nementon@hackermail.com

205 Flips | 2 Magazines | 4 Likes | 1 Following | @Nementon | Keep up with nementon@hackermail.com on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “nementon@hackermail.com”

Analyzing a counter intelligence cyber operation: How Macron just changed cyber security forever

Up until today I could only look up to Russia (whether I agree with them or not) for conducting advanced information operations in cyber. Now, I can …

Cybersecurity

Major Intel Security Flaw Is More Serious Than First Thought - ExtremeTech

By on May 8, 2017 at 7:58 am<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>Last week, news broke of a serious …

Information Security

Security Surprises Arising from the Internet of Things (IoT)

My brother can’t function in the morning until he has a cup of coffee. So I use his daily routine as an example.<p>Picture my brother stumbling down to the kitchen one morning only to find his internet-enabled coffee maker won’t work. There’s a message on his iPhone: “We have taken control of your …

Over 36,000 Computers Infected with NSA's DoublePulsar Malware

DOUBLEPULSAR, one of the NSA hacking tools leaked last Friday by the Shadow Brokers, has been used in the wild by ordinary hackers, who infected over …

Cybersecurity

Just a Pair of These $11 Radio Gadgets Can Steal a Car

For years, automakers and hackers have known about a clever attack that spoofs the signal from a wireless car key fob to open a vehicle's doors, and …

New NSA Windows hacking tools leaked by Shadow Brokers 'massive threat' worth $2m

Experts believe that the vast trove of exploits leaked affect nearly all Windows systems.<p>On Friday (14 April), mysterious hacker group Shadow Brokers …

NSA's arsenal of Windows hacking tools has leaked

The NSA used the Windows hacking tools to target several banks.<p>A new trove of alleged surveillance tools and exploits from the National Security …

Malware

Is Blockchain the Future Front Lines of Cyber Security for the IoT Future?

<b>Why do experts believe the IOT needs Blockchain?</b><p>Blockchain is essentially a continuously growing record or ledger of digital events that is shared among many different parties. It can only be updated by a consensus of the majority of the participants in the system and cannot be altered or erased …

Impressions From DEF CON 24: The Machines Are Rising

DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little …

Microsoft Mistakenly Leaks Secure Boot Key

<b>Update</b> Opponents of the government’s constant talk about intentional backdoors and exceptional access finally may have their case study as to why …

Information Security

Des chercheurs ont fait baisser le niveau de paraplégie de plusieurs patients

Des chercheurs ont réussi à faire retrouver certaines sensations et parfois même à effectuer quelques mouvements, à des paraplégiques dont les …

fr-médecine

What is the blockchain, and is it really about to change the world? - ExtremeTech

By on August 3, 2016 at 9:02 am<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>The internet began as a series of …

Blockchain

The Motherboard Guide to Not Getting Hacked (Out of Date)

These are the basic steps you should take to keep yourself, and your data, safe online.<p>Update 11/14/2017: This guide is now out of date. Please see our new, comprehensive guide.<p>The internet can sometimes be a scary place, where hackers steal hundreds of millions of passwords in one swoop, or cause …

Information Systems

Hackers break into Telegram, revealing 15 million users’ phone numbers

(<i>Reuters</i>) — Iranian hackers have compromised more than a dozen accounts on the Telegram instant messaging service and identified the phone numbers of 15 million Iranian users, the largest known breach of the encrypted communications system, cyber researchers told Reuters.<p>The attacks, which took …

Scientists Hacked Yeast to Make THC. Now Comes the Hard Part

We can program yeast to make synthetic weed, but getting high is still a question of scale.<p>German scientists have successfully reengineered yeast to produce THC. Now comes the hard part.<p>Earlier this month, researchers at the Technical University of Dortmund published a paper detailing their …

New York City

20 Best Tips to Stay Anonymous and Protect Your Online Privacy - ExtremeTech

By on March 2, 2018 at 7:12 am<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>Now that so much of normal life …

IBM releases Graph, a service that can outperform SQL databases

IBM today announced the general availability of Graph, a service for the Bluemix cloud offering that the company said helps set up a relatively new, …

Databases

Yahoo fait désormais partie d’Oath

Avant de continuer...<p>Yahoo est maintenant dans la Famille Oath. En raison de la réglementation européenne sur les données, nous (Oath), nos …

Zero-day exploit lets hackers remotely force cars off the road - ExtremeTech

By on July 21, 2015 at 4:48 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>Without needing a physical …

Watch 'Black Angel' short originally shown with 'Empire Strikes Back'

A long time ago, in an era whose fashions seem thankfully very far away, a piece of "Star Wars" history was lost. But finally it's been recovered and sent to the place where all found things eventually go: YouTube.<p>Over 30 years ago, George Lucas commissioned a short film by Roger Christian, who had …

This is the first fully warm-blooded fish

The opah's whole body is five degrees Celsius warmer than the water it's in<p>At first glance, the opah looks like a giant, bloated disc armed with oh-so-puny fins. The two-meter-long creature is fun to look at, and maybe laugh at, but it's got a lot more to share with you than its looks. As it turns …

Burkina Faso : Yacouba Sawadogo, l'homme qui a arrêté le désert

Modeste paysan burkinabè, Yacouba Sawadogo a réussi là où les organisations internationales ont failli : stopper l'avancée du désert dans l'un des …

EVE Online has a god named Bob

How the sci-fi virtual world spawned a strange new religion<p>It started with a joke. Or more accurately, a bizarre jeer.<p>"Early on, [members of the <i>EVE Online</i> corporation Adhocracy] started taunting the lower classes saying Bob is going to smite you if you're not participating in our gameplay style. …

Comic Books

The FREAK HTTPS exploit: Now even easier, affects 2,000 iOS, Android apps - ExtremeTech

By on March 18, 2015 at 4:46 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>A few weeks ago, we covered the …

Cet homme est accusé d'être responsable de la débâcle "Superfish" de Lenovo

Des experts en cybersécurité affirment que l'entreprise Komodia a joué un rôle déterminant dans le scandale du malware préinstallé sur les machines …