SCIENCE AND TECHNOLOGY

New developments in research etc.

Meet the Internet of big, lethal Things. Should you be free to tinker with a combine harvester?

Silicon Valley’s desire to open up the software that controls heavy vehicles has come under criticism from industry experts.

This week the Electronic Frontier Foundation (EFF) renewed its call for the legal protection that manufacturers use to safeguard automotive software to be relaxed.

For three years, farm machinery maker John Deere has found itself in a fight against the EFF, Silicon Valley’s most reliable proxy group, over the right to control its own intellectual property. Auto manufacturers use a variety of legal mechanisms to stop people tinkering with their gear willy nilly, and one of them is copyright.
READ MORE: http://www.theregister.co.uk/2016/12/23/should_you_able_to_tinker_with_a...

Simple Bug allows Hackers to Read all your Private Facebook Messenger Chats

A security researcher has discovered a critical vulnerability in Facebook Messenger that could allow an attacker to read all your private conversation, affecting the privacy of around 1 Billion Messenger users.

Ysrael Gurt, the security researcher at BugSec and Cynet, reported a cross-origin bypass-attack against Facebook Messenger which allows an attacker to access your private messages, photos as well as attachments sent on the Facebook chat.

To exploit this vulnerability, all an attacker need is to trick a victim into visiting a malicious website; that’s all.
READ MORE: http://thehackernews.com/2016/12/hack-facebook-messenger-chats.html?m=1

Our planes are now 'big flying mobile devices' and top hacking targets

A rapid increase in the power and scale of cyberattacks has affected industries worldwide and the aviation sector is no exception.

We've begun to skim the top of what a successful cyberattack against a player in the aviation industry can achieve. In 2015, for example, LOT was forced to cancel 10 flights and delay over a dozen after a successful cyberattack was launched against the Polish airline's ground systems.
READ MORE: http://www.zdnet.com/article/planes-as-big-flying-mobile-devices-are-top...

European Security Agency Comes Out Strongly Against Backdoors In New Encryption Report

The European Union Agency for Network and Information Security (ENISA), whose objective is to improve network and information security in the EU, released a report on its views on encryption. The report argued against backdoors because they could increase harm to regular citizens, lower trust in EU-based services, and disrupt the implementation of the “Digital Single Market” strategy, which aims to streamline business regulations across the EU.
READ MORE: http://www.tomshardware.com/news/enisa-backdoors-encryption-report,33182...

Hacker Group Claims it will be Releasing Huge Trove of Podesta Emails Hacked From Wikileaks

On December 15th at 6:30PM 15,000 John Podesta emails never before released to the public as well as the passwords to two of the Wikileaks Insurance Files will be published at this website http://www.findingassange.com/?i=1

Claims like this get made often and whether or not it eventuates is another thing. Lets keep an eye on it. It could be true.

Many CEOs believe technology will make people 'largely irrelevant'

Although artificial intelligence (AI), robotics and other emerging technologies may reshape the world as we know it, a new global study has revealed that the majority of CEOs now value technology over people when it comes to the future of their businesses.

The study was conducted by the Los Angeles-based management consultant firm Korn Ferry that interviewed 800 business leaders across a variety of multi-million and multi-billion dollar global organizations. The firm says that 44 percent of the CEOs surveyed agreed that robotics, automation and AI would reshape the future of many work places by making people "largely irrelevant".
READ MORE: http://betanews.com/2016/12/03/ceos-think-people-will-be-irrelevant/?utm...

Microsoft Windows Vulnerable to Firefox 0day Exploit Being Used to Attack Tor Users

There's a zero-day exploit in the wild that's being used to execute malicious code on the computers of people using Tor and possibly other users of the Firefox browser, officials of the anonymity service confirmed Tuesday.

Word of the previously unknown Firefox vulnerability first surfaced in this post on the official Tor website. It included several hundred lines of JavaScript and an introduction that warned: "This is an [sic] JavaScript exploit actively used against TorBrowser NOW." Tor cofounder Roger Dingledine quickly confirmed the previously unknown vulnerability and said engineers from Mozilla were in the process of developing a patch.
read more: http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-us...

Madison Square Garden reveals year-long credit, debit card data breach

The Madison Square Garden Company says a year-long data breach compromised credit and debit cards used at concession stands — at several properties it operates. MSG alerted customers to the breach Tuesday, saying the issue has been resolved.

But Knicks and Rangers fans, as well as anyone who took in the Radio City Christmas show last year, may want to check their bank records. Cards used to purchase merchandise and food and beverage items at Madison Square Garden, the Theater at Madison Square Garden, Radio City Music Hall, Beacon Theater and Chicago Theater between Nov. 9, 2015, and Oct. 24, 2016, may have been affected.
READ MORE: http://www.nydailynews.com/new-york/manhattan/madison-square-garden-reve...

Hackers are targeting ATMs and stealing wads of cash

Hackers are targeting ATMs with malicious software that forces the machines to spew out cash, according to a new report from a cybersecurity firm.

Group IB said has it discovered a hacker group called Cobalt that had attacked ATMs in more than a dozen countries in Europe and Asia, including the U.K. and Russia. The “smash and grab” attacks were coordinated from unknown command centers. They don’t require any physical tampering of the ATMs but the hackers do need someone to be present when the attack happens so they can collect the wads of cash from the ATM.
READ MORE: http://www.digitaltrends.com/computing/hackers-atm-attacks/?utm_content=...

Farewell Kiwicon

10 years is a stellar effort. I only made it to the last 2 events. They were major highlights for me in the last 2 years. Your way of doing things was unique and special.

You guys need to take good care of yourselves and stepping back from the hilariously fun madness you created over the last 10 years sounds like a good step.

Thanks for what you did.

Syndicate content