the benefit of its increased core count. The server market commands the highest margins, which is certainly attractive for the mobile-centric Qualcomm, which found its success in the relatively low-margin smartphone segment. However, Intel has a commanding lead in the data center with more than a 99% share of the world’s server sockets, and penetrating the segment requires considerable time, investment, and ecosystem development. Qualcomm unveiled at least a small portion of its development efforts by demonstrating Apache Spark and Hadoop on Linux and Java running on the Centriq 2400 processor. The company also notes that Falkor is SBSA compliant, which means that it is compatible with any software that runs on an ARMv8-compliant server platform. Read more of this story at Slashdot.

Read More:
Qualcomm Debuts 10nm Server Chip To Attack Intel Server Stronghold

United Airlines Will Start Charging for Use of Overhead Bins

Remember your last flight when you told yourself that at least flying couldn’t get any worse? Well, it’s about to get worse. United Airlines will soon start charging some customers for the privilege to use the overhead bins . Read more…

See the article here:
United Airlines Will Start Charging for Use of Overhead Bins

How to Download Netflix Movies to Your SD Card and Save Space on Your Phone

Rejoice, you can download Netflix movies and TV shows to watch offline. Unfortunately, it only downloads to your built-in storage by default, which can lead to some slow, cluttered phones. If you’d rather use the extra space on your SD card for all those Stranger Things episodes, here’s how. Read more…

Read the original post:
How to Download Netflix Movies to Your SD Card and Save Space on Your Phone