-
7 votes
-
UK, US, and Canada accuse Russia of trying to steal information from coronavirus vaccine researchers
15 votes -
Hackable/moddable electronics?
I recently came across a cool video on youtube. https://www.youtube.com/watch?v=dxj8JwdQ7Lk&feature=youtu.be - The guy added a 4g connector to his rc plane and I think some extra batteries and...
I recently came across a cool video on youtube. https://www.youtube.com/watch?v=dxj8JwdQ7Lk&feature=youtu.be - The guy added a 4g connector to his rc plane and I think some extra batteries and managed to fly to the next island over.
I love stuff like this. Do you guys know any other current electronics that can be modded like this? Sadly it seems like most new consumer electronics come with their own small walled garden and often enough stuff just stops working once the seller goes bankrupt.
Other things that come to mind are:
Raspberry Pi
Arduino
ESP
But do you guys know whole systems that are moddable like this?
The Ryze Tello is a programmable drone, which is pretty cool as well.
I also saw some people modding 3d printers to laser cutters7 votes -
The massive Twitter hack could be a global security crisis
20 votes -
Apple, Elon Musk, Kanye West, and other accounts are tweeting a bitcoin scam in giant Twitter hack
49 votes -
Twitter is removing images of an internal tool sources say enables account takeover
11 votes -
Moroccan journalist targeted with network injection attacks using NSO Group’s tools
2 votes -
Cyber-attack Australia: Sophisticated attacks from ‘state-based actor’, PM says
7 votes -
Obscure Indian cyber firm spied on politicians, investors worldwide
5 votes -
A hacker is trying to break Ohio’s tool for reporting workers who quit during the pandemic
23 votes -
Microsoft's GitHub account allegedly hacked, 500GB stolen
11 votes -
BlackBerry says Chinese government hackers stole world's sensitive data for ten years
7 votes -
Webcam hacking—The story of how I gained unauthorized Camera access on iOS and macOS
4 votes -
I spoke out against sexual harassment at Uber. The aftermath was more terrifying than anything I faced before
16 votes -
Four Chinese military personnel charged for Equifax hack
10 votes -
Meet the mad scientist who wrote the book on how to hunt hackers
8 votes -
Hackers are breaking directly into telecom companies to take over customer phone numbers
10 votes -
Tricky phish angles for persistence, not passwords
3 votes -
What does your car know about you? We hacked a Chevy and found that automakers collect data through hundreds of sensors and an always-on Internet connection
22 votes -
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home
10 votes -
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far
29 votes -
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals
8 votes -
Stealthy Russian hacker group resurfaces with clever new tricks
8 votes -
Planting tiny spy chips in hardware can cost as little as $200
8 votes -
Elevator hacking: From the pit to the penthouse
16 votes -
Altstore.io - A third party App Store for iOS
14 votes -
Permanent Bootrom Exploit for iOS Devices with A5-A11 Processors
23 votes -
Web scraping doesn’t violate anti-hacking law, appeals court rules
12 votes -
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs
17 votes -
WhatsApp protocol decryption for chat manipulation and more
7 votes -
New ‘warshipping’ technique gives hackers access to enterprise offices
8 votes -
Sneaker and fashion marketplace StockX was hacked, with almost seven million records stolen
9 votes -
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year
8 votes -
YouTube now bans instructional hacking and phishing
31 votes -
Hackers, farmers, and doctors unite! Support for right to repair laws slowly grows
6 votes -
Florida city to pay $600K ransom to hacker who seized computer systems weeks ago
5 votes -
Telegram founder points to China hacking attack during Hong Kong protest
7 votes -
Behind the scenes with the hacktivists who took on Microsoft and the FBI
4 votes -
Car hackers say that if you want to keep your autonomous vehicles secure, you have to create realistic threat models
4 votes -
Hackers tricked a Tesla, and it's a sign of things to come in the race to fool artificial intelligence
13 votes -
Devuan, a systemd-less Debian just got hacked
8 votes -
Hackers hijacked ASUS software updates to install backdoors on thousands of computers
10 votes -
Tim Berners-Lee: 'Stop web's downward plunge to dysfunctional future'
8 votes -
Swiss e-voting trial offers $150,000 in bug bounties to hackers
11 votes -
What I learned from the hacker who spied on me
7 votes -
New Japanese law lets government hack IOT devices and warn owners they're vulnerable
8 votes -
Doomba
9 votes -
Marriott admits hackers stole data on 500 million guests; passports and credit card info included
21 votes -
Two scenarios of Chinese hacking of Australian companies
China uses the cloud to step up spying on Australian business How China diverts, then spies on Australia's internet traffic
5 votes -
Card skimming malware removed from Infowars online store
16 votes