-
It’s A Bench, But It’s Not Benchy
Whatever the nuances are surrounding the reported taking down of remixes derived from the famous Benchy 3D printer stress test, it was inevitable that in its aftermath there would be competing stress tests appear under more permissive licensing. And so it has come to pass, in the form of [Depep1]’s Boaty, a model that’s not…
-
Bad Apple but it’s 6,500 Regex Searches in Vim
In the world of showing off, there is alongside ‘Does it play Doom?’ that other classic of ‘Does it play Bad Apple?’. Whereas either would be quaint in the context of the Vim editor, this didn’t deter [Nolen Royalty] from making Vim play the Bad Apple video. As this is a purely black and white…
-
Retrotechtacular: The 1951 Telephone Selector
Telephone systems predate the use of cheap computers and electronic switches. Yesterday’s phone system used lots of stepping relays in a box known as a “selector.” If you worked for the phone company around 1951, you might have seen the Bell System training film shown below that covers 197 selectors. The relays are not all…
-
iFixit Releases Command Line Docs for FixHub Iron
When we reviewed the iFixit FixHub back in September, one of the most interesting features of the portable soldering station was the command line interface that both the iron and the base station offered up once you connected to them via USB. While this feature wasn’t documented anywhere, it made a degree of a sense,…
-
Blinkenlights-First Retrocomputer Design
[Boz] wants to build a retrocomputer, but where to start? You could start with the computery bits, like say the CPU or the bus architecture, but where’s the fun in that? Instead, [Boz] built a righteous blinkenlights array. What’s cool about this display is that it’s ready to go out of the box. All of the…
-
Back in 2012, Mark and I detailed a number of iOS kernel mitigations that were introduced in iOS 6 to prevent an attacker from leveraging well-known exploitation techniques such as the zone free list pointer overwrite. Most of these mitigations rely on entropy (of varying degree) provided by the kernel, and are therefore supported by a separate…
-
BlackPwn: BlackPhone SilentText Type Confusion Vulnerability
Privacy is a hot topic at the moment – it continues to dominate the headlines as news of new NSA incursions, celebrity phone hacks, and corporate breaches are being reported on an increasingly regular basis. In response to this, a number of products have been brought to market that attempt to provide consumers with a…
-
The Good, the Bad and the Ugly in Cybersecurity – Week 2
US govt launches cyber trust program, spammers use neglected domains to evade detection, and Japan accuses MirrorFace of cyber espionage. The Good | Feds Launch Cyber Trust Program & OFAC Sanctions Flax Typhoon-Linked Company The U.S. government took both defensive and offensive actions this week, starting with the launch of the Cyber Trust Mark and…
-
The Hollywood Sign is Not on Fire: Deepfakes Spread During L.A. Wildfires
Amid the devastation of the Los Angeles County wildfires – scorching an area twice the size of Manhattan – McAfee threat researchers have identified and verified a rise in AI-generated deepfakes and misinformation, including startling but false images of the Hollywood sign engulfed in flames. Debunking the Myth: Hollywood Sign Safe Amid Wildfire Rumors on…
-
BayMark Health Services sends breach notifications after ransomware attack
BayMark Health Services, Inc. (BayMark) notified an unknown number of patients that attackers stole their personal and health information. BayMark profiles itself as North America’s largest provider of medication-assisted treatment (MAT) for substance use disorders helping tens of thousands of individuals with recovery. In a breach notification, the company disclosed that on October 11, 2024…