Computer

Security

iMessage for Android: A Security Risk You Should Know About

This video from Seytonic highlights the latest happenings in security. Sources: https://9to5google.com/2023/11/18/nothing-chats-sunbird-unencrypted-data-privacy-nightmare/ https://arstechnica.com/gadgets/2023/11/nothings-imessage-app-was-a-security-catastrophe- taken-down-in-24-hours/?comments=1&comments-page=1 https://arstechnica.com/gadgets/2023/11/nothing-phone-says-it-will-hack-into-imessage-bring- blue-bubbles-to-android/ https://texts.blog/2023/11/18/sunbird-security/ https://nothing.tech/pages/nothing-chats https://go.theregister.com/feed/www.theregister.com/2023/11/22/nuclear_lab_hacked/ https://therecord.media/agencies-investigating-breach-at-nuclear-lab https://www.darkreading.com/ics-ot/idaho-national-nuclear-lab-targeted-in-major-data-breach https://www.bleepingcomputer.com/news/security/hacktivists-breach-us-nuclear-research-lab-steal-employee-data/ https://www.eastidahonews.com/2023/11/idaho-national-laboratory-experiences-massive-data-breach-employee-information-leaked-online/ https://therecord.media/fcc-new-rules-stop-sim-swapping https://news.ycombinator.com/item?id=38331480 https://docs.fcc.gov/public/attachments/DOC-398483A1.pdf https://arstechnica.com/security/2023/11/the-fcc-says-new-rules-will-curb-sim-swapping-im-pessimistic/ https://docs.fcc.gov/public/attachments/DOC-398483A3.pdf https://therecord.media/sim-swapping-lapsus-cyber-safety-review-board-report

Read More
AI Economics of AI Ethics Generative AI Large Language Models

Do Large Language Models Mean the End of Programming? Dr. Matt Welsh Elaborates

Matt Welsh is Co-founder and Chief Architect of Fixie.ai, a Seattle-based startup developing a new computational platform with AI at the core. He was previously head of engineering at OctoML, a software engineer at Apple and Xnor.ai, engineering director at Google, and a Professor of Computer Science at Harvard University. He holds a PhD from […]

Read More
AI AWS Generative AI

How Integrating Foundation Models into Your Code with Amazon Bedrock

This video is from AWS Developers. Discover Amazon Bedrock and learn how to integrate generative AI models from leading AI startups and Amazon into your applications. In this video, AWS Senior Developer Advocate Mike Chambers steps through how to use Boto3, the Python SDK for AWS, to make text generations with models such as Anthropic […]

Read More
Security

Pwnagotchi — hacking WiFi networks in seconds | Real Experiment

In this video, Sumsub showcases the power of the Pwnagotchi, cheap wifi hacking device. Witness how cybercriminals can hack your wifi network in seconds just by standing near you and leaving you exposed and vulnerable to identity theft, data breaches, and more.

Read More
Apple Security

All Apple Products are Vulnerable to New Password Stealing Hack

This video is from Seytonic. Sources: https://arstechnica.com/?p=1978389 https://ileakage.com/ https://www.bleepingcomputer.com/news/security/new-ileakage-attack-steals-emails-passwords-from-apple-safari/ https://therecord.media/doj-seizure-web-domains-north-korean-tech-worker-scheme https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation https://www.darkreading.com/careers-and-people/freelance-market-flooded-with-north-korean-it-actors https://www.ic3.gov/Media/Y2023/PSA231018 https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation https://techcrunch.com/2023/09/05/flipper-zero-hacking-iphone-flood-popups/ https://techryptic.github.io/2023/09/01/Annoying-Apple-Fans/ https://www.bleepingcomputer.com/news/security/flipper-zero-can-be-used-to-launch-ios-bluetooth-spam-attacks/ https://www.instagram.com/p/Cyf5y2EtA_V/ https://www.youtube.com/watch?v=NBYiroTOOWg&ab_channel=TAKEAPART lockup spam demo https://www.youtube.com/watch?v=u5FKyRRaRjQ&t=386s&ab_channel=TalkingSasquach https://www.mobile-hacker.com/2023/10/17/spam-ios-android-and-windows-with-bluetooth-pairing-messages-using-flipper-zero-or-android-smartphone/ https://arstechnica.com/?p=1977141 https://www.bleepingcomputer.com/news/security/fake-keepass-site-uses-google-ads-and-punycode-to-push-malware/ https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website

Read More
Raspberry Pi

Why RISC-V isn’t killing Arm (yet)

This video is from Jeff Geerling. The Mars CM is neat. But is it an adequate replacement for the Raspberry Pi CM4? Links: Mars CM: https://milkv.io/mars-cm ARACE store: https://arace.tech/products/milk-v-mars-cm Mars CM test data: https://github.com/geerlingguy/sbc-reviews/issues/22 StarFive VisionFive 2 review: https://www.jeffgeerling.com/blog/2023/risc-v-business-testing-starfives-visionfive-2-sbc

Read More
Security

Signal Did NOT Get Hacked

This video from Seytonic rounds up all the latest security news. Sources: https://www.bleepingcomputer.com/news/security/signal-says-there-is-no-evidence-rumored-zero-day-bug-is-real https://cybernews.com/news/signal-rumor-zero-day-vulnerability/ https://thehackernews.com/2023/10/signal-debunks-zero-day-vulnerability.html https://www.hackread.com/signal-zero-day-vulnerability-refuted/ https://www.bitdefender.com/blog/hotforsecurity/signal-debunks-online-rumours-of-zero-day-security-vulnerability/ https://www.washingtonpost.com/politics/2023/10/17/signal-says-rumored-vulnerability-doesnt-exist-heres-what-know/ https://blog.cloudflare.com/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/ https://www.bleepingcomputer.com/news/security/fake-redalert-rocket-alert-app-for-israel-installs-android-spyware/ https://www.hackread.com/hackers-israeli-rocket-alert-app-spyware/ https://www.darkreading.com/application-security/fake-airstrike-alert-app-targets-israelis https://www.hackread.com/ransomedvc-colonial-pipeline-cybersecurity-breach/ https://therecord.media/colonial-pipeline-attributes-ransomware-claims-to-unrelated-third-party-breach https://thehackernews.com/2023/10/pro-russian-hackers-exploiting-recent.html https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ https://www.bleepingcomputer.com/news/security/google-links-winrar-exploitation-to-russian-chinese-state-hackers/ https://therecord.media/russia-china-hackers-exploit-winrar-bug https://www.theverge.com/2023/10/18/23922075/winrar-security-vulnerability-exploit-patch-update

Read More
Current Events Security

Hacktivists Target Israel… What’s Happened So Far?

This video is from Seytonic. Sources: https://go.theregister.com/feed/www.theregister.com/2023/10/09/hacktivism_middle_east/ https://www.wired.com/story/israel-hamas-war-hacktivism/ https://www.wired.com/story/israel-hamas-war-surveillance/ https://www.wired.com/story/x-israel-hamas-war-disinformation/ https://www.darkreading.com/dr-global/hacktivists-enter-fray-following-hamas-strikes-against-israel https://www.darkreading.com/dr-global/hackers-for-hire-hit-both-sides-in-israel-hamas-conflict

Read More
Interesting Linux

The Computer Chronicles – Windows 98 (1998)

This video is from The Computer Chronicles and tracks the launch of Windows 98 as well as a new upstart Windows alternative called Linux.

Read More
Uncategorized

How does Computer Hardware Work?

Branch Education takes us on a 3D animated adventure to every piece of computer hardware inside a desktop computer. You’ll also see a nanoscopic view of the transistors inside the CPU and GPU. This video is like a biology dissection lab; instead, we’re opening up a computer and seeing all the various computer hardware inside.

Read More