US Launches Controversial Investigation into Chinese Legacy Chip Production

Thumbnail
1 min read

The Biden administration's probe into China's legacy chip manufacturing capabilities has ignited debate over national security concerns and trade competition. Critics question whether the investigation, which could lead to new restrictions, primarily addresses security threats or aims to limit Chinese economic advancement.

Voltage Glitch Attack Cracks 'Unhackable' Raspberry Pi Chip, Claims $20K Bounty

Thumbnail
1 min read

Engineer Aedan Cullen breached the RP2350 microcontroller's security through an innovative voltage manipulation technique, accessing protected memory despite multiple security layers. The hack exposed critical vulnerabilities in hardware-based security measures and may earn Cullen a $20,000 bounty.

The Hidden Battle Over FOSS Copyright: Why Corporate Ownership Threatens Open Source Freedom

Thumbnail
1 min read

A critical examination reveals most FOSS developers unknowingly surrender their copyrights to employers, potentially undermining copyleft protections. This shift from individual to corporate copyright ownership poses significant challenges for enforcing licenses like GPL and maintaining open source software integrity.

Chicago CTA Train Robbery Thwarted by AirTag Tracking Technology

Thumbnail
1 min read

A food delivery driver's electric bike theft on Chicago's Red Line was quickly solved thanks to an Apple AirTag tracker, leading to the arrest of two suspects within hours. The case demonstrates how personal tracking devices can aid law enforcement in solving public transit crimes.

Engineers Revive 15-Year-Old BEESAT-1 Satellite Through Innovative Hacking

Thumbnail
1 min read

A team of engineers successfully restored control of BEESAT-1, a CubeSat that had been malfunctioning since 2013, by developing creative solutions for software updates. The remarkable recovery demonstrates how combining space engineering with security techniques can resurrect seemingly defunct satellites.

Meta Under Fire as Facebook, Instagram Host Illegal Gun Silencer Ads Disguised as Auto Parts

Thumbnail
1 min read

Meta's social platforms are hosting thousands of ads for 'fuel filters' that can be converted into illegal gun silencers, linked to Chinese drop-shipping operations. Despite platform policies prohibiting weapons, these $50 devices circumvent federal regulations while targeting military personnel and other users.

Chinese Hackers Breach Senior US Treasury Officials' Computers in Major Security Incident

Thumbnail
1 min read

Chinese state-sponsored hackers compromised approximately 100 US Treasury Department computers, accessing sensitive but unclassified information through a third-party security vendor. The breach exposed internal documents and communications, though classified systems remained secure.

Critical Windows Domain Controller Exploit Revealed: LDAPNightmare PoC Triggers System Crashes

Thumbnail
1 min read

A new proof-of-concept exploit called LDAPNightmare demonstrates how attackers can crash Windows domain controllers through LDAP vulnerability CVE-2024-49113. The exploit forces system reboots by crashing LSASS, with potential for remote code execution if systems remain unpatched.

The Truth About Your Phone's Microphone: Debunking Ad Targeting Myths

Thumbnail
1 min read

A recent $95M Apple settlement over Siri recordings has reignited debates about tech companies eavesdropping for ad targeting. Explore why this popular conspiracy theory doesn't align with technical and business realities, despite compelling anecdotal experiences.

Do not miss any updates.
Subscribe to the newsletter