Maurice Meinster

71 Added | 3 Magazines | 41 Likes | 1 Following | 3 Followers | @MauMei | Keep up with Maurice Meinster on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Maurice Meinster”

Who needs sights anymore? DARPA has just developed self-guiding bullets

If you thought TrackingPoint’s computerized target tracking system was crazy, get a load of this: DARPA, the advanced research wing of the US …

DARPA

DARPA invests in a super-light exoskeleton for soldiers

This is the Soft Exosuit, a lightweight skeleton frame that can help its wearer cover more ground with less exertion. The “wearable robot” has been …

Robotics

U.S. Navy’s sub-hunting drone ships will hit the open ocean this summer

Drones may known for their prowess in the skies, but thanks to some new developments at the U.S. Navy, they’ll soon be turning the open seas into …

Military

Look Inside Novorossiysk, the Russian Navy's Super-Quiet Attack Sub

The Russian Navy received six Project 636.3 subs, NATO designation "Improved Kilo," for the Black Sea Fleet between 2014 and 2016, with half-a-dozen …

Android malware hidden in QR code apps infects 1 million users

• A new form of Android malware has been discovered in the Google Play Store by security researchers.<br>• Named Andr/HiddnAd-AJ, the malware remains inactive for six hours after being downloaded before bombarding users with ads.<br>• The apps were downloaded more than half a million times, though Google has now …

Apps

Download and protect your Facebook data in just a few clicks

You can't put the genie back in the bottle but you can know what they know about you.<p>The Facebook privacy scandal has users demanding to see how much the social media giant knows about them and how they can limit the amount of data they're giving out.<p>The bad news is that your data may already be …

Social Media

New web security standard promises safer, faster browsing

It's safe to say that web security could use a tune-up given the deluge of malware attacks and data breaches. Thankfully, it's about to get one. The Internet Engineering Task Force has approved Transport Layer Security 1.3, a new standard that makes some fundamental improvements to how and when web …

World Wide Web

Raytheon's laser and microwave buggy test brought down 45 drones

This week, Raytheon announced it successfully tested its anti-drone technology. The advanced high-power microwave and laser dune buggy brought down 45 unmanned aerial vehicles (UAVs) and drones at a U.S. Army exercise that was held in Fort Sill, Oklahoma.<p>The microwave system was able to bring down …

Researcher shows how vulnerable Ledger Nano S wallets are to hacking

Cryptocurrency hardware wallet manufacturer Ledger can’t seem to catch a break.<p>Weeks after the company confirmed a flaw in its wallets which makes them susceptible to man-in-the-middle-attacks, independent security researcher Saleem Rashid has demonstrated a new attack vector hackers can employ to …

US Navy launches submarine maneuvered by Xbox controller

Commentary: The USS Colorado has a new way of operating its photonics masts, and it's something younger sailors are already familiar with.<p><i>Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives</i><p>When the US Navy commissions a submarine Secretary of the Navy …

Military

Hypersonic weapons can make virtually all missile defenses useless — and destabilize the world order

The Cold War gave the world intercontinental ballistic missiles (ICBMs) that could carry nuclear weapons, and cruise missiles that could be launched from ships and aircraft.<p>Now, like a lot of Cold War era military equipment, these weapons are getting a 21st century tune up. But it is not the …

Military

The top ten mistakes that make life easy for cyber-criminals

Russian hackers have managed to get into the German government's computers. We don't know exactly how they did it. But we do know which common …

Can iPhones Get Viruses? How to Detect & Remove Malware & Viruses from Your iPhone

Can iPhones get viruses? It's easy to revel in false security and believe our iPhones can't be infected by viruses; after all, the Apple ecosystem has a great track record for safety and defense against electronic invasion of all kinds. No system is completely invulnerable, however, so it's …

App Store

New ransomware headache as crooks dump bitcoin for rival cryptocurrencies

The switch to new digital currencies will make life more difficult, according to one police chief.<p>While bitcoin was the preferred way of paying to …

Cryptocurrency
Social Media

2017’s Top hacks and data breaches

By Waqas2017 is over, but memories of some of the biggestThis is a post from HackRead.com Read the original post: 2017’s Top hacks and data breaches

Hackers can figure out your phone's PIN code using just its sensor data

Researchers said their method worked 99.5% of the time and could be used to guess all 10,000 possible combinations of 4-digit PINs.<p>Security …

Six Cyber Threats to Really Worry About in 2018 - MIT Technology Review

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats …

Cybersecurity

5 Tips for Avoiding Android Malware

The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal …

Apps
Cybersecurity

Hackers Have Already Started to Weaponize Artificial Intelligence

Last year, two data scientists from security firm ZeroFOX conducted an experiment to see who was better at getting Twitter users to click on …

Artificial Intelligence

465k patients told to visit doctor to patch critical pacemaker vulnerability | Ars Technica

A year after calling advisory “false and misleading,” maker warns patients to patch.<p>Talk about painful software updates. An estimated 465,000 people …

Cybersecurity
Big Data
Identity Theft

Crash Override Malware Can Automate Mass Power Outages

Some cyberattacks take a device offline, some take companies offline, and some take entire power grids down. Now, the potential for the latter …

Cybersecurity

5 free VPNs to maintain your privacy online

Whether it’s the prying eyes of a repressive regime, a data-hungry internet service provider (ISP), or a malicious actor listening on the public …

Information Systems

Misuse of DocuSign Email Addresses Leads to Phishing Campaign

DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an unknown party on …

Personal Information
WannaCry