Three members of Monty Python’s Flying Circus have reportedly signed on for a new movie in which aliens come to Earth to grant wishes to humans. [Read more]
Follow this link:
A Monty Python sci-fi movie? With Robin Williams? What?
Three members of Monty Python’s Flying Circus have reportedly signed on for a new movie in which aliens come to Earth to grant wishes to humans. [Read more]
Follow this link:
A Monty Python sci-fi movie? With Robin Williams? What?
How does the Surface Pro measure up against other top tablets and laptop alternatives? [Read more]
Read More:
Microsoft Surface Pro versus the competition
In an interview on CNBC, CEO Bob Iger says Disney and LucasFilm will make several new movies based on existing characters in addition to “Star Wars Episode VII” and two other sequels. [Read more]
More here:
Disney will spin off films based on ‘Star Wars’ characters
Released Friday, the latest critical patch update contains fixes for 50 different security flaws. [Read more]
Continue reading here:
Oracle pushes out new Java update to patch security holes
An anonymous reader writes “Mozilla on Tuesday announced a massive change to the way it loads third-party plugins in Firefox. The company plans to enable Click to Play for all versions of all plugins, except the latest release of Flash. This essentially means Firefox will soon only load third-party plugins when users click to interact with the plugin. Currently, Firefox automatically loads any plugin requested by a website, unless Mozilla has blocked it for security reasons (such as for old versions of Java, Silverlight, and Flash).” Read more of this story at Slashdot.
See the article here:
Mozilla To Enable Click-To-Play For All Firefox Plugins By Default
We the People platform quadruples the number of signatures required on petitions before they merit the Obama Administration’s attention. [Read more]
Follow this link:
White House raises petition signature threshold to 100K
If your organization uses Citrix services, then the background programs for this service may be a cause for some slowdowns. [Read more]
More:
Citrix background services taking 100 percent CPU in OS X
The MTU handling in OS X Mountain Lion may not work with the configuration for some Web servers, and might need to be adjusted. [Read more]
Continue Reading:
Troubleshooting HTTPS timeouts in OS X Mountain Lion
Seagates demos its third-gen hybrid drive at CES 2013 and aims to replace all high-end laptop hard drives with hybrid drives. [Read more]
Excerpt from:
Seagate embraces SSHDs, phasing out 7,200rpm laptop HDDs
Here’s a video of Ang Cui and Michael Costello’s Hacking Cisco Phones talk at the 29th Chaos Communications Congress in Berlin. Cui gave a show-stealing talk last year on hacking HP printers, showing that he could turn your printer into a inside-the-firewall spy that systematically breaks vulnerable machines on your network, just by getting you to print out a document. Cui’s HP talk showed how HP had relied upon the idea that no one would ever want to hack a printer as its primary security. With Cisco, he’s looking at a device that was designed with security in mind. The means by which he broke the phone’s security is much more clever, and makes a fascinating case-study into the cat-and-mouse of system security. Even more interesting is the discussion of what happened when Cui disclosed to Cisco, and how Cisco flubbed the patch they released to keep his exploit from working, and the social issues around convincing people that phones matter. We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating system that powers all Cisco TNP IP phones. We demonstrate the reliable exploitation of all Cisco TNP phones via multiple vulnerabilities found in the CNU kernel. We demonstrate practical covert surveillance using constant, stealthy exfiltration of microphone data via a number of covert channels. We also demonstrate the worm-like propagation of our CNU malware, which can quickly compromise all vulnerable Cisco phones on the network. We discuss the feasibility of our attacks given physical access, internal network access and remote access across the internet. Lastly, we built on last year’s presentation by discussing the feasibility of exploiting Cisco phones from compromised HP printers and vice versa. We present the hardware and software reverse-engineering process which led to the discovery of the vulnerabilities described below. We also present methods of exploiting the following vulnerabilities remotely. Hacking Cisco Phones [29C3] ( Thanks, Ang! )
Read this article:
Your Cisco phone is listening to you: 29C3 talk on breaking Cisco phones