PUBLIC RELEASE: 10-MAY-2018 FontCode embeds hidden information in ordinary text by imperceptibly changing the shapes of fonts in text. Method could prevent document tampering, protect copyrights, and embed QR codes and other metadata without altering the look or layout of… Read More ›
Cyber Security
Bitcoin wallet devices vulnerable to security hacks, study shows
Public Release: 23-Jan-2018 University of Edinburgh Devices used to manage accounts on the innovative payment system Bitcoin could be improved to provide better protection against hackers, research suggests. Computer scientists have identified security weak spots in gadgets that manage personal… Read More ›
Developing a secure, un-hackable net
Public Release: 11-Jan-2018 University College London A method of securely communicating between multiple quantum devices has been developed by a UCL-led team of scientists, bringing forward the reality of a large-scale, un- hackable quantum network. To date, communicating via… Read More ›
NTU study finds that hackers could guess your phone PIN using its sensor data
Public Release: 26-Dec-2017 Nanyang Technological University Singapore, 26 Dec 2017 NTU study finds that hackers could guess your phone PIN using its sensor data Data from the physical sensors in a smart phone could be used by hackers to… Read More ›
Researchers found a security flaw that had 10 million banking app users at risk
Public Release: 6-Dec-2017 University of Birmingham Researchers from the University of Birmingham have developed a tool to perform semi-automated security testing of mobile phone apps. After running the tool on a sample of 400 security critical apps, they… Read More ›
For $1,000, anyone can purchase online ads to track your location and app use
Public Release: 18-Oct-2017 University of Washington Caption This map represents an individual’s morning commute. Red dots reflect the places where the UW computer security researchers were able to track that person’s movements by serving location-based ads: at home (real… Read More ›
Empowering robots for ethical behavior
Public Release: 18-Jul-2017 Researchers have developed a concept called Empowerment to help robots and humans to work and live side-by-side safely and effectively Frontiers Scientists at the University of Hertfordshire in the UK have developed a concept called Empowerment… Read More ›
Shh! Proven security for your secrets
Public Release: 14-Jul-2017 Kyoto University demonstrates the strength of its new cipher Kyoto University IMAGE: Kyoto University demonstrates the security of a cipher based on chaos theory. Credit: Kyoto Univeristy / Eiri Ono Kyoto, Japan — How do… Read More ›
Under cyber attack: UH researchers look at how to catch a ‘phisher’
Public Release: 16-May-2017 UH study aims to help organizations improve email filters University of Houston As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts… Read More ›
Hospitals must be prepared for ransomware attacks (Printed just prior to the attacks)
Public Release: 10-May-2017 BMJ Hospitals need to be prepared for ransomware attacks, warns a doctor in The BMJ today. Dr Krishna Chinthapalli, a neurology registrar at the National Hospital for Neurology and Neurosurgery in London, describes how a virus… Read More ›
FBI has ‘been advising Hollywood studios to just pay hackers’ ransoms’
At least a half-dozen extortion attempts have been made against Hollywood firms in the past six months The FBI’s office in LA has become so overwhelmed with cases that they can’t properly investigate them all Industry sources told the… Read More ›
Mysterious Group Hacks The NSA – Equation Group / SHADOW BROKERS – Requested repost from AUG 2016
Tuesday, 16 August 2016 The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the… Read More ›
Cameron aide gave ‘top secret’ advice to Macron
Sam Coates, Deputy Political Editor May 10 2017, 12:01am, The Times One of David Cameron’s top aides gave secret advice to the campaign for the French president-elect Emmanuel Macron, leaked emails have revealed. Ameet Gill, the former director of… Read More ›
Please go to #MacronLeaks for current details. Torrent File link to Macron Emails in this post, or go to 4CHAN or Wikileaks – github
https://twitter.com/hashtag/macronleaks?f=tweets&vertical=default&src=hash https://archive.is/Sumq4 Torrent Files: http://archive.is/macronleaks.github.io Raw data portal to: http://archive.4plebs.org/pol/thread/124234624/#124234624
French Government Shuts Down 4Chan links of Macron Illegal Agitation at Le Pen rallies, Tax Evasion #MacronLeaks
This is bad. Really bad for Presidential candidate Emmanuel Macron. Stealing, cheating and inciting to violence against Le Pen. French government just shut down 4chan links with spreadsheet of Macron offshore banking details,and emails concerning illegal agitation at Le Pen… Read More ›
Are Emmanuel Macron’s Tax Evasion Documents Real? MAY 4, 2017 by GOTNEWS
Jessica Gomez is the pseudonym of this GotNews guest contributor. I am an auditor with over 2 decades of experience in one of the Big Three accounting firms. I have extensive experience examining large corporations that have subsidiaries around the… Read More ›
Hackers can crack your cell phone PIN# 100% of the time in 5 attempts or less
Public Release: 10-Apr-2017 Are your sensors spying on you? How criminals can steal your PIN by tracking the motion of your phone Newcastle University Hackers are able to decipher PINs and passwords just from the way we tilt our phone… Read More ›
Upgrading humans into GODS will be the next ‘billion dollar industry’ expert claims
Expert said today’s humans will become obsolete within the next 60 years Humans will transform themselves into ‘gods’ with technology upgrades But because the technology will be expensive, not everyone will be able to do so Will cause a… Read More ›
Desktop scanners can be hijacked to perpetrate cyberattacks
Public Release: 28-Mar-2017 American Associates, Ben-Gurion University of the Negev BEER-SHEVA, Israel…March 28, 2017 – A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers… Read More ›
Dark Matter; Your phone has been permanently bugged, even if factory reset-Wikileaks
Dark Matter 23 March, 2017 Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by… Read More ›
Wi-fi on rays of light: 100 times faster, and never overloaded
Public Release: 17-Mar-2017 Eindhoven University of Technology gets a speed of 42.8 Gbit/s with a ray of light in an optical wireless network Eindhoven University of Technology Slow wi-fi is a source of irritation that nearly everyone experiences. Wireless… Read More ›
Researchers show how to hack a smartphone using sound waves
Thursday, 16 March 2017 A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the broader risks that come with technology’s embedding… Read More ›
RAND study examines 200 real-world ‘zero-day’ software vulnerabilities
Public Release: 9-Mar-2017 RAND Corporation Zero-day software vulnerabilities – security holes that developers haven’t fixed or aren’t aware of – can lurk undetected for years, leaving software users particularly susceptible to hackers. A new study from the RAND… Read More ›
The Darknet protects itself by being more robust against attacks
Public Release: 6-Mar-2017 This hidden network is used for sensitive and often illegal purposes such as drug trafficking or exchanging child pornography and can counter large attacks on its own by spontaneously adding more network capacity Universitat Rovira i… Read More ›
VAULT 7 “YEAR ZERO” CIA HACK Wikileaks – Press Release
Editors Note (Ralph Turchiano): Unfortunately at this time it appears that the CIA may have been majorly compromised Press Release Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency…. Read More ›
ObamaGate: List of Politicians and Journalists Obama Spied on, WikiLeaks 06 March 2017
Monday, 06 March 2017 It is not unfounded that former President Obama would wire tap President Trump during the election process. This is because he has done this before, many, many times. Here is a list of individuals who… Read More ›
Cameras can steal data from computer hard drive LED lights — Ben-Gurion U. study
Public Release: 22-Feb-2017 American Associates, Ben-Gurion University of the Negev BEER-SHEVA, Israel…Feb. 22, 2017 – Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have demonstrated that data can be stolen from an isolated… Read More ›
DeepMind’s AI can learn to act aggressively | WIRED UK
By MATT BURGESS Thursday 9 February 2017 Artificial intelligence changes the way it behaves based on the environment it is in, much like humans do, according to the latest research from DeepMind . Computer scientists from the Google-owned firm have… Read More ›
Stanford research shows that anyone can become an Internet troll
Public Release: 7-Feb-2017 Stanford University Internet trolls, by definition, are disruptive, combative and often unpleasant with their offensive or provocative online posts designed to disturb and upset. The common assumption is that people who troll are different from… Read More ›
Your Android device’s Pattern Lock can be cracked within 5 attempts
Public Release: 23-Jan-2017 The popular Pattern Lock system used to secure millions of Android phones can be cracked within just 5 attempts — and more complicated patterns are the easiest to crack, security experts reveal Lancaster University Caption… Read More ›
Your ‘anonmyized’ web browsing history may not be anonymous
Public Release: 19-Jan-2017 Princeton University, Engineering School IMAGE: Arvind Narayanan, assistant professor of computer science, Princeton University. Credit: Frank Wojciechowski Raising further questions about privacy on the internet, researchers from Princeton and Stanford universities have released a study… Read More ›
Heartbeat could be used as password to access electronic health records
Public Release: 18-Jan-2017 Researchers use heart’s electrical pattern as encryption key for electronic records Binghamton University IMAGE: Zhanpeng Jin is an assistant professor in the Department of Electrical and Computer Engineering at the Thomas J. Watson School of… Read More ›
Baby robots help humans understand infant development
Public Release: 5-Dec-2016 Wiley Caption To understand the world, human beings fabricate and experiment. To understand ourselves and how we come to be the way we are, researchers are currently building baby robots with mechanisms that model aspects… Read More ›
How it takes just 6 seconds to hack a credit card
Public Release: 1-Dec-2016 Newcastle University New research reveals the ease with which criminals can hack an account without ANY of the card details Dubbed the Distributed Guessing Attack, the team from Newcastle University, UK, say it can take just… Read More ›
Google says its artificial intelligence has taught itself to ‘translate between languages that it doesn’t even know’ | Daily Mail Online
‘Zero-shot translation’ can translate between languages it doesn’t know Deep-learning researchers developed Google Neural Machine Translation GNMT developed algorithm that ‘self-teaches’ it to translate languages By ARIEL ZILBER FOR DAILYMAIL.COM PUBLISHED: 10:58 EST, 27 November 2016 | UPDATED: 14:11 EST,… Read More ›
How to protect your laptop — even when it’s asleep
Public Release: 23-Nov-2016 Concordia researchers design a new solution for safer computing Concordia University Montreal, November 23, 2016 — In the age of WikiLeaks, Russian hacks and increased government surveillance, many computer users are feeling increasingly worried about… Read More ›
Malware that turns PCs into eavesdropping devices, even without a microphone
Public Release: 22-Nov-2016 Malware that turns PCs into eavesdropping devices demonstrated by Ben-Gurion U. American Associates, Ben-Gurion University of the Negev BEER-SHEVA, Israel, Nov. 22, 2016 – Researchers at Ben-Gurion University of the Negev (BGU) have demonstrated malware that can… Read More ›
Adult Friend Finder Website Hacked: How To Search The Leaked Database Of Emails And Usernames For The Adult Dating Site
Adult Friend Finder has been hit with a data breach 10 times larger than last year’s Ashley Madison attack, and anyone worried that their information may be out will be able to search the adult website’s hacked database. The website,… Read More ›
Major breakthrough in Cyborg Technology
Public Release: 15-Nov-2016 Researchers create living bio-hybrid system Interdisciplinary approach makes linking biological materials and electronic devices possible American Institute of Physics These are immunofluorescence analysis of SH-SY5Y cells treated for 5 days with 10uM Retinoic Acid and 50ng/ml… Read More ›
The State Department in 2015 was helping Hillary Clinton with her emails – WikiLeaks
New emails suggest coordination between State Department and Clinton camp WikiLeaks has published a new cache of emails from Clinton staffer John Podesta. The latest trove appears to show the State Department telling Clinton about the report that broke the… Read More ›
Researchers find weakness in common computer chip – weak point in address space layout randomization (ASLR)
Public Release: 25-Oct-2016 Team shows weak point could allow computer hackers complete control Binghamton University BINGHAMTON, NY – Researchers from Binghamton University–State University of New York and the University of California, Riverside have found a weakness in the Haswell… Read More ›
The E-Mail that Compromised President Obama as well as others
I am only linking to Wikileaks https://wikileaks.org/sony/emails/emailid/73877 there you will find bobama@ameritech.net from an e-mail blast by the sender laura@wassermans.com. Ironically these e-mails were compromised through the Sony Hack. Even though the Presidents E-mail was considered Hacked in 2008,… Read More ›
Robot journalists to start writing news and sports stories for Britain and Ireland’s national news agency – Mirror Online
Non-human hacks will be rolled out to cover sports, football and elections at the Press Association Robot journalists are set to start working at Britain and Ireland’s national news agency. The cybernetic scribes will be “more accurate” than flesh and… Read More ›
If you post this cat photo on Facebook, your account may get deleted
Actual Photo Below Tanveer Mann for Metro.co.uk Monday 3 Oct 2016 12:36 pm If you share this cat photo, your Facebook account could be shut disabled. Google cats and you’ll be in feline heaven. Small, large, furry, innocent, they’re… Read More ›
Clinton Leaked Fundraiser Remarks – Washington Free Beacon
“Will you cancel this program if President Obama doesn’t in the next 11 months and lead the world in a ban on this particularly destabilizing, dangerous type of nuclear weapon?” Weber asked at around 39:00 in the recording. Clinton said… Read More ›
ICANN will soon have the power to shut down ‘.gov,’ preventing public access to state websites."
Four States Sue USA to Try to Stop Transfer of Internet Manager By CAMERON LANGFORD GALVESTON (CN) – With the U.S. government set to cede control at midnight Friday over the nonprofit that manages the internet, Texas and… Read More ›
Russian Robot Arrested during Rally, tried to Escape Twice from Manufacturer
Tuesday, 27 September 2016 A robot has been arrested while taking part in a political rally in Russia, after police intervened to prevent it from interacting with the public. According to reports, the activist robot – called Promobot, and… Read More ›
Are we making AIs racist and sexist? Researchers warn machines are learning to have human biases | Daily Mail Online
When large data sets include social bias, machines learn that too, explains James Zou, Assistant Professor for Biomedical Data Science at Stanford University. AI systems take as input large amounts of raw data and extract patterns When these large… Read More ›
President Obama caught Directly Lying in regard to Hillary E-Mail Server ?
‘How is this not classified?’ Obama used a code name to talk with Hillary on her personal email, as new FBI records reveal that even her top aide Huma was shocked by unsecure messages Huma Abedin told FBI the White… Read More ›
Hillary Clinton’s computer server has been targeted by hackers in Russia and China at least four times, claims report
Hillary Clinton was the target of three hacking attacks from China in 2014 and one from Russia in 2013 The attacks happened while she was still secretary of state and afterward Feds have said Clinton’s people were ‘careless… Read More ›