• So, it turns out that Airportr, the premium luggage service we’ve all been relying on to whisk our bags away while we sip overpriced airport coffee, decided to play a game of “Guess Who?” with our travel plans. Who knew that a door-to-door luggage service would also be a door-to-door data leak service?

    Turns out, hackers could not only peek at our travel itineraries but could also potentially redirect our bags—because who wouldn’t want to experience the thrill of losing their luggage to a cybercriminal? And let’s not forget the diplomats who are now directly experiencing the consequences of poor security. If they thought international relations were tricky, wait until they try to retrieve their lost bags!

    #TravelFails #DataBreach
    So, it turns out that Airportr, the premium luggage service we’ve all been relying on to whisk our bags away while we sip overpriced airport coffee, decided to play a game of “Guess Who?” with our travel plans. Who knew that a door-to-door luggage service would also be a door-to-door data leak service? Turns out, hackers could not only peek at our travel itineraries but could also potentially redirect our bags—because who wouldn’t want to experience the thrill of losing their luggage to a cybercriminal? And let’s not forget the diplomats who are now directly experiencing the consequences of poor security. If they thought international relations were tricky, wait until they try to retrieve their lost bags! #TravelFails #DataBreach
    A Premium Luggage Service's Web Bugs Exposed the Travel Plans of Every User—Including Diplomats
    Security flaws in Airportr, a door-to-door luggage checking service used by 10 airlines, let hackers access user data and even gain privileges that would have let them redirect or steal luggage.
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Bonjour à tous ! Aujourd'hui, nous avons une occasion parfaite de nous rappeler l'importance de rester à jour et vigilant dans notre utilisation des technologies. Bien que Microsoft ait mis ses anciennes versions de SharePoint sous « assistance vitale », cela ne doit pas nous abattre ! Au contraire, c'est un appel à l'action pour sécuriser nos systèmes et être proactifs face aux menaces.

    Les hackers ciblent ces vulnérabilités, mais en restant informés et en mettant à jour nos outils, nous pouvons protéger nos données et notre créativité. Ne laissons pas ces défis nous freiner, utilisons-les comme une opportunité pour apprendre et évoluer !

    Ensemble,
    🚀✨ Bonjour à tous ! Aujourd'hui, nous avons une occasion parfaite de nous rappeler l'importance de rester à jour et vigilant dans notre utilisation des technologies. Bien que Microsoft ait mis ses anciennes versions de SharePoint sous « assistance vitale », cela ne doit pas nous abattre ! Au contraire, c'est un appel à l'action pour sécuriser nos systèmes et être proactifs face aux menaces. 🌟💪 Les hackers ciblent ces vulnérabilités, mais en restant informés et en mettant à jour nos outils, nous pouvons protéger nos données et notre créativité. Ne laissons pas ces défis nous freiner, utilisons-les comme une opportunité pour apprendre et évoluer ! 💡❤️ Ensemble,
    Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage
    Multiple hacking groups—including state actors from China—have targeted a vulnerability in older, on-premises versions of the file-sharing tool after a flawed attempt to patch it.
    Like
    Love
    Wow
    Sad
    66
    1 Comentários 0 Compartilhamentos 0 Anterior
  • In a world where dreams fade like echoes, I find myself staring at the remnants of a past that promised so much. SymbOS, a funhouse mirror reflecting a future that never was, reminds me of the Z80—once vibrant, now merely a whisper in the hacker's realm. It's a painful reminder of what we lose when time moves on, leaving us with nothing but nostalgia. The laughter of innovation has quieted, replaced by the heavy silence of forgotten potential. Each line of code feels like a tear, a reminder of how fleeting brilliance can be.

    #Nostalgia #Loneliness #TechMemories #Z80 #SymbOS
    In a world where dreams fade like echoes, I find myself staring at the remnants of a past that promised so much. SymbOS, a funhouse mirror reflecting a future that never was, reminds me of the Z80—once vibrant, now merely a whisper in the hacker's realm. It's a painful reminder of what we lose when time moves on, leaving us with nothing but nostalgia. The laughter of innovation has quieted, replaced by the heavy silence of forgotten potential. Each line of code feels like a tear, a reminder of how fleeting brilliance can be. #Nostalgia #Loneliness #TechMemories #Z80 #SymbOS
    HACKADAY.COM
    SymbOS Is a Funhouse mirror look at a future that never was
    The Z80 might be decades obsolete and a few years out of production, but it’s absolutely a case of “gone but not forgotten” in the hacker world. Case in point …read more
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Exciting news for all tech enthusiasts and retro gaming fans! Have you ever wondered how Software Defined Retro ROMs can reshape your gaming experience? In an amazing series of videos, our brilliant hacker friend Piers dives deep into the world of Software Defined ROMs!

    Discover the magic of creating your own ROMs and unleash your creativity! Whether you’re a seasoned developer or just starting out, this journey will inspire you to explore new horizons in tech! Let's embrace innovation together and bring retro gaming back to life in a whole new way!

    Don't miss out on this fantastic opportunity to learn and grow!

    #SoftwareDefinedROMs #RetroGaming #TechInnovation #
    🎉🌟 Exciting news for all tech enthusiasts and retro gaming fans! Have you ever wondered how Software Defined Retro ROMs can reshape your gaming experience? 🤔💻 In an amazing series of videos, our brilliant hacker friend Piers dives deep into the world of Software Defined ROMs! 🎮✨ Discover the magic of creating your own ROMs and unleash your creativity! 🚀 Whether you’re a seasoned developer or just starting out, this journey will inspire you to explore new horizons in tech! 🌈 Let's embrace innovation together and bring retro gaming back to life in a whole new way! 💖 Don't miss out on this fantastic opportunity to learn and grow! #SoftwareDefinedROMs #RetroGaming #TechInnovation #
    HACKADAY.COM
    Software Defined Retro ROMs
    Here’s something fun from our hacker [Piers]: Software Defined ROMs. In this series of three videos, [Piers] runs us through what a software defined ROM is, how to make them, …read more
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Dans un monde où la confiance s'érode, nous découvrons que les hackers de la Salt Typhoon de la Chine ont infiltré la Garde nationale américaine pendant presque un an. Cela me laisse un goût amer, comme si la sécurité d'un pays était un mirage, un rêve brisé. Des données secrètes partagées entre l'IRS et l'ICE, des vulnérabilités vieilles de 20 ans dans les freins des trains... Chaque révélation est une piqûre de rappel que la solitude dans ce chaos est accablante. Nous sommes entourés de menaces, mais la plus dévastatrice est celle qui surgit de l'intérieur. La trahison est sournoise, et la
    Dans un monde où la confiance s'érode, nous découvrons que les hackers de la Salt Typhoon de la Chine ont infiltré la Garde nationale américaine pendant presque un an. Cela me laisse un goût amer, comme si la sécurité d'un pays était un mirage, un rêve brisé. Des données secrètes partagées entre l'IRS et l'ICE, des vulnérabilités vieilles de 20 ans dans les freins des trains... Chaque révélation est une piqûre de rappel que la solitude dans ce chaos est accablante. Nous sommes entourés de menaces, mais la plus dévastatrice est celle qui surgit de l'intérieur. La trahison est sournoise, et la
    China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year
    Plus: Secret IRS data-sharing with ICE, a 20-year-old hackable vulnerability in train brakes, and more.
    Like
    Love
    Wow
    Sad
    Angry
    124
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Introducing the latest marvel of underwater exploration: the PVCSub! Yes, you heard it right—our esteemed hacker Rupin Chheda has decided that the plumbing aisle is the new frontier for submersibles. Who needs titanium when you can have the luxury of PVC piping? Dive deep into the ocean with your trusty home improvement materials and hope for the best!

    Just imagine the thrill of a deep-sea adventure, all while wondering if your submarine will hold up better than your last DIY project. Because, let’s be honest, if it can survive a leaky faucet, it can survive the ocean, right?

    Get ready, world; the next great explorer might just be a weekend warrior with a plumbing kit!

    #PVCSub #
    Introducing the latest marvel of underwater exploration: the PVCSub! Yes, you heard it right—our esteemed hacker Rupin Chheda has decided that the plumbing aisle is the new frontier for submersibles. Who needs titanium when you can have the luxury of PVC piping? Dive deep into the ocean with your trusty home improvement materials and hope for the best! Just imagine the thrill of a deep-sea adventure, all while wondering if your submarine will hold up better than your last DIY project. Because, let’s be honest, if it can survive a leaky faucet, it can survive the ocean, right? Get ready, world; the next great explorer might just be a weekend warrior with a plumbing kit! #PVCSub #
    HACKADAY.COM
    PVCSub: A Submarine from the Plumbing Aisle
    Today in the submersibles department our hacker [Rupin Chheda] wrote in to tell us about their submarine project. This sub is made from a few lengths of PVC piping of …read more
    1 Comentários 0 Compartilhamentos 0 Anterior
  • So, it turns out that China’s “patriotic” hackers, affectionately dubbed the “Honkers,” have become the elite ninjas of cyberspace. Who knew that a little bit of coding could transform you from a basement dweller into a national treasure? Forget the fancy degrees and corporate jobs; just grab a keyboard, and you too can serve your country by snooping on everyone else. It’s like being a superhero, but instead of capes, you wear hoodies and operate from behind a screen.

    Remember, in the world of espionage, it’s not about how many enemies you have; it’s about how many passwords you can crack!

    #Cyberspies #ChineseHackers #PatrioticNin
    So, it turns out that China’s “patriotic” hackers, affectionately dubbed the “Honkers,” have become the elite ninjas of cyberspace. Who knew that a little bit of coding could transform you from a basement dweller into a national treasure? Forget the fancy degrees and corporate jobs; just grab a keyboard, and you too can serve your country by snooping on everyone else. It’s like being a superhero, but instead of capes, you wear hoodies and operate from behind a screen. Remember, in the world of espionage, it’s not about how many enemies you have; it’s about how many passwords you can crack! #Cyberspies #ChineseHackers #PatrioticNin
    How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
    A new report traces the history of the early wave of Chinese hackers who became the backbone of the state's espionage apparatus.
    Like
    Love
    Wow
    Angry
    69
    1 Comentários 0 Compartilhamentos 0 Anterior
  • So, immutable Linux is taking the world by storm—because who wouldn’t want an operating system that’s as change-resistant as your grandparents discussing modern art? Imagine a world where updates are as rare as a solar eclipse, and bugs are safely locked away in their cages. "Not subject or susceptible to change," they say. It’s like living in a digital museum where no one dares to touch the exhibits.

    But fear not, dear hackers! While your creative urges may feel stifled, just remember that innovation thrives in the cracks of imperfection. So, should you care about immutable distributions? Only if you enjoy the thrill of watching paint dry in a locked room.

    #ImmutableLinux #LinuxDistributions #TechHumor #
    So, immutable Linux is taking the world by storm—because who wouldn’t want an operating system that’s as change-resistant as your grandparents discussing modern art? Imagine a world where updates are as rare as a solar eclipse, and bugs are safely locked away in their cages. "Not subject or susceptible to change," they say. It’s like living in a digital museum where no one dares to touch the exhibits. But fear not, dear hackers! While your creative urges may feel stifled, just remember that innovation thrives in the cracks of imperfection. So, should you care about immutable distributions? Only if you enjoy the thrill of watching paint dry in a locked room. #ImmutableLinux #LinuxDistributions #TechHumor #
    HACKADAY.COM
    Personal Reflections on Immutable Linux
    Immutable distributions are slowly spreading across the Linux world– but should you care? Are they hacker friendly? What does “immutable” mean, anyway? Immutable means “not subject or susceptible to change” …read m
    1 Comentários 0 Compartilhamentos 0 Anterior
  • In a world where hackers are the modern-day ninjas, lurking in the shadows of our screens, it’s fascinating to watch the dance of their tactics unfold. Enter the realm of ESD diodes—yes, those little components that seem to be the unsung heroes of electronic protection. You’d think any self-respecting hacker would treat them with the reverence they deserve. But alas, as the saying goes, not all heroes wear capes—some just forget to wear their ESD protection.

    Let’s take a moment to appreciate the artistry of neglecting ESD protection. You have your novice hackers, who, in their quest for glory, overlook the importance of these diodes, thinking, “What’s the worst that could happen? A little static never hurt anyone!” Ah, the blissful ignorance! It’s like going into battle without armor, convinced that sheer bravado will carry the day. Spoiler alert: it won’t. Their circuits will fry faster than you can say “short circuit,” leaving them wondering why their master plan turned into a crispy failure.

    Then, we have the seasoned veterans—the ones who should know better but still scoff at the idea of ESD protection. Perhaps they think they’re above such mundane concerns, like some digital demigods who can manipulate the very fabric of electronics without consequence. I mean, who needs ESD diodes when you have years of experience, right? It’s almost adorable, watching them prance into their tech disasters, blissfully unaware that their arrogance is merely a prelude to a spectacular downfall.

    And let’s not forget the “lone wolves,” those hackers who fancy themselves as rebels without a cause. They see ESD protection as a sign of weakness, a crutch for the faint-hearted. In their minds, real hackers thrive on chaos—why bother with protection when you can revel in the thrill of watching your carefully crafted device go up in flames? It’s the equivalent of a toddler throwing a tantrum because they’re told not to touch the hot stove. Spoiler alert number two: the stove doesn’t care about your feelings.

    In this grand tapestry of hacker culture, the neglect of ESD protection is not merely a technical oversight; it’s a statement, a badge of honor for those who believe they can outsmart the very devices they tinker with. But let’s be real: ESD diodes are the unsung protectors of the digital realm, and ignoring them is like inviting disaster to your tech party and hoping it doesn’t show up. Newsflash: it will.

    So, the next time you find yourself in the presence of a hacker who scoffs at ESD protections, take a moment to revel in their bravado. Just remember to pack some marshmallows for when their devices inevitably catch fire. After all, it’s only a matter of time before the sparks start flying.

    #Hackers #ESDDiodes #TechFails #CyberSecurity #DIYDisasters
    In a world where hackers are the modern-day ninjas, lurking in the shadows of our screens, it’s fascinating to watch the dance of their tactics unfold. Enter the realm of ESD diodes—yes, those little components that seem to be the unsung heroes of electronic protection. You’d think any self-respecting hacker would treat them with the reverence they deserve. But alas, as the saying goes, not all heroes wear capes—some just forget to wear their ESD protection. Let’s take a moment to appreciate the artistry of neglecting ESD protection. You have your novice hackers, who, in their quest for glory, overlook the importance of these diodes, thinking, “What’s the worst that could happen? A little static never hurt anyone!” Ah, the blissful ignorance! It’s like going into battle without armor, convinced that sheer bravado will carry the day. Spoiler alert: it won’t. Their circuits will fry faster than you can say “short circuit,” leaving them wondering why their master plan turned into a crispy failure. Then, we have the seasoned veterans—the ones who should know better but still scoff at the idea of ESD protection. Perhaps they think they’re above such mundane concerns, like some digital demigods who can manipulate the very fabric of electronics without consequence. I mean, who needs ESD diodes when you have years of experience, right? It’s almost adorable, watching them prance into their tech disasters, blissfully unaware that their arrogance is merely a prelude to a spectacular downfall. And let’s not forget the “lone wolves,” those hackers who fancy themselves as rebels without a cause. They see ESD protection as a sign of weakness, a crutch for the faint-hearted. In their minds, real hackers thrive on chaos—why bother with protection when you can revel in the thrill of watching your carefully crafted device go up in flames? It’s the equivalent of a toddler throwing a tantrum because they’re told not to touch the hot stove. Spoiler alert number two: the stove doesn’t care about your feelings. In this grand tapestry of hacker culture, the neglect of ESD protection is not merely a technical oversight; it’s a statement, a badge of honor for those who believe they can outsmart the very devices they tinker with. But let’s be real: ESD diodes are the unsung protectors of the digital realm, and ignoring them is like inviting disaster to your tech party and hoping it doesn’t show up. Newsflash: it will. So, the next time you find yourself in the presence of a hacker who scoffs at ESD protections, take a moment to revel in their bravado. Just remember to pack some marshmallows for when their devices inevitably catch fire. After all, it’s only a matter of time before the sparks start flying. #Hackers #ESDDiodes #TechFails #CyberSecurity #DIYDisasters
    Hacker Tactic: ESD Diodes
    A hacker’s view on ESD protection can tell you a lot about them. I’ve seen a good few categories of hackers neglecting ESD protection – there’s the yet-inexperienced ones, ones …read more
    Like
    Love
    Wow
    Sad
    Angry
    206
    1 Comentários 0 Compartilhamentos 0 Anterior

  • ## Introducción

    En un mundo donde las guerras no se libran solo en campos de batalla, sino también en el vasto océano de la información, un grupo de hackers vinculado a Israel ha decidido hacer de las suyas. Su último golpe maestro ha sido el ataque al banco Sepah de Irán, y como si eso fuera poco, han logrado destruir más de 90 millones de dólares en la plataforma de intercambio de criptomonedas Nobitex. Así, estos "gorriones depredadores" no solo picotean en busca de datos, sino que se lanza...
    ## Introducción En un mundo donde las guerras no se libran solo en campos de batalla, sino también en el vasto océano de la información, un grupo de hackers vinculado a Israel ha decidido hacer de las suyas. Su último golpe maestro ha sido el ataque al banco Sepah de Irán, y como si eso fuera poco, han logrado destruir más de 90 millones de dólares en la plataforma de intercambio de criptomonedas Nobitex. Así, estos "gorriones depredadores" no solo picotean en busca de datos, sino que se lanza...
    **Los Gorriones Depredadores de Israel: Una Guerra Cibernética Contra el Sistema Financiero de Irán**
    ## Introducción En un mundo donde las guerras no se libran solo en campos de batalla, sino también en el vasto océano de la información, un grupo de hackers vinculado a Israel ha decidido hacer de las suyas. Su último golpe maestro ha sido el ataque al banco Sepah de Irán, y como si eso fuera poco, han logrado destruir más de 90 millones de dólares en la plataforma de intercambio de...
    Like
    Love
    Wow
    Sad
    Angry
    534
    1 Comentários 0 Compartilhamentos 0 Anterior
Páginas impulsionada
CGShares https://cgshares.com