Paolo Amato

363 Added | 4 Magazines | 2 Likes | 3 Following | 1,313 Followers | @jackhill | Keep up with Paolo Amato on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Paolo Amato”

In 1905, someone murdered the founder of Stanford University. They've never been caught.

Someone got away with murder. But who killed Mrs. Stanford — and why?<p>There was a great deal of gossip in San Francisco when Mrs. Jane Stanford suddenly left her Nob Hill mansion for Hawaii on February 15, 1905.<p>Ill health was one theory. Low spirits another. But, most shocking of all, the persistent …

San Francisco

Phone Numbers Are Hackers Favorite Backdoor To Cryptoaccounts

Hackers have discovered that the easiest and most direct way to steal cryptocurrency is to first steal phone numbers.<p>Hijacked phone numbers are used …

Italian cryptocurrency exchange BitGrail loses $170 million

One of the biggest problems with cryptocurrency exchanges is that they're a juicy, enticing target for high-tech criminals. Case in point, Italian exchange BitGrail, which lost $170 million worth of Nano tokens, a little-known digital coin previously called RaiBlocks. BitGrail is the second …

Laser Scans Reveal Maya "Megalopolis" Below Guatemalan Jungle

A vast, interconnected network of ancient cities was home to millions more people than previously thought.<p>Using a revolutionary technology known as LiDAR (short for “Light Detection And Ranging”), scholars digitally removed the tree canopy from aerial images of the now-unpopulated landscape, …

Evidence of advanced Mayan civilization found hidden in Guatemalan jungle

Using LIDAR, a team of researchers in Guatemala has been able to peer underneath the dense jungle to see what the landscape looked like in the time …

Archaeology

X.509 metadata can carry information through the firewall

<b>Video</b> Certificate exchange used as a side-channel before the certs get to workA security researcher, who last year demonstrated that X.509 …

Information Security

Cisco: This VPN bug has a 10 out of 10 severity rating, so patch it now

The researcher who found the flaw will be telling the world how to exploit it this weekend.<p>Cisco has warned customers using its Adaptive Security …

The Tattooist of Auschwitz - and his secret love

<b>For more than 50 years, Lale Sokolov lived with a secret - one born in the horrors of wartime Europe, in a place that witnessed some of the worst of man's inhumanity to man.</b><p>It would not be shared until he was in his 80s, thousands of miles from that place.<p>Lale had been the Tattooist of …

World History

Triple Meltdown: How So Many Researchers Found a 20-Year-Old Chip Flaw At the Same Time

On a cold Sunday early last month in the small Austrian city of Graz, three young researchers sat down in front of the computers in their homes and …

Information Security

Reading privileged memory with a side-channel

Posted by Jann Horn, Project Zero<p>We have discovered that CPU data cache timing can be abused to efficiently leak information out of mis-speculated …

Apple says almost all its devices are affected by the Spectre and Meltdown bugs

A pair of security vulnerabilities affect virtually all Apple products but are not currently affecting users, the company said.<p>Known as “Spectre” and …

Information Security

If you can’t explain something in simple terms, you don’t understand it

In the early 1960s, Richard Feynman gave a series of undergraduate lectures that were collected into a book called the Feynman Lectures on Physics. …

Quantum Mechanics

Edward Snowden's Haven app uses your phone to detect intruders

Forget phone calls — a new app from The Guardian Project, the Freedom of the Press Foundation and Edward Snowden aims to turn Android smartphones into tiny, unobtrusive security systems. Haven, released today in public beta, was designed to use a phone's built-in sensors to track sudden changes in …

Edward Snowden

3D NAND Storage Fuels New Age of Smartphone Apps

3D NAND will do the heavy memory lifting that smartphone users demand, explains the manager for mobile efforts at Western Digital.

Internet of Things

Auschwitz inmate's notes from hell finally revealed

<b>Chilling testimony from an Auschwitz inmate forced to help the Nazi murder squads has finally been deciphered, thanks to painstaking detective work and digital imaging.</b><p>On scraps of notepaper Marcel Nadjari, a Greek Jew, described how thousands of Jews were herded into the gas chambers daily. He saw …

World History

iPhone X Face ID Again Unlocked With Mask, Even With 'Require Attention' Turned On

Since the iPhone X launched earlier this month, people have been attempting to fool Face ID, the new biometric facial recognition feature built into the device as a primary security feature. Face ID has thus far been tricked by twins, children, and even a mask.<p>Vietnamese security company Bkav made …

Major macOS High Sierra Bug Allows Full Admin Access Without Password - How to Fix [Updated]

There appears to be a serious bug in macOS High Sierra that enables the root superuser on a Mac with a blank password and no security check.<p>The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username "root" with no password. This works when attempting to …

In the shadow of Red October

By Steve Rosenberg<br>Moscow correspondent<p>A century ago, the Bolsheviks seized power in Russia and created the world’s first Marxist state.<p>The dramatic events of 1917 still reverberate.<p>But what legacy of the revolution can be seen in four cities in Vladimir Putin's Russia?<p>The portrait with the …

Russia

The US's most secretive intelligence agency was embarrassingly robbed and mocked by hackers

The National Security Agency, the US's largest and most secretive intelligence agency, has been deeply infiltrated by anonymous hackers, as detailed in a New York Times exposé published Sunday.<p>The NSA, which compiles massive troves of data on US citizens and organizes cyberoffensives against the …

Surveillance

Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is

Everyone knows your computer can be hacked, but did you know your monitor might also be used against you? Ang Cui from Red Balloon Security has figured out a way to hack into a popular Dell monitor and manipulate what you see on your screen. Using this type of attack, a user could easily be tricked …

Demonstration

Here’s what you can do to protect yourself from the KRACK WiFi vulnerability

Security researcher Mathy Vanhoef publicly disclosed a serious vulnerability in the WPA2 encryption protocol today. Most devices and routers currently rely on WPA2 to encrypt your WiFi traffic, so chances are you’re affected.<p>But first, let’s clarify what an attacker can and cannot do using the …

Information Security

Serious flaw in WPA2 protocol lets attackers intercept passwords and much more | Ars Technica

KRACK attack is especially bad news for Android and Linux users.<p>Researchers have disclosed a serious weakness in the WPA2 protocol that allows …

Information Security

Wi-Fi security has been breached, say researchers

This is your Wi-Fi on KRACK<p>At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by <i>Ars</i> …

Information Security

What’s Inside Every iPhone, From Retina Displays to Cameras

Apple Inc. has sold more than 1.2 billion iPhones since January 2007, when founder Steve Jobs triumphantly claimed, “Today, Apple is going to …

Mobile Technology

How an inmate hacker hid computers in the ceiling and turned his prison upside down

In the summer of 2015, Stan Transkiy was 16 years into a life sentence, and he had finally found a way to occupy his time. Inside the Marion Correctional Institution, which sits on green farmland off a series of quiet roads in rural Ohio, he had carved out a job running a recycling program, a gig …

Crime

Fake Chrome Web Browser Extension Unwittingly Installed by 37,000 Users

A fraudulent browser extension was downloaded by 37,000 Chrome users after it sneaked past Google's Web Store vetting processes, it emerged on Tuesday.<p>The fake extension was listed on the official Web Store until today and masqueraded as popular legitimate extension AdBlock Plus, which has over 10 …

America's deadliest shooting incidents are getting much more deadly

<i>This article has been updated with new fatality numbers.</i><p>The mass shooting that killed at least 50 people in Las Vegas on Sunday night was the worst in modern American history. Police suspect that Stephen Paddock fired on the crowd at a country-music concert indiscriminately from his hotel room …

Guns

The Untold Story of Kim Jong-nam’s Assassination

Two women had the most audacious task. Killing the brother of the North Korean leader. Right out in the open, using deadly chemical weapons in an international airport. And the craziest thing? They had no idea what they'd gotten into.<p><b>When Kim Jong-nam</b> was a boy, his father, the dictator of North …

North Korea

Spyware Found In Over 500 Android Apps, Together Downloaded More Than 100M Times

Official storefronts that sell apps — Google Play and Apple’s App Store — do their best to make sure everything they’re distributing to you isn’t …

Apps

Hacker breaks into electronic safes without a trace at Defcon- Technology News, Firstpost

A hacker demonstrated techniques to compromise electronic safes with cryptographic locks at the Defcon hacking conference. The demonstration was at …

Information Systems