Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Inmates in Ohio’s Marion Correctional Institution smuggled computer parts out of an ewaste recycling workshop and built two working computers out of them, hiding them in the ceiling of a training room closet ceiling and covertly patching them into the prison’s network. (more…)

Originally posted here:
Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Kaspersky Labs reports that an unnamed large Brazilian financial institution with $27B in assets was compromised by hackers who took over its DNS — by hijacking its NIC.br account — and for 5 hours were able to impersonate the bank to all its online customers (and possibly to control its ATMs) in order to plunder their accounts and steal their credit card details. (more…)

Original post:
Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Scuttlebutt: an "off-grid" P2P social network that runs without servers and can fall back to sneakernet

Dominic Tarr is a developer who lives on a self-steering sailboat in New Zealand; he created Scuttlebutt, a secure messaging system that can run without servers, even without ISPs. (more…)

Excerpt from:
Scuttlebutt: an "off-grid" P2P social network that runs without servers and can fall back to sneakernet

A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

The most reliably impressive technology I’ve played with this decade is projection-mapping: using powerful LCD projectors to paint 3D surfaces with images tailored to map exactly over those surfaces, turning plaster and paint into stone, wood, or animated surfaces. (more…)

View original post here:
A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

Poisoned wifi signals can take over all Android devices in range, no user intervention required

Vulnerabilities in the Broadcom system-on-a-chip that provides wifi for many Android devices mean that simply lighting up a malicious wifi access point can allow an attacker to compromise every vulnerable device in range, without the users having to take any action — they don’t have to try to connect to the malicious network. (more…)

Taken from:
Poisoned wifi signals can take over all Android devices in range, no user intervention required

Samsung’s created a new IoT OS, and it’s a dumpster fire

Tizen is Samsung’s long-touted OS to replace Android and Israeli security researcher Amihai Neiderman just delivered a talk on it at Kapersky Lab’s Security Analyst Summit where he revealed 40 new 0-day flaws in the OS, and showed that he could trivially send malicious code updates to any Tizen device, from TVs to phones, thanks to amateurish mistakes of the sort not seen in real production environments for decades. (more…)

More:
Samsung’s created a new IoT OS, and it’s a dumpster fire

Futuracha, a beautiful, ornamental typeface that magically adjusts as you type

https://www.youtube.com/watch?v=ETtFvFDSLys Futuracha is a successfully crowdfunded typeface that makes use of Open Type’s wizardry to switch its ligatures as you type, producing beautiful effects — before the crowdfunding campaign, Futuracha users had to hand-set those ligatures, but now it’s just type and go. $50 for a commercial license, $15 for a personal license. Ships in May. ( via Red Ferret )

See the original post:
Futuracha, a beautiful, ornamental typeface that magically adjusts as you type

USG: an open source anti-BadUSB hardware firewall for your USB port

BadUSB is bad news: malware that targets the firmware in your USB port’s embedded system, bypassing the OS, antivirus software and other countermeasures. (more…)

More:
USG: an open source anti-BadUSB hardware firewall for your USB port

Healthcare facilities widely compromised by Medjack, malware that infects medical devices to steal your information

The healthcare industry is a well-known information security dumpster fire, from the entire hospitals hijacked by ransomware to the useless security on medical devices to the terrifying world of shitty state security for medical implants — all made worse by the cack-handed security measures that hospital workers have to bypass to get on with saving our lives (and it’s about to get worse, thanks to the Internet of Things > ). (more…)

Continue Reading:
Healthcare facilities widely compromised by Medjack, malware that infects medical devices to steal your information

Artificial sweeteners be damned; these naturally occurring, safe proteins are thousands of times sweeter than sugar

KSU plant biochemical geneticist Raj Nagarajan describes the properties of Thaumatin, Monellin and Brazzein, all found in west African plants that are generally considered safe for consumption; each is a protein, and they are, respectively, 1,000x, 2000x, and 3000x sweeter than sugar. (more…)

Originally posted here:
Artificial sweeteners be damned; these naturally occurring, safe proteins are thousands of times sweeter than sugar