NASA is seriously planning to do research on UFOs. The agency announced this in June, and now there are new details. The research will be led by astrophysicist David Spergel, president of the Simons Foundation in New York. The group will also include 15-17 of the world’s leading scientists, including...
At the Black Hat Security Technology Conference recently held in Las Vegas, Lennert Wouters, a cybersecurity specialist from KU Leuven (Belgium), shared his experience of successfully hacking Starlink user equipment. True, this was not a classic software hack, since the researcher had to make a so-called “modchip”. The cost of...
Unknown hackers, acting under the nickname Adrastea, hacked into the database of the largest European missile manufacturer – MBDA, formed as a result of the merger of the French Aérospatiale-Matra Missiles, the British Matra BAe Dynamics and the Italian Finmeccanica-Leonardo. This was reported by Security Affairs. The attackers’ message about...
Samsung was the first company in the market to release the August security patch for its smartphones. Moreover, for three flagship lines at once: Galaxy S20, S21 and S22. Today, owners of these smartphones in Germany began to receive updates, including a security patch. Usually, users from other countries do...
Audius (AUDIO) is an artist-run, community-owned music streaming platform that aims to enable anyone to freely distribute, monetize, and stream audio. Audius aims to return money and power to artists by connecting them directly to listeners and removing record labels and middlemen from the equation. If bitcoin can be called...
The hacker group Odyssey Team has announced the first jailbreak of iOS 15, which will soon release a jailbreak tool called Cheyote. According to the developers, the Cheyote tool will initially only work with iOS 15.0 until iOS 15.1.1, released last November. The developers are going to provide later support...
Mozilla is working on improving the PDF viewer in the Firefox browser. And, judging by the latest leak, it will soon have new features. So far, this is only available in the nightly build, where you can already add notes to documents. Note that notes can be text and handwritten....
Researchers at the ETH Zurich (ETH Zurich) have discovered a new attack mechanism against Intel and AMD processors, including Kaby Lake, Coffee Lake, Zen 1, Zen 1+, and Zen 2. It’s called Retbleed, and it works by speculatively executing arbitrary code. This gives him the ability to steal passwords and...
Specialists from the Computer Science and Artificial Intelligence Laboratory (CSAIL) from the Massachusetts Institute of Technology said that they were able to develop a PACMAN attack technique, which is possible due to a hardware vulnerability in the Apple M1 processor. Moreover, it cannot be closed by software. The attack itself...
Unisoc is actively capturing the market for single-chip systems, although it does so exclusively in the budget segment itself. However, it turned out that these platforms have a critical vulnerability. According to the source, the problem is in the modem’s firmware and affects both 4G and 5G platforms. The vulnerability,...
A serious vulnerability has been found in the Microsoft Office suite that could potentially allow attackers to execute arbitrary code. She was assigned the number CVE-2022-30190, and among the researchers they gave the name Follina. As noted in Kaspersky Lab, the most unpleasant thing is that there is no fix...
Microsoft has announced that its experts have discovered a serious vulnerability affecting many Android phones, and also helped to fix it. The vulnerability was discovered in a framework from Israeli developer MCE Systems, which provides a self-diagnostic mechanism for identifying and fixing problems on Android devices. The framework is used...
Researchers at the Technical University of Darmstadt in Germany have found that the iPhone can be at risk even when turned off. When iPhone is turned off, most wireless chips, including Bluetooth, NFC, and Ultra-Wideband (UWB), continue to work for up to 24 hours. So the phone can still be...
A couple of weeks ago, the LHR protection in Nvidia graphics cards was cracked, which allowed everyone to use accelerators for Ethereum mining at full capacity again. But in fact, then the protection of LHR v2 was cracked, but not LHR v3. The LHR v3 version is present in Nvidia’s...
Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux. Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed...
Xiaomi has introduced a new kit with an outdoor video surveillance camera and a smart door lock, which includes Mi Outdoor camera and Mi Smart Door Lock 1S. The bundle is priced at around $237, which is a great deal as these devices cost $20 more individually. Mi Smart Door...