Man steals over 100 phones at Coachella, busted by Find My iPhone

Stealing phones at Coachella is nothing new. My daughter had hers stolen a few years ago, and when I mentioned it to someone I ran into at the supermarket, she said her son’s phone had been stolen that year as well. And then a stranger who overheard us piped in that her son had also lost his phone to an “Apple picker,” as she referred to the thief. But this year, when a gentleman from New York swept through the festival picking phones from oblivious Coachella goers, a few people turned to Find My iPhone for help. The app led them to 36-year-old Reinaldo De Jesus Henao with a backpack stuffed with phones. According to NBC San Diego : The crime spree was discovered when several people noticed their phones were missing and activated the “Find My Phone” feature, police said. Those signals led the victims to Henao. Security guards detained him and when Indio police arrived they found more than 100 phones in Henao’s backpack, according to police. Some of the phones were returned to the victims that day or the next. Image by iphonedigital

Read More:
Man steals over 100 phones at Coachella, busted by Find My iPhone

Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Graphical demos created with severe code-length limitations sometimes betray the techniques used to fit a world into a few kilobytes: tessellating textures, featureless fractals, repetitive sequences, and so on. Final Stage , by 0x4015 , is not one of those demos. [ via ] Here it is rendered on a XEON x560 with a GTX 1070 video card and 24GB of RAM. Check out all the other uploads from the Revision 2017 demoparty. Eidolon , by Poo-brain, won in the 64k category: https://www.youtube.com/watch?v=-bwLkEwLIgQ

View original post here:
Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Inmates in Ohio’s Marion Correctional Institution smuggled computer parts out of an ewaste recycling workshop and built two working computers out of them, hiding them in the ceiling of a training room closet ceiling and covertly patching them into the prison’s network. (more…)

Originally posted here:
Prison inmates built working PCs out of ewaste, networked them, and hid them in a closet ceiling

Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Kaspersky Labs reports that an unnamed large Brazilian financial institution with $27B in assets was compromised by hackers who took over its DNS — by hijacking its NIC.br account — and for 5 hours were able to impersonate the bank to all its online customers (and possibly to control its ATMs) in order to plunder their accounts and steal their credit card details. (more…)

Original post:
Hackers hijacked a bank’s DNS and spent 5 hours raiding its customers’ accounts

Inuit cartography: maps carved in driftwood

The Inuit carve portable, waterproof, floating maps out of driftwood for use in navigating the littoral. These three wooden maps show the journey from Sermiligaaq to Kangertittivatsiaq, on Greenland’s East Coast. The map to the right shows the islands along the coast, while the map in the middle shows the mainland and is read from one side of the block around to the other. The map to the left shows the peninsula between the Sermiligaaq and Kangertivartikajik fjords. From The Decolonial Atlas , an antidote to all the other ones: Kurdistan in Kurdish , Lakota Territory , Agricultural Maps .

Read more here:
Inuit cartography: maps carved in driftwood

A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

The most reliably impressive technology I’ve played with this decade is projection-mapping: using powerful LCD projectors to paint 3D surfaces with images tailored to map exactly over those surfaces, turning plaster and paint into stone, wood, or animated surfaces. (more…)

View original post here:
A startup wants to fill your house with projection-mapped effects, which are the cooolest thing ever

Poisoned wifi signals can take over all Android devices in range, no user intervention required

Vulnerabilities in the Broadcom system-on-a-chip that provides wifi for many Android devices mean that simply lighting up a malicious wifi access point can allow an attacker to compromise every vulnerable device in range, without the users having to take any action — they don’t have to try to connect to the malicious network. (more…)

Taken from:
Poisoned wifi signals can take over all Android devices in range, no user intervention required

Samsung’s created a new IoT OS, and it’s a dumpster fire

Tizen is Samsung’s long-touted OS to replace Android and Israeli security researcher Amihai Neiderman just delivered a talk on it at Kapersky Lab’s Security Analyst Summit where he revealed 40 new 0-day flaws in the OS, and showed that he could trivially send malicious code updates to any Tizen device, from TVs to phones, thanks to amateurish mistakes of the sort not seen in real production environments for decades. (more…)

More:
Samsung’s created a new IoT OS, and it’s a dumpster fire

Incredible giant chocolate geodes

Alex Yeatts, a student at the Culinary Institute of America, worked for six months to cook up amazing chocolate geode cakes. Crack one open to reveal the dazzling sugar crystals. Stunning work. A post shared by Alex Yeatts (@alex.yeatts) on Mar 11, 2017 at 10:18am PST A post shared by Alex Yeatts (@alex.yeatts) on Mar 20, 2017 at 6:59am PDT

Read this article:
Incredible giant chocolate geodes