Articles, Page 10 of 206
With exception to Stuxnet, all of the recent big discoveries in malware trampling the Middle East have not been destructive. Duqu, Flame and Gauss among others all seem to be oriented towards spying as they feature the traditional key loggers, microphone enablers, etc. Yet another piece of malware has been found lurking about, this time in Saudi Arabian energy systems and its destructive. The malware has bounced between being named Shamoon and Wiper, based on strings found internally. In a nutshell, reverse engineers have discovered it uses a legitimate, signed driver (stolen) in order to gain low level disk access to perform a data wipe. A continued effort suggests the malware also exfiltrates infomation about the target computer to an internal node used as a single point of presence for assessing its destructive success. All of this is consolidated in a nice, neat little delivery package totaling only about 900kb.
Have you ever wanted to talk to the bastards who pay people to drop those inane spam comments on our Omninerd web site?
The comments are usually a totally irrelevant and meaningless statement from an anonymous who knows nothing about some subject thread that has been dormant for a long time. They always include a hyper-link to a commercial web site, and the parasites are paid for the hits generated.
Perhaps you don’t see many of these contributions. If that is so it is because many of the regulars on this site are empowered to delete them.
With the collapse of mainstream commercial print and electronic media, the advertising industry is desperate for ways to target commercials and it would like to fuck up any and all internet discussion forums and social or professional web sites with this crap.
Recent reports call out the silent presence of a Russian Akula class submarine in the Gulf of Mexico as a failure of American national defenses. The matter naturally adds fuel to the running Internet memes that Vladimir Putin is among the most bad-ass of all Russians. In reality, the activity is nothing new per se, the Russians and Americans have parked submarines near each others coasts or flown sorties across each others land masses for decades. The proximity of this particular Akula class submarine and the duration for which it went undetected sets it apart from the others. American officials commented, “The Akula was built for one reason and one reason only: To kill U.S. Navy ballistic missile submarines and their crews. It’s a very stealthy boat so it can sneak around and avoid detection and hope to get past any protective screen a boomer might have in place.”
There have been quite a few anonymous leaks from the present administration – ranging from taking credit for the infamous Stuxnet, the kill lists to details on the bin Laden raid. While all of the actions are egregious disclosures of classified information, the bin Laden raid details particularly raised the ire of the special forces community across the military services. Although the active component has generally simmered in silence, the community’s members that have departed service are now speaking up. One former SEAL commented, “If you disclose how we got there, how we took down the building, what we did, how many people were there, that it’s going to hinder future operations, and certainly hurt the success of those future operations.” And flipping the President’s own words about small business owners back at him, “Mr. President, you did not kill Osama bin Laden. America did.” The disgruntled veterans, tired of being used to bolster Obama’s re-election campaign, put together a 22 minute video to air their concerns publicly.
Mothra is a giant butterfly/moth hybrid that terrorized Japan in a series of monster genre movies. Unfortunately for Japan, Patient Zero of the butterfly world has emerged outside of the Fukushima nuclear plant. Thanks to a massive release of radioactive particles, the Zizeeria Maha Serica are showing genetic abnormalities that have only been reproduced scientifically using doses of radiation. These abnormalities have not yet resulted in gigantism or similar destructive features but include changes to wing patterns, antenna length and eye deformities.
So OmniNerds, who is this guy and why should we care? After all, the Vice President really doesn’t do much at all except wait for the President to die.
If you’ve been completely under a rock, Paul Ryan is Mitt Romney’s chosen running mate for Vice President. CNN has a basic rundown of Paul Ryan facts to establish a few starting point metrics. Naturally, the Obama camp already has their this guy is a sham articles up and posted.
No doubt you already know ‘merica has conquered Mars once again. NASA’s Curiosity rover touched down in a dramatic sky crane landing a few days ago. Instead of bouncing across the landscape in a giant beachball like the Spirit and Opportunity rovers, Curiosity plunged through the atmosphere on a parachute whereupon it’s rocket backpack fired before impact allowing it to be lowered to Mars on a rappelling tether. That’s super bad ass NASA … fist bump. Prior to conducting any science, the vehicle is performing integrity checks which included more or less holding an iPhone up to a mirror and taking a picture of its butt. The images were created when the mast instrument checks were performed with the panoramic cameras providing a view of both Curiosity and the surrounding scorch marks from the landing rockets. Curiosity is expected to run for at least two years and packs 15 times as many instruments as its predecessors into its car sized frame.
BlackHat 2012 proved once again to be an interesting conference full of the latest security research, training and hacks. One interesting presentation proved how insecure hotel locks are, specifically the ones utilizing the magnetic card keys. Hacker Cody Brocious used nothing more than a simple Arduino to read digital data and replay it. More specifically, a DC power port on the bottom of Onity locks allows for recharging the on-board battery and configuring a hotel specific code into the door. Using the Arduino, Brocious plugged into the DC port, read the 32bit hotel specific code and simply played it back which has the simple effect of … unlocking the door. A full technical write-up is available at the hacker’s website.
Chick-fil-A became embroiled in controversy over comments by Dan Cathy, the company’s CEO. In a nutshell, he didn’t just provide his opinion on same-sex marriage but indicated his company took an anti-same-sex marriage position based on its Christian values. Of course, they immediately became a poster child business for ardent Christians But the issue went further as some municipalities made public statements against the business for its inflammatory stance. This led to a rather interesting turnabout of additional protesters (that the religious right are incorrectly assuming take their side) that are simply arguing a government entity cannot punish a business for First Amendment rights. (After all, Romney made the news for declaring corporations are people too). The issue is now both anti/pro same-sex marriage AND first amendment rights for businesses against political opinions.
Anybody else think NBC’s coverage of the 2012 Olympics suck? Personally, I find it ridiculous that sports are on-going throughout the day and yet if I turn on the television there is nothing showing until the evening. By that point, any events I’m interested in, I’ve already found out the results from the Internet. And then, despite a plethora of athletes from around the world competing, all NBC seems to air are Americans, lengthy commercials and long winded background stories. I remember while living in Europe their sports channels carried nearly non-stop Olympic coverage spanning all sorts of events and showing as many athletes as possible. It’s not really a surprise so few people seem to care anymore.
How do you delineate software engineers, software developers and computer scientists from one another? There are, of course, “definitions” for these individuals but practical reality often differs.
One amusing anecdote I’ve seen said, “A Software Engineer is the person you call to reset your password. A Software Developer is the person you call to set up a new Excel macro. Nobody knows what a Computer Scientist is.”
Women in the Army are on the verge of getting new armor. The simple fact of the matter is that current vest and plate designs just don’t fit right on women due to different body form factors. While it’s easy to simply redesign the shapes, the “challenge right now is that when you bring in those complex curvatures, the plate loses some of its strength.” In other words, 0xB16B00B5 get in the way and weaken contemporary plate designs if they’re simply reshaped to form. Perhaps this is the first step towards a military uniform consisting of form-fitting spandex just like the comic books said would happen.
Gun control may soon be a very moot point. Take for example, the classic AR-15 (M4/M16 equivalent). You can buy nearly every component for this weapon via uncontrolled mechanisms today. The “controlled”, if you will, component is the lower receiver which is stamped by serial number and ultimately considered the weapon. An American gunsmith has taken to technology and voila, printed himself a lower receiver from a standard 3D printer using resin. The lower receiver was mated with the appropriate components and a fully-functional AR-15 was born. THe digital design to replicate the work exists on ThingVerse where people can expand on the work … like add full auto?
It’s beginning to seem that Iran is the Poland of cyberspace … everyone is p0wning them. The latest buzz around the Natanz nuclear facility is an email received by F-Secure from a scientist at the Atomic Energy Organization of Iran (AEOI). F-Secure has confirmed the email really did originate from the facility but has not had a chance to validate the claims. Within the note, the scientist claims their network and Siemens systems were shutdown from an attack utilizing nothing more than Metasploit with the added audible insult of playing ACDC’s Thunderstruck from the computer’s speakers each night. If true, then it would seem Iran’s networks are the digital equivalent of the easy-girl at the frat party.