Its always been too easy for android to get exploited

Open Source Surveillance
>Gather Real-Time Intelligence from Social Media, Cameras, Internet of Things, Industrial Control System devices. In addition search Wifi or Bluetooth networks and look for planes, cruises and city traffic

Looks like he actually caught himself..

Quantum computers may finally have their first real practical use
>Methods to generate the random numbers we need for secure communications are all flawed in some way, but quantum computers that exist today could produce random numbers that can't be faked

Well, that is interesting turn of events ;)

Well, I mean... on the silver plate

>TruthFinder and Instant Checkmate are subscription-based services allowing customers to perform background checks on other people. When conducting background checks, the sites will use publicly scraped data, federal, state, and court records, criminal records, social media, and other sources.

AIs as Computer Hackers - Schneier on Security
>In 2016, DARPA ran a similarly styled event for artificial intelligence (AI). One hundred teams entered their systems into the Cyber Grand Challenge. After completing qualifying rounds, seven finalists competed at the DEFCON hacker convention in Las Vegas. The competition occurred in a specially designed test environment filled with custom software that had never been analyzed or tested. The AIs were given 10 hours to find vulnerabilities to exploit against the other AIs in the competition and to patch themselves against exploitation. A system called Mayhem, created by a team of Carnegie-Mellon computer security researchers, won. The researchers have since commercialized the technology, which is now busily defending networks for customers like the U.S. Department of Defense. >There was a traditional human–team capture-the-flag event at DEFCON that same year. Mayhem was invited to participate. It came in last overall, but it didn’t come in last in every category all of the time.

>Tracked as CVE-2023-22501, the vulnerability has a critical severity score of 9.4, as calculated by Atlassian. It could be used to target bot accounts in particular, due to their frequent interactions with other users and their increased likelihood to be included in Jira issues or requests or receiving emails with a "View Request" link - either condition being necessary for acquiring signup tokens.

All this data somewhere in the wrong hands (I mean - ODIN intelligence) "lost"

Check your 2FA implementations

For Sale on eBay: A Military Database of Fingerprints and Iris Scans
>“It was disturbing that they didn’t even try to protect the data,” Mr. Marx said, referring to the U.S. military. “They didn’t care about the risk, or they ignored the risk.”

10 out of 10. Christmas is coming early this year.

IMHO this will be more and more frequent in the future.

“Successful exploitation of the three vulnerabilities lets any unprivileged user gain root privileges on the vulnerable device. Qualys security researchers have verified the vulnerability, developed an exploit and obtained full root privileges on default installations of Ubuntu.”

    Create a post


    • 0 users online
    • 1 user / day
    • 2 users / week
    • 3 users / month
    • 9 users / 6 months
    • 20 subscribers
    • 88 Posts
    • Modlog