No, this isn’t a scene still from the new remake of “*batteries not included.” On Monday London’s “Yo! Sushi” restaurant showcased the “itray,” a flying service device propelled by miniature, remote-controlled helicopter blades.
Archive for the ‘Geek Stuff’ Category
Tags: apple platform, BeagleBoard, gadgets, Hacking, hardware, hardware hacks, man in the middle, technology
You might want to be a little more careful the next time you pick up a cheap knock-off accessory for your device to save a few bucks because new hardware hacks could be the next big thing among cyber criminals.
Researchers say they’ve built a custom iPhone wall charger that can install malware in any iOS device using a custom made malicious chargers called Mactans, which are in turn controlled by a Raspberry-Pi like computer called a BeagleBoard.
Mactans, which is named after the black widow spider’s Latin taxonomy, will be demonstrated by Billy Lau, Yeongjin Jang, and Chengyu Song at the Black Hat 2013 conference in July and they said all users were vulnerable to attacks over the charger.
They add that they can also demonstrate that the malware infection resulting from their malicious charger is persistent and tough to spot. In order for the malicious software to remain installed and unseen, the trio will show how an attacker can hide their software in the same way Apple hides its own built-in applications.
Researchers wanted to show just how easy and cheap it can be to cause a lot of virtual destruction in an innocent package. The security researchers have disclosed the vulnerability to Apple, but presumably Apple hasn’t fixed the hole yet as the researchers are refusing to give out exact details until the conference.
It doesn’t even matter what version of Apple iOS an iPhone or iPad the user is running, the hack doesn’t discriminate again any Apple platform.
Tags: 40Gbps, technology, Wifi
Wireless data transmission has just got faster after a team of German researchers achieved a record 40 Gbps transmission rate. This is the biggest wireless transmission rate ever demonstrated and it matches the data transmission speed for fiber optic.
The project was conducted by a joint team of German scientists from applied physics and technology institutes. The researchers achieved the 40 Gbps wireless data transmission record rate at a frequency of 240 GHz over a one-kilometer distance.
The 240 GHz transceiver chip, measuring only 1.5 x 4 mm.
This speed means that data off a complete DVD can be transmitted in less than a second. For comparison, some of the fastest Wi-Fi connectivity solutions on the market at the moment have a top data transmission speed of 300 Mbps.
The team developed a 240 GHz transmitter and receiver chip that only measures 4×1.5mm and is based on semi-conductor technology which uses high carrier mobility transistors. This technology makes it possible to use frequencies up to 300 GHz with receivers and transmitters that are actually compact and integrated circuits.
German scientists say that in this high frequency range, the atmosphere shows low attenuation and this actually enables directional broadband radio links. This makes the entire wireless data transmission system easier to set up and the signal more resistant to bad weather conditions, they said.
The project may also mark another first in the field of data transmission: having radio links transmit glass fiber data rates. The glass fiber signal would be fed into a radio link without any transcoding and then be transmitted and redirected to glass fiber.
Scientists say the 40Gbps transmission rate may be only the beginning, as higher frequency data rates are likely to be achieved over the following years. In the near future, this radio link system can be used to provide broadband Internet connections to rural areas and other places that are difficult to access by traditional optical fiber networks.
Tags: crime, Hacking, Romania
33-year-old Valentin Boanta who is being detained in a prison from Vaslui, Romania, after he was convicted on charges of bank card fraud in 2009, developed what he calls the SRS (Secure Revolving System) which changes the way ATM machines read bank cards to prevent the operation of skimming devices that criminals hide inside ATMs.
“When I got caught I became happy. This liberation opened the way to working for the good side,” Boanta said.
“Crime was like a drug for me. After I was caught, I was happy I escaped from this adrenaline addiction,” Boanta said. Boanta began working on SRS during his trial. SRS, Boanta says, can be installed into any ATM.
ATM skimmers work by installing a second, concealed card reader over the one that’s built into the ATM. When an unsuspecting bank customer inserts a card into the slot, the card’s magnetic stripe first runs past the read head of the skimmer, allowing it to copy all of the card’s data. The transaction then proceeds as normal and the ATM returns the card to the customer, who is none the wiser.
“I’ve seen many different ATMs, they have ageing designs so they are prone to vulnerability, they are a very weak side of the banking industry,” said Boanta in a workshop. “Every ATM can be penetrated through a skimming crime. My security solution, SRS, makes an ATM unbreachable.”
Romania has a deep well of technical expertise stemming from the time of communist dictator Nicolae Ceausescu, who backed computer research and technical education. Romanian hackers stole about $1 billion from U.S. accounts in 2012, according to the U.S. embassy in Bucharest
Tags: Kali, microsoft windows 2000 service pack, MS08-067, Reverse SSH, service pack 3 windows xp, vulnerability
This video will show you how to create a reverse SSH connection to a server/workstation
This exploit is taking advantage of vulnerability MS08-067 using Metasploit on Kali.
This is a Kali VM attacking a Microsoft 2008 server (this will also work on any machine without the patch)
The moral of this is to update your system
Caintech.co.uk – Here comes Kali
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2
Windows XP Service Pack 3
Windows XP Professional x64 Edition
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista and Windows Vista Service Pack 1
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for x64-based Systems
Windows Server 2008 for Itanium-based Systems
Tags: Bold Predictions, environment, science, Videotex
The report suggests that one-way and two-way home information systems, called teletext and videotex, will penetrate deeply into daily life, with an effect on society as profound as those of the automobile and commercial television earlier in this century.
We don’t call it “videotex,” but this sounds about right. The National Science Foundation report in question also made some surprisingly solid predictions about the Internet’s broader societal and economic impact:
– Individuals may be able to use videotex systems to create their own newspapers, design their own curricula, and compile their own consumer guides.
– Home-based shopping will permit consumers to control manufacturing directly, ordering exactly what they need for “production on demand.”
– There will be a shift away from conventional workplace and school socialization. Friends, peer groups and alliances will be determined electronically, creating classes of people based on interests and skills rather than age and social class.
– The blurring of lines between home and work, the report stated, will raise difficult issues, such as working hours.
Of course, it also made some odd forecasts that are hard to assess now:
– The “extended family” might be recreated if the elderly can support themselves through electronic homework, making them more desirable to have around.
It also made some predictions that haven’t panned out at all. So far, at least, the Internet hasn’t upended the logic of the two-party system — instead, it arguably helped strengthen some major-party candidates and led to interesting power struggles within the parties:
The study also predicted a much greater diversity in the American political power structure. ”Videotex might mean the end of the two-party system, as networks of voters band together to support a variety of slates – maybe hundreds of them,” it said.
Not a bad job by the NSF overall. And those sorts of predictions from the past are always worth keeping in mind when thinking about current discussions about the future of technology.
Case in point: Recently, Northwestern economist Robert Gordon has been arguing that the digital revolution hasn’t been nearly as revolutionary as, say, the advent of electrification or automobiles. That provoked a response from Matt Yglesias, who argued that the Internet has already upended a variety of smaller sectors — like journalism and retail. If digital technology could ever upend health care, education, or housing, that could be truly transformation. We just haven’t seen it yet. (Arguably, digital technologies are already upending the transportation sector and enabling young people to drive less.)
Who’s right? Well, it’s difficult to say. But looking back at those past NSF predictions, it’s worth noting that experts often underestimated the rate of change — the report predicted that just 40 percent of Americans would have access to “two-way videotex service” by 2000 — and also underestimated how resilient existing institutions could be in the face of technological pressures, such as major political parties or work offices.
Further reading: Have we reached the end of economic growth?
Tags: 1st April, april april, April Fools, april fools day, Google Nose, practical jokes, technology
Happy first of April ~ April Fools’ Day is celebrated in many countries on April 1 every year. Sometimes referred to as All Fools’ Day, April 1 is not a national holiday, but is widely recognized and celebrated as a day when people play practical jokes and hoaxes on each other.
While spending my Monday morning investigating the latest news and comical images on Reddit and Google, I came across this ingenious post for Google’s new scentsation in search:
The new scentsation in search
- Coming to your senses: go beyond type, talk, and touch for a new notation of sensation.
- Your internet sommelier: expertly curated Knowledge Panels pair images, descriptions, and aromas.
- Take a whiff: the Google Aromabase – 15M+ scentibytes.
- Don’t ask, don’t smell: For when you’re wary of your query – SafeSearch included.
Have a look at the full page in all it’s glory: Google Nose
Tags: Anonymou, Burma, human-rights, middle-east, Monk Wirathu, Myanmar, myanmar burma, Operation Rohingya, politics, religion, TANGO DOWN
Anonymous have posted the following:
Greetings Citizens of the World.
It is vital the information we are going to share with you is made viral as quickly as possible. The ethnic Rohingya people of Myanmar Burma in Southeast Asia are about to be massacred. Barbarous acts are being carried out by Neo-Nazi racist groups like the Rakhine Nationalities Development Party, Arakan Liberation Army, NaSaKa border police and 969 monks led by Monk Wirathu, the self proclaimed Bin Laden of Buddhism. The Government of Myanmar is orchestrating these crimes.
The persecution of the Rohingya people is severe. The Burmese junta considers them to be sub-human and denies them almost all basic human rights. They are subject to torture, gang rape, starvation, slave labor, and forced to reside in the most dire camps in the world – some call these refugee camps but they are actually concentration camps. Over the past few months, thousands of Rohingya have been encouraged onto boats and sent out to sea with not enough food or fuel, and left there to die. Many boats were attacked and sunk, with women and children on board.
Already the violence in Burma has spread beyond the Rohingya to include all Muslims, with ‘warm ups’ to the anticipated massacre taking place against Burmese Muslims in Meiktila, Naypyidaw and Yangon. Dead and burning bodies, including children, are now lying in the streets.
While the United States claims to defend human rights, their record clearly reflects a government that will only intercede when their business interests are threatened. While politicians occasionally pay lip service to the horrific conditions in Myanmar no action is ever taken. The only people neglecting the situation in Myanmar worse than the U.S. are the press who consistently ignored these atrocities or reported them as ‘ethnic clashes’. We consider the media to be complicit in concealing them from the rest of the world.
The Rohingya have been told to expect a third massacre starting the last week in March. Rakhine have declared they will leave no Rohingya left on the land, just a few left as exhibits for the museum.
The acts of genocide being committed against the Rohingya people must no longer be ignored. We call on the Anonymous collective to stand with those for whom no one else will stand. We call on Anonymous and all supporters of human rights to stand against this great injustice, to give the Rohingya a voice, before they are completely eliminated.
Operation Rohingya engaged.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Tyrants of the world, expect us!
To date (24:03:2013 23:00 GMT)
TANGO DOWN: List of websites taken offline:
For the latest details and the operation Visit: leaksource.wordpress.com
Tags: Backtrack, Kali, linux, penetration testing, security community, software
The official update from BackTrack Central:
Seven years of developing BackTrack Linux has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We’ve taken all of this knowledge and experience and implemented it in our “next generation” penetration testing distribution.
After a year of silent development, we are incredibly proud to announce the release and public availability of “Kali Linux“, the most advanced, robust, and stable penetration testing distribution to date.
Kali is a more mature, secure, and enterprise-ready version of BackTrack Linux. Trying to list all the new features and possibilities that are now available in Kali would be an impossible task on this single page. We therefore invite you to visit our new Kali Linux Website and Kali Linux Documentation site to experience the goodness of Kali for yourself.
We are extremely excited about the future of the distribution and we can’t wait to see what the BackTrack community will do with Kali. Sign up in the new Kali Forums and join us in IRC in #kali-linux on irc.freenode.net and help us usher in this new era.