F4t3TV

279 Flips | 4 Magazines | 15 Likes | 1 Following | 17 Followers | @F4t3TV | Keep up with F4t3TV on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “F4t3TV”

Build a REST API in 5 Minutes with PubNub

Developers need APIs. Every tech company that provides Internet-based services exposes an <b>application programming interface</b> to enable developers to do …

JavaScript

Here's why the feds are freaked out about a drone attack

U.S. officials sent out a warning after Venezuelan President Nicolas Maduro was attacked with explosive drones in a failed assassination attempt.<p>The …

Drones

How to Read Programming Error Messages

Maybe software-development used to be different. Maybe you spent hours devising algorithms, huddled together over whiteboards until your markers ran …

Lil Durk - Glock Up

Social Engineer Spills Tricks of the Trade

A social engineer points out gaping holes in businesses' human security and shares lessons learned from years of phishing research.<p>Imagine this: A …

Feds seize $48M from ‘Silk Road’ mastermind

Manhattan federal prosecutors boasted Friday that they have seized $48 million from convicted Silk Road mastermind Ross Ulbricht.<p>Ulbricht, serving a …

Defcon vote-hacking village shows that "secure" voting machines can be broken in minutes

Since the 2000 Bush-Gore election crisis and the hanging-chad controversy, voting machine vendors have been offering touchscreen voting machines as a …

I play the security odds in Las Vegas by rolling the Wi-Fi dice

It's worse than the Wall of Shame. It's the Wall of Sheep.<p>You're going to get hacked at Black Hat or Defcon, two of the largest hacker conventions in the world, if your device is insecure. And every year, hackers, security researchers and incognito federal agents attending the events, which run …

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA

DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented.<p>Hardware tokens, small devices that produce a code or plug into your computer, provide possibly the best way to add an extra lock onto your email account. Whereas two-factor authentication sent by SMS can be …

D-ID’s tech protects your privacy by confounding face recognition algorithms

D-ID’s founders Eliran Kuta, Gil Perry, and Sella Blondheim<p>Unless you literally wear a mask all the time, it is almost impossible to completely avoid cameras and face recognition technology. Not only is this a privacy concern, but it also presents a potential liability for companies that need to …

Machine Perception

Charities 'creating privacy risks by collecting and distributing donor information'

It's a recurring scenario: A friend is engaged in a charitable cause. They ask me for a donation and I'm happy to oblige.<p>But unless I can give them …

Cars Suck Up Data About You. Where Does It All Go?

Cars have become rolling listening posts. They can track phone calls and texts, log queries to websites, record what radio stations you listen to — even tell you when you are breaking the law by exceeding the speed limit.<p>Automakers, local governments, retailers, insurers and tech companies are …

Microsoft is quietly fighting a clever war against Russian hacking group Fancy Bear

While the White House mulls striking up a joint cyber program with Russia, an unlikely vigilante is taking care of business. As the Daily Beast reports, Microsoft has been waging a quiet war against the hacking entity known as Fancy Bear, which is believed to be associated with the GRU, Russia’s …

Drowned security robot wasn't a victim of foul play

By now you've probably heard of that security robot that fell into a fountain in Washington, DC-- it's practically the stuff of legend as far as the internet is concerned. But what really happened on that tragic day? We're starting to get a clearer picture. <i>Bisnow</i> has learned that the robot, a …

Existentialism

The Paradox of a Weapon you Give to your Target

I pointed this problem out during my “cyberwar is bullshit” talk at RSA conference in 2012: once you begin <i>using</i> your cyberweapons, they become …

Engineering

Prolific Russian Hacker Gets Nine Years in Prison

Alexander Tverdokhlebov, 29, a former Russian national, now a US citizen living in Los Angeles, was sentenced to nine years in prison for operating a …

Secret Service

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.Luke Jennings …

Malware

Dial S for SQLi: Now skiddies can order web attacks via text message

Katyusha scanner targets web servers with instant chatHackers are touting a tool that allows any idiot with a smartphone to conveniently order up …

Information Security

Do DIY Computer Kits Really Teach Kids About Coding?

Our in-house Software Architect tests the new Kano Pixel Kit with his kids to find out<p>In 2014, DIY computer company Kano released their first …

Head-up display gives any car a fighter-jet feel [Deals]

Driving comes closest to the feeling of being a pilot that most of us will ever get. Given the way most people handle a car, that’s probably a good thing. But one simple way to safely bring the sense of a cockpit to the driver’s seat is to add a proper head-up display (HUD).<p>HUDWAY Glass is a slim, …

Commuting

3 Ways to Find Out Which Process Listening on a Particular Port

A port is a logical entity which represents an endpoint of communication and is associated with a given process or service in an operating system. In …

Linux

PPEE v1.09 – Professional PE file Explorer

PPEE (puppy) is a Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details. …

Cybersecurity

TheFatRat – Massive Exploitation Tool

TheFatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post exploitation attacks like browser attack DLL files. …

Linux

Why It's Often Easier To Innovate In China Than In The United States

About a year and a half ago, I discovered this $US12 "Gongkai" mobile phone (pictured above) in the markets of Shenzhen, China. My most striking …

OWASP ZeroDay Cyber Research Shellcoder

OWASP ZeroDay Cyber Research Shellcoder [Generator] is an open source software in python language which lets you generate customized shellcodes for …

KeeThief – A Case Study in Attacking KeePass Part 2

<b>Note:</b> this post and code were co-written with my fellow ATD workmate Lee Christensen (@tifkin_) who developed several of the interesting components …

Cybersecurity

CrackMapExec v3.1.2 – A swiss army knife for pentesting Windows/Active Directory environments. – Security List Network™

<b>Changelog CrackMapExec v3.1.2:</b><br>+ Some minor code cleanup<br>+ Error handling improvements<br>+ Bug fixes in SMB brute forcing and SMB spider logic<br>+ Added …

MorphAES - IDPS SandBox AntiVirus STEALTH KILLER

MorphAES is the world's first polymorphic shellcode/malware engine, with metamorphic properties and capability to bypass sandboxes, which makes it …

Information Security