Wrap Gifts Without Any Tape or Ribbon Using This Japanese Method

There’s something a little inelegant about covering your gifts with odd bits of tape. It’s quite literally the rough duct tape solution to wrapping presents. If you don’t have any tape or ribbon want to avoid a tacky aesthetic, this Japanese method can keep your presents wrapped sans sticky tape. Read more…

Read more here:
Wrap Gifts Without Any Tape or Ribbon Using This Japanese Method

David Tennant Is Your New Scrooge McDuck In DuckTales

We’ve known that Disney is doing a brand new DuckTales for a while, but now we’re starting to get some solid details about who’ll be providing the voices of our feathered friends… and it turns out a former Time Lord and Marvel villain is lending his brogue to Scrooge McDuck himself. Read more…

Read this article:
David Tennant Is Your New Scrooge McDuck In DuckTales

A $300 Device Can Steal Mac FileVault2 Passwords

An anonymous reader writes: Swedish hardware hacker Ulf Frisk has created a device that can extract Mac FileVault2 (Apple’s disk encryption utility) passwords from a device’s memory before macOS boots and anti-DMA protections kick in. The extracted passwords are in cleartext, and they also double as the macOS logon passwords. The attack requires physical access, but it takes less than 30 seconds to carry out. A special device is needed, which runs custom software (available on GitHub), and uses hardware parts that cost around $300. Apple fixed the attack in macOS 10.12.2. The device is similar to what Samy Kamker created with Poison Tap. Read more of this story at Slashdot.

Continue Reading:
A $300 Device Can Steal Mac FileVault2 Passwords

That Story About a Boy Dying In Santa’s Arms Is Totally Fake

Did you see that story about a 5-year-old boy and his dying wish to see Santa Claus? Of course you did. The heartbreaking tale has been seen and heard by millions of people around the world . It went viral earlier this week when it was retold by virtually every major news outlet. The only problem? It’s almost certainly fake. Read more…

Continue reading here:
That Story About a Boy Dying In Santa’s Arms Is Totally Fake

Alaska Airlines and Virgin America Are Merging, Here’s What It Means for You

Alaska Airlines and Virgin America are coming together to form the fifth largest U.S. carrier, and if you fly either airline often their merger means a few changes for you. Here’s what you can expect. Read more…

Read more here:
Alaska Airlines and Virgin America Are Merging, Here’s What It Means for You

The Feds Want All New Cars To Talk To Each Other By 2023

The U.S. Department Of Transportation and automakers have been testing the concept of vehicle-to-vehicle (V2V) communication for years. Today the agency said it’s getting serious about having cars talk to each other for safety, and has proposed specific rules and methods that would force automakers to load vehicles with this tech on all new vehicles by 2023. Read more…

Read the article:
The Feds Want All New Cars To Talk To Each Other By 2023

Recreating a 17th Century Painting in Photoshop Is Basically Magic

Using stock images and Johannes Vermeer’s 1664 painting The Concert as a base, photographer  Erik Almas admirably recreated the lost masterpiece in Photoshop. Heck, it might be able to fool you into thinking it were the real thing… if you were standing and squinting from very far away. Still. It’s pretty neat to see Almas’ workflow and how creative he gets in trying to mimic the original. Read more…

Link:
Recreating a 17th Century Painting in Photoshop Is Basically Magic

First Version of Sandboxed Tor Browser Available

An anonymous reader writes: To protect Tor users from FBI hacking tools that include all sorts of Firefox zero-days, the Tor Project started working on a sandboxed version of the Tor Browser in September. Over the weekend, the Tor Project released the first alpha version of the sandboxed Tor Browser. “Currently, this version is in an early alpha stage, and only available for Linux, ” reports BleepingComputer. “There are also no binaries available, and users must compile it themselves from the source code, which they can grab from here.” The report notes: “Sandboxing is a security mechanism employed to separate running processes. In computer security, sandboxing an application means separating its process from the OS, so vulnerabilities in that app can’t be leveraged to extend access to the underlying operating system. This is because the sandboxed application works with its own separate portion of disk and memory that isn’t linked with the OS.” Read more of this story at Slashdot.

Originally posted here:
First Version of Sandboxed Tor Browser Available

How to Turn a USB Stick into an Ultra Portable PC

Image: Gizmodo Who doesn’t hate carrying around their laptop? Even the lightest ones weigh a couple of pounds and can be a huge burden to lug around the city. That’s where portable apps, ones stored on a USB drive, come in. Read more…

Read More:
How to Turn a USB Stick into an Ultra Portable PC

New Ransomware Offers The Decryption Keys If You Infect Your Friends

MalwareHunterTeam has discovered “Popcorn Time, ” a new in-development ransomware with a twist. Gumbercules!! writes: “With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key, ” writes Bleeping Computer. Infected victims are given a “referral code” and, if two people are infected by that code and pay up — the original victim is given their decryption key (potentially). While encrypting your files, Popcorn Time displays a fake system screen that says “Downloading and installing. Please wait” — followed by a seven-day countdown clock for the amount of time left to pay its ransom of one bitcoin. That screen claims that the perpetrators are “a group of computer science students from Syria, ” and that “all the money that we get goes to food, medicine, shelter to our people. We are extremely sorry that we are forcing you to pay but that’s the only way that we can keep living.” So what would you do if this ransomware infected your files? Read more of this story at Slashdot.

Link:
New Ransomware Offers The Decryption Keys If You Infect Your Friends