|
|
|
|
Think about a fake blood or spit sample with malware tho. They've been encoding massive amounts of data into DNA for awhile but if it translates over to anything more used than DNA it could be a huge issue for any court or hospital. Crazy shit tho. So specific but just think about 20 years from now it could be a real attack vector |
|
|
|
|
cauz |
Aug. 10, 2017, 11:19 p.m. |
|
|
|
Jason Isaacs |
I imagine like most of us that I'd like obscene amounts of money but the people I met and worked with who have those obscene amounts of money and have obscene amounts of fame have awful lives. Really. I mean hideously compromised lives. |
Jason Isaacs |
I imagine like most of us that I'd like obscene amounts of money but the people I met and worked with who have those obscene amounts of money and have obscene amounts of fame have awful lives. Really. I mean hideously compromised lives. And I can go anywhere. No one knows who I am. |
George S. Patton |
Nobody ever defended anything successfully, there is only attack and attack and attack some more. |
Frank Gaffney |
If the area were on or near the U.S. continental shelf, such data could well provide an enemy with strategically invaluable insights into undersea access routes that could be used to attack some of the millions of Americans who live on or near our coasts. |
Sibel Edmonds |
However, I keep reminding them that this issue is not a new issue that has come out for this election. This issue has been in the courts for two years and two months now. |
Noah Feldman |
We often imagine that the court serves as a sort of neutral umpire controlling the warring political branches. But this is mostly myth. The justices of the Supreme Court are themselves actors in the struggle for power, and when they intervene, they think carefully about how their decisions will affect the court's own legitimacy and authority. |
Floyd Abrams |
CBS exhausted the Texas courts. They went from the trial court to the intermediate court to the highest court. |
Princess Diana |
I want to walk into a room, be it a hospital for the dying or a hospital for the sick children, and feel that I am needed. I want to do, not just to be. |
Shawn Fanning |
I think it's pretty obvious to most people that Napster is not media specific, but I could see a system like Napster evolving into something that allows users to locate and retrieve different types of data other than just MP3s or audio files. |
Larry Elder |
In the last 1,000 years, the Arabs have translated as many books as Spain translates in just one year. |
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
Scientists Create DNA-Based Exploit of a Computer System Archeron an hour ago 18 Archeron writes: It seems that scientists at University of Washington in Seattle have managed to encode malware into genomic data, allowing them to gain full access to a computer being used to analyze the data. While this may be a highly contrived attack scenario, it does ask the question whether we pay sufficient attention to data-driven exploits, especially where the data is instrument-derived. What other systems could be vulnerable to a tampered raw data source? Perhaps audio and RF analysis systems? MIT Technology Review reports: "To carry out the hack, researchers led by Tadayoshi Kohno and Luis Ceze encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain 'fu...
|
|
|
|
Type A Blood Converted To Universal Donor Blood With Help From Bacterial Enzyme
For a transfusion to be successful, the patient and donor blood types must be compatible. Now, researchers analyzing bacteria in the human gut have discovered that microbes there produce two enzymes that can convert the common type A into a more universally accepted type. If the process pans out, blood specialists suggest it could revolutionize blood donation and transfusion. To up the supply of universal blood, scientists have tried transforming the second most common blood, type A, by removing its "A-defining" antigens. But they've met with limited success, as the known enzymes that can strip the red blood cell of the offending sugars aren't efficient enough to do the job economically. ...
|
|
|
|
Cyber attack spreads across 74 countries; some UK hospitals crippled
Cyber attacks that hit 74 countries across Europe and Asia Friday, impacting the public health system in Britain, apparently involved a leaked hacking tool from the National Security Agency.
The attack used ransomware, which is malware that encrypts data and locks a user from their data until they pay a ransom. The tool, which was leaked by a group known as Shadow Brokers, had been stolen from the N.S.A. as part of a wide swath of tools illegally released in 2016. ...
|
|
|
|
More than 30 people have been killed after attackers dressed as doctors stormed the largest military hospital in Kabul, Afghan officials say. Militants armed with guns and grenades gained entry after one detonated explosives at a hospital gate and then opened fire on staff and patients. Commandos who landed on the Sardar Daud hospital roof killed all four attackers after several hours of fighting. The so-called Islamic State (IS) group has claimed the attack. The Taliban has denied any involvement. ...
|
|
|
|
So I scraped 450k amazon product urls, and now i finally finished writing my scraper and finally kicked it off with some fresh proxies. downloading massive amounts of data and images from the big A hole
|
|
|
|
youtube comment about buket tko - "That's what real mobbing is. Getting up everywhere & fucking shit up. Straight not giving a fuck. He don't care if you like his steez or not. Your still gonna be seeing his shit everywhere you go until you respect him. Like Chaka & many other old school writers from LA & NY. Only real graff kings know what I mean. It's all about getting your name known everywhere not about how good you are. Get a coloring book for that shit LMFAOO"
|
|
|
|
always knew this was possibleeee
Data exfiltrators send info over PCs' power supply cables Malware tickles unused cores to put signals in current
f you want your computer to be really secure, disconnect its power cable.
So says Mordechai Guri and his team of side-channel sleuths at the Ben-Gurio...
|
|
|
|
Hundreds of Researchers From Harvard, Yale and Stanford Were Published in Fake Academic Journals
In the so-called "post-truth era," science seems like one of the last bastions of objective knowledge, but what if science itself were to succumb to fake news? From a report: Over the past year, German journalist Svea Eckert and a small team of journalists went undercover to investigate a massive underground network of fake science journals and conferences. In the course of the investigation, which was chronicled in the documentary "Inside the Fake Science Factory," the team analyzed over 175,000 articles published in predatory journals and found hundreds of papers from academics at leading in...
|
|
|
|
Steve Ballmer's New Project: Find Out How the Government Spends Your Money
Former Microsoft CEO Steve Ballmer isn't satisfied with owning the Los Angeles Clippers and teaching at Stanford and USC. On Tuesday, the billionaire announced USAFacts, his new startup that aims to improve political discourse by making government financial data easier to access. A small "army" of economists, professors and other professionals will be looking into and publishing data structured similarly to the 10-K filings companies issue each year -- expenses, revenues and key metrics pulled from dozens of government data sources and compiled into a single massive collection of tables. From a report on The Verge: ...
|
|