Zstd And Its Bindings
Zstandard also called Zstd is a real-time compression algorithm, providing high compression ratios developed by Yann Collet. Zstd’s reference language is C but there are a lot of other bindings: Java...
View ArticleMoral Machine Or What Should AI Do?
What life should be saved and whom can you forgot? Who plays the game of MIT researchers not only learns about the abysses of morality, but also about the problems of the AI cars of tomorrow. Find out...
View ArticleHigh-tech Card To Prevent Fraud
Société Générale and Groupe BPCE preparing to roll out a new credit card where the CVV code changes every hour. Motion Code – Oberthur Technologies Financial scams soar to an all-time high Moni gives...
View ArticlePoisonTap
Samy Kamkar released an amazing new tool suite for Raspberry Pi Zero which can siphons cookies, exposes the internal router and installs a persitend web-based backdoor on your locked computers. Project...
View ArticleMS SMB Tree Connect Response 0-day vulnerability
Microsoft Windows contains a memory corruption bug in the handling of SMB traffic. In particular, Windows fails to properly handle a specially-crafted server response that contains too many bytes...
View ArticleBroken SHA-1 In Practice
The hash function SHA-1 is finally broken. In a joint research project, Google and a team from the CWI Institute in Amsterdam created two different PDF files with the same SHA-1 hash. The fact that...
View ArticleOutdated JavaScript Libraries on the Web
Scientists from the Northeastern University in Boston get the most popular out of 100,000 JavaScript libraries, according to their view, and tested on 133,000 websites in which versions the libraries...
View ArticleAndroid Devices Coming With Preinstalled Malware
Researchers from Check Point Mobile Researcher Team detected several infections in 36 Android devices from different manufacturer. Security breaches in Andorid devices are noting new today but the...
View ArticleCameras can Steal Data from Computer Hard Drive LED Lights
In this new paper title „LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED“ researchers at Ben-Gurion University Cyber Security Research Center present a...
View ArticleExfiltrating Data from Air-Gapped Computers through Power Lines
Researchers from Cyber-Security Research Center at Ben-Gurion University have created bridgeware that can stealthily exfiltrate data from air-gapped computers using power lines. In their POC, a...
View Article
More Pages to Explore .....