Tech

Suprema Biometrics Data Breach

Suprema is a South Korean information securty company that supplies many companies and government agencies, such as the UK Metropolitan police, with their Biostar 2 web based biometrics lock system. The self proclaimed "Global Powerhouse in Biometric, Security and Identity Solutions" company have been found to have let fingerprint data, biometric and personal information of over 1 million people publicly accessible online.

Lyft Self Driving Dataset

Lyft have released a huge self driving level 5 dataset comprising 55,000 human labelled 3D annotated frames, a driveable surface map and an underlying spacial semantic map to contextualise the data. The release of the dataset is part of a competition with a prize of $25,000, aimed at researchers to help Lyft train AI algorithms to help them reach their goal of a Level 5 (fully automated) self driving car.

Trennd

Trennd collates the top google searches over time, to show you the popular topics as and when they blow up. You can search from 5 years to 3 months and you can see the monthly growth exponent and curve growth gradient.

Spear Phishing

Many are now aware of the term phishing, the attempt to obtain sensitive information by luring people into clicking links in an email from what they think is a trsuted sender. A new subset of this, spear phishing, is the attempt to lure into the same using emails sent from legitimate and trusted sources which have been compromised.

20 Years of Online Game Hacking

Despite having recommended the Darknet Diaries podcast way back in Edition #150, I fell behind in my listening and have just started catching up. This week I listened to a fascinating two part story about Manfred, an online game hacker who earned a living from his hacking for 20 years! Manfred found and exploited insecurities in pretty much every online game going, except World of Warcraft, for years.

Hacking Hotels

Bloomberg has an interesting piece that follows a group of consultant hackers trying to hack a hotel. The piece describes the usual targets that allow would be hackers to gain access to a hotel's physical infrastructure, such as isolated POS systems, smart TV internet ports or even ports for automated window blinds.

Pages

Life Changing Smart Thinking Books

Subscribe to RSS - Tech