Pages Navigation Menu

SHOWFUN - Show & Fun & More!

Spear-phishing attack hits high level execs with ransomware

Posted on 11/14 23:51 in Shows | 0

Their attack of choice encrypts all or some selection of a victim’s files, then charge the victim for the right to decrypt those files.Now, ransomware developers are turning to a much more sophisticated form of attack.

Read More

US plan to drop ‘cyber bombs’ on ISIS will change the meaning of the term cyber war

Posted on 09/21 12:56 in Shows | 0

” Indeed, until now the cyber war on ISIS has been mostly confined to disruption of communications.At this point, though, it’s almost impossible to insulate yourself from the effectiveness of cyber war.

Read More

Computer coughs up passwords, encryption keys through its cooling fans

Posted on 06/29 21:16 in Shows | 0

(The term pre-dates wireless internet, and a Wi-Fi-connected computer is not air-gapped, despite the literal gap of air around it.) So how do you hack your way into an air-gapped computer?

Read More

Hackers claim DDoS knocked Pokémon GO offline last weekend

Posted on 07/19 15:28 in Shows | 0

This past weekend was particularly bad, and now a hacking group called OurMine is claiming responsibility for the downtime.If you have not heard of Pokémon GO, I can only assume you’ve been living under a rock sans internet access for the last few weeks.

Read More

The Jeep Cherokee hack gets worse — if hackers can get physical access to the car first

Posted on 08/04 18:09 in Shows | 0

The duo that hacked a Jeep Cherokee a year ago is back.The hacks can now take over more of the car, but only via physical access, such as via a laptop connected physically to the car’s OBD-II (on-board diagnostics) port.

Read More

Hacking US infrastructure: How vulnerable is it?

Posted on 08/04 21:43 in Shows | 0

Is our infrastructure vulnerable to hackers?Part of the risk in cyber intrusions on infrastructure is the connection of these systems to the internet.

Read More

Researchers: Hackers could weaponize up to a billion monitors to spy on everyone

Posted on 08/08 15:03 in Shows | 0

Most of the time when we talk about PC security, we talk about either the operating system or the hardware that it runs on.The team initially hacked the Dell U2410 monitor using a USB port, but were also able to hack the hardware using the HDMI cable.

Read More

Bugs in the Bug: 100 million cars, especially VW, may be at risk for unlock hacks

Posted on 08/12 17:10 in Shows | 0

Weaknesses in Volkswagen’s wireless security leaves 100 million cars at risk for being unlocked and started remotely, researchers say.They estimate just four shared key codes are used in 100 million Volkswagens.

Read More

Cyber is the new nuclear, changing the world through mutually assured disruption

Posted on 08/13 15:26 in Shows | 0

More generally, are these particular sorts of cyber attacks really changing the world all that much?” This perceived lesser severity of cyberwar has allowed nonviolent cyber attacks to become more brazen than even Cold War espionage.

Read More

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame

Posted on 08/19 18:11 in Shows | 0

Within the NSA, the group that does the sort of offensive hacking many people now most associate with the agency is called TAO: Tailored Access Operations.It’s the group that, arguably, has given the NSA a bad name in recent years.

Read More

Deus Ex: Mankind Divided complete password / code list

Posted on 08/29 02:34 in More | 0

It's what fans have been long waiting for - a true successor to the original Deus Ex and highlight of the series Mankind Divided has finally arrived (read our full review here)!Something like a locked door is no match for augmented super human Adam Jensen, though, with his advanced hacking abilities.

Read More

An unknown state may be running drills for taking down the entire internet

Posted on 09/20 16:15 in Shows | 0

These have been not only getting stronger, longer lasting, and more diverse, but they’ve been moving in seemingly systematic, investigatory ways.This could be interpreted as an attempt to get defenders to “bare all,” and make their full defensive capabilities known.

Read More

Ransomware shuts down San Fran transit, but the hacker just got hacked

Posted on 11/30 19:13 in Shows | 0

This week, the San Fransisco transit system experienced the latest in a growing trend of “ransomware” attacks against important pieces of infrastructure.There is some good news, though: as reported by Forbes, it seems that the hacker has had his or her own email address infiltrated in retaliation.

Read More

Bethesda Should Make Russian-Hacker-Themed 'Fallout 4' DLC After CNN Gaffe

Posted on 01/03 19:58 in Deals | 0

The word "hacking" is rather nefarious sounding, but most people have no idea what it actually involves.When we think of hacking we conjure up images of The Matrix or Mr.

Read More

The government's public evidence falls short of proving Russian involvement in the DNC hack

Posted on 01/09 22:08 in Shows | 0

The following terms are used and defined within the ODNI report.Members of Congress, who have received their own classified intelligence briefings, have signed on to the government’s findings.

Read More

cast 450: Fun at the Movies

Posted on 01/22 13:02 in More | 0

Betwixt the best and worst of cinema, we find a way to cram in talk about new-old Call of Duty, the return of Marcus Fenix, the highs and lows of Paper Mario: Color Splash, grumpy Miyamoto, serious hacking, and a field test in the neverending war of bat vs.knife.

Read More