Random Post

Monday, August 4, 2014
no image
USB flash drives could be at risk of a pernicious attack on their firmware. Over the past two decades, USB devices, aka "thumb drives," have proliferated all over the world, because USB has proven to be a versatile standard. That versatility, though, also makes USB devices vulnerable to what could be a very nasty firmware attack, noted Karsten Nohl and Jakob Lell of Secure Research Labs. Since different device classes can plug into the same connectors, one type of device can turn into a more capable or malicious type without a user noticing.


9:55 AM

USB flash drives could be at risk of a pernicious attack on their firmware. Over the past two decades, USB devices, aka "thumb drives...

Read more »
no image
There are a lot of things going on at the moment. Israel is tactically defending itself against Hamas -- winning the battles but losing the war, because the Israeli government can't see the big picture. The U.S. is still blaming Snowden for leaks, even though Russia clearly is able to pull damaging information pretty much anytime it wants without Snowden's help -- and this is nothing new. Airlines fly planes over areas where folks are shooting planes down with missiles and then everyone is blamed except the idiots who drew up the flight plans.


6:52 AM

There are a lot of things going on at the moment. Israel is tactically defending itself against Hamas -- winning the battles but losing th...

Read more »
no image
I try hard to ignore the really dumb things people say when they talk out their backsides about tech, and I personally know how hard it is to come up with excellent tech focused opinions -- as opposed to rehashing the day's latest news with an ironic or humorous spin. And here's the "but"... I was absolutely floored by John C. Dvorak's post, "The Apple iTime Is Destined to Fail." I think it's an utter failure of imagination at best, but it also may be a willful rejection of reality in favor of click bait.


12:28 AM

I try hard to ignore the really dumb things people say when they talk out their backsides about tech, and I personally know how hard it is...

Read more »
Friday, August 1, 2014
no image
News that two Carnegie-Mellon CERT researchers have developed an inexpensive way to breach the Tor network has the project, privacy advocates, and probably criminals who use the network equally concerned. The Tor Project posted has advised relays to upgrade to Tor 0.2.r.23e or 0.2.5.6-alpha to close the protocol vulnerability used by the researchers, but It warned that preventing traffic confirmation in general "remains an open research problem." Hidden service operators were advised to consider changing the location of their service.


5:30 PM

News that two Carnegie-Mellon CERT researchers have developed an inexpensive way to breach the Tor network has the project, privacy advoca...

Read more »
no image

12:19 PM

Yesterday Microsoft lost its appeal challenging the legal standing of a U.S. Government warrant to command access to data stored abroad. The...

Read more »
no image
I try hard to ignore the really dumb things people say when they talk out their backsides about tech, and I personally know how hard it is to come up with excellent tech focused opinions -- as opposed to rehashing the day's latest news with an ironic or humorous spin. And here's the "but"... I was absolutely floored by John C. Dvorak's post, "The Apple iTime Is Destined to Fail." I think it's an utter failure of imagination at best, but it also may be a willful rejection of reality in favor of click bait.


7:13 AM

I try hard to ignore the really dumb things people say when they talk out their backsides about tech, and I personally know how hard it is...

Read more »
 
Google Analytics Alternative