Posts by synt4x :

Edward Snowden trained by the NSA

The papers of Edward Snowden not give enough clarity about what exactly he was doing for the NSA, what was his position. He was not told about it, and his employer is also silent. Snowden officially called the technician or system administrator, but in an interview with China Morning Post, he described himself as “infrastructure analyst”(…)

Code for spoofing APK preserving digital signatures on Android-powered devices

A few days ago, the company Bluebox Security announced that at the Black Hat USA 2013 conference, which begins July 27, 2013, they will talk about the enchanting vulnerability in the security model of the operating system Android, which allows an attacker to modify the contents of the APK file, without changing the cryptographic signature. In other words, any(…)

Encryption is the first stop to intercept communications

It is no secret that government agencies are constantly monitoring communications of individuals, that is, ordinary citizens. In the case of the American system of surveillance is particularly interesting to see how often the interception of communications, whether it is a permanent process or occasionally activated action. In this sense, it makes sense to a new document ,(…)

The supercomputer “Tianhe-2” Takes No. 1 Ranking on 41st TOP500 List

The new Chinese supercomputer “Tianhe-2” (“Milky Way-2”) headed by a fresh rating of the top 500 most powerful computer systems in the world. The performance of this amounts to 33.86 petaflops supercomputer, which is almost twice the maximum performance of the former leader of the October list of Top 500 supercomputer Titan, which has now slipped to(…)

Export tweets in different formats

If you’re tired of Twitter and you want to leave this site forever, then, if desired you can make a total export of all your tweets. The easiest way to do this is through the service twDocs. The service supports exporting to PDF, DOC, XML, CSV, TXT, XLS and HTML. Archive logs all messages, including(…)

OWASP – Top 10 Vulnerabilities

Topping the list of the most dangerous and widespread flaws in web-applications was taken by injection of code. According to the creators of Open Web Application Security Project (OWASP), which for the past 10 years is the top 10 most dangerous vulnerabilities in web-applications published the final version of the rankings in 2013. The purpose(…)

New Windows-backdoor deletes MBR

Antivirus company Trend Micro warns of a new backdoor BKDR_MATSNU.MCB , which is actively promoted through mass mailings, especially in Germany. The malware has the unpleasant feature: a command from the remote C & C-server, or it can block the loading of the PC, or delete the master boot record. Backdoor class ransomware before that(…)

The world’s first CPU of 5GHz

AMD has introduced the most powerful processor in the family of AMD FX and the world’s first commercially available CPU with a clock frequency of 5 GHz. Processor AMD FX-9590 with 8 cores provide high performance for gaming and multimedia applications on desktop computers. It is symbolic that his presentation was held at the conference(…)

Critical vulnerability in 60 + models of CCTV and IP-cameras

A group of students from the European University of Madrid published the results of their thesis at the Faculty of Information Technology. They explored the protection of the various surveillance systems found on the Internet through Google and Shodan. In total, they analyzed 9 systems, they found 14 vulnerabilities, from simple XSS and CSRF to(…)

Hack a Samsung TV with SmartTV function

As reported in his blog, Helfurt German researcher Martin (Martin Herfurt), was able to crack the Samsung TV with function SmartTV. The expert noted that a successful cyber attack carried out from a remote computer to broadcast programs on technology HbbTV (Hybrid Broadcast Broadband TV), used in Samsung TVs.   After he managed to hack(…)