Quantcast
Channel: tr0n.net
Browsing latest articles
Browse All 41 View Live

Image may be NSFW.
Clik here to view.

Zstd And Its Bindings

Zstandard also called Zstd is a real-time compression algorithm, providing high compression ratios developed by Yann Collet. Zstd’s reference language is C but there are a lot of other bindings: Java...

View Article



Image may be NSFW.
Clik here to view.

Moral Machine Or What Should AI Do?

What life should be saved and whom can you forgot? Who plays the game of MIT researchers not only learns about the abysses of morality, but also about the problems of the AI cars of tomorrow. Find out...

View Article

Image may be NSFW.
Clik here to view.

High-tech Card To Prevent Fraud

Société Générale and Groupe BPCE preparing to roll out a new credit card where the CVV code changes every hour. Motion Code – Oberthur Technologies Financial scams soar to an all-time high Moni gives...

View Article

Image may be NSFW.
Clik here to view.

PoisonTap

Samy Kamkar released an amazing new tool suite for Raspberry Pi Zero which can siphons cookies, exposes the internal router and installs a persitend web-based backdoor on your locked computers. Project...

View Article

Image may be NSFW.
Clik here to view.

MS SMB Tree Connect Response 0-day vulnerability

Microsoft Windows contains a memory corruption bug in the handling of SMB traffic. In particular, Windows fails to properly handle a specially-crafted server response that contains too many bytes...

View Article


Image may be NSFW.
Clik here to view.

Broken SHA-1 In Practice

The hash function SHA-1 is finally broken. In a joint research project, Google and a team from the CWI Institute in Amsterdam created two different PDF files with the same SHA-1 hash. The fact that...

View Article

Image may be NSFW.
Clik here to view.

Outdated JavaScript Libraries on the Web

Scientists from the Northeastern University in Boston get the most popular out of 100,000 JavaScript libraries, according to their view, and tested on 133,000 websites in which versions the libraries...

View Article

Image may be NSFW.
Clik here to view.

Android Devices Coming With Preinstalled Malware

Researchers from Check Point Mobile Researcher Team detected several infections in 36 Android devices from different manufacturer. Security breaches in Andorid devices are noting new today but the...

View Article


Image may be NSFW.
Clik here to view.

Cameras can Steal Data from Computer Hard Drive LED Lights

In this new paper title „LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED“ researchers at Ben-Gurion University Cyber Security Research Center present a...

View Article


Image may be NSFW.
Clik here to view.

Exfiltrating Data from Air-Gapped Computers through Power Lines

Researchers from Cyber-Security Research Center at Ben-Gurion University have created bridgeware that can stealthily exfiltrate data from air-gapped computers using power lines. In their POC, a...

View Article
Browsing latest articles
Browse All 41 View Live




Latest Images