From hackaday.com
It’s Spreadsheets All The Way Down For This 80s Handheld
7 7
Unlike the today’s consumer computer market, the 1980s were the wild west in comparison. There were all kinds of different, incompatible operating systems, hardware, and programs, all competi…
#hacking #projects #80s #LCD #modem #cassette #workslate #convergent #programming #spreadsheet
on Sep 6
From hackaday.com
High-Speed Jelly Launcher Destroys Toast
5 5
You shouldn’t play with your food. Unless you’re designing some kind of portable cannon to fling it across the room. That’s precisely what [Backhaul Studios] did. The first step o…
#hacking #projects #flywheel #MiscHacks #condiments #jellylauncher
on Sep 5
From hackaday.com
If Wood Isn’t The Biomass Answer, What Is?
5 5
As we slowly wean ourselves away from our centuries-long love affair with fossil fuels in an attempt to reduce CO2 emissions and combat global warming, there has been a rapid expansion across a bro…
#hacking #projects #News #biomass #Featured #interest #greenenergy #woodpellets
on Sep 5
From healthcareinfosecurity.com
Patient Monitor Manufacturer Is Still Recovering From Attack
4 4
A cyberattack against on-premises systems is affecting product manufacturing, fulfillment and distribution operations of Masimo, a manufacturer of patient
#masimo #medicaldevice #hipaa #cookies #doctors #doxxing #hacking #privacy #hospital #security
6h ago
From hackaday.com
Superconductivity News: What Makes Floquet Majorana Fermions Special For Quantum Computing?
4 4
Researchers from the USA and India have proposed that Floquet Majorana fermions may improve quantum computing by controlling superconducting currents, potentially reducing errors and increasing sta…
#hacking #science #projects #josephsoneffect #quantumcomputing #superconductivity #floquetmajoranafermions #topologicalsuperconductors
17h ago
From hackaday.com
FLOSS Weekly Episode 832: Give Yourself A Medal
4 4
This week, Jonathan Bennett chats with Alexandre Dulaunoy and Quentin Jérôme about Kunai and CIRCL! How does Kunai help solve Linux security monitoring? Why is eBPF the right place for one of these…
#circl #kunai #hacking #podcasts #projects #flossweekly #hackadaycolumns
on Wed, 6PM
From hackaday.com
Hackaday Links: February 16, 2025
4 4
Just when you thought the saga of the Bitcoin wallet lost in a Welsh landfill was over, another chapter of the story appears to be starting. Regular readers will recall the years-long efforts of Bi…
on Feb 17
From hackaday.com
How Hard Is It To Write A Calculator App?
4 4
How hard can it be to write a simple four-function calculator program? After all, computers are good at math, and making a calculator isn’t exactly blazing a new trail, right? But [Chad Nause…
on Feb 16
From hackaday.com
4 4
[Paul] likes his piano, but he doesn’t know how to play it. The obvious answer: program an Arduino to do it. Some aluminum extrusion and solenoids later, and it was working. Well, perhaps not…
on Feb 16
From hackaday.com
Build A Super Cheap RC Trainer Plane With Foam
4 4
Once upon a time, RC planes were expensive models that took months to build and big money to equip with electronics. Since the 20th century though, powerful batteries have become cheap, as have ser…
#hacking #projects #FOAM #plane #rcplane #trainer #MiscHacks #rctrainer #radiocontrol #trainerplane
on Sep 6
From hackaday.com
3 3
These days, if you are in the market for a capable digital voltmeter, you might as well consider getting one with an oscilloscope built-in. One choice is the Owon HDS160, which [Kerry Wong] covers …
#owon #hds160 #hacking #reviews #projects #teardown #scopemeter #oscilloscope
3h ago
From hackaday.com
Flow Visualization With Schlieren Photography
3 3
The word “Schlieren” is German, and translates roughly to “streaks”. What is streaky photography, and why might you want to use it in a project? And where did this funny term come from?…
#hacking #science #shimmer #featured #interest #projects #schlieren #originalart #photography
5h ago
From hackaday.com
A Constant-Fraction Discriminator For Sub-Nanosecond Timing
3 3
Detecting a signal pulse is usually basic electronics, but you start to find more complications when you need to time the signal’s arrival in the picoseconds domain. These include the time-walk eff…
#pulse #hacking #hardware #projects #signalprocessing #constantfractiondiscriminator
8h ago
From hackaday.com
3D Printed TPU Bellows With PLA Interface Layers
3 3
Of all FDM filament types, flexible ones such as TPU invite a whole new way of thinking, as well as applications. Case in point the TPU-based bellows that the [Functional Part Friday] channel on Yo…
#tpu #bellows #hacking #projects #3dprinterhacks
11h ago
From hackaday.com
3 3
The iMac G3 is an absolute icon of industrial design, as (or perhaps more) era-defining than the Mac Classic before it. In the modern day, if your old iMac even boots, well, you can’t do much…
#pc #mac #case #imac #hacking #projects #retrocomputing
14h ago
From hackaday.com
3 3
It might seem strange to people like us, but normal people hate wires. Really hate wires. A lot. So it makes sense that with so many wireless technologies, there should be a way to do USB over wire…
#cf #cw #usb #hacking #projects #wirelessusb #retrocomputing
19h ago
From hackaday.com
Liquid Silicone 3D Printing Is No Joke
3 3
They might call it Levity, but there’s nothing funny about Rapid Liquid Print’s new silicone 3D printer. It has to be seen to be believed, and luckily [3D Printing Nerd] gives us lots o…
#hacking #projects #silicone #3dprinting #3dprinterhacks #liquidprinting
23h ago
From hackaday.com
[Quinn Dunki] Makes A Screw Shortener Fit For Kings
3 3
It’s common problem when you’re building anything with screws: this one is too long, this one is too short. While she can’t teach you how to fix the latter, [Quinn Dunki] has made…
on Feb 16
From hackaday.com
Scrapyard Vacuum Dehydrator Sucks The Water From Hydraulic Oil
3 3
Anyone who has ever had the misfortune of a blown head gasket knows that the old saying “oil and water don’t mix” is only partially true. When what’s coming out of the drain…
on Feb 16
From healthcareinfosecurity.com
HHS to Build 'Secure' Data Platform for Autism Research
2 2
The U.S. Department of Health and Human Services said it will build a data platform" allowing researchers to "securely" access data from Medicare and
#hipaa #autism #cookies #doctors #doxxing #hacking #privacy #hospital #security #healthcare
22h ago
From hackaday.com
2 2
Last year, we saw [How To Make Everything’s] take on [DaVinci’s] machine for cutting threads. However, they stopped short of the goal, which was making accurate metal screw threads. Aft…
on Feb 17
From redhotcyber.com
Un terabyte di dati in un millimetro cubo! I Dati verranno immagazzinati tra gli Atomi
2 2
Scienziati dell’Università di Chicago hanno sviluppato una memoria atomica che può immagazzinare terabyte di dati in un millimetro cubo. Il futuro dello storage è qui!
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
on Feb 16
From securityaffairs.com
Storm-2372 used the device code phishing technique since August 2024
2 2
The group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries
#storm #hacking #phishing #securityaffairs
on Feb 16
From redhotcyber.com
DeepSeek vuole sviluppare i suoi Chip AI e avvia una massiccia campagna di reclutamento
2 2
DeepSeek avvia una massiccia campagna di reclutamento per esperti di semiconduttori, puntando a sviluppare chip AI custom. Sfida a Nvidia e OpenAI? Scopri le ambizioni della Cina nell’intelligenza artificiale.
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
on Feb 16
From redhotcyber.com
2 2
Trump firma un ordine esecutivo per potenziare la produzione energetica e superare la Cina nell’IA. gli USA entrano in una corsa all’elettricità senza precedenti!
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
on Feb 16
From redhotcyber.com
Attrezzi da Hacker: Un Nuovo Cavo USB Nasconde Un Potente Strumento di Hacking con WiFi integrato
2 2
Un nuovo strumento USB che consente di hackerare terminali smartphone sta uscendo nel mercato con una potente scheda wi-fi integrata
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
on Feb 16
From healthcareinfosecurity.com
RansomHub Claims Theft of Montana Planned Parenthood Data
2 2
Planned Parenthood of Montana, which provides patients with reproductive healthcare services including birth control and abortion, is responding to a hack and a
#HIPAA #Cookies #doctors #doxxing #hacking #privacy #hospital #security #ransomhub #healthcare
on Sep 6
From securityaffairs.com
Cisco fixed a critical flaw in its IOS XE Wireless Controller
1 1
Cisco addressed a flaw in its IOS XE Wireless Controller that could enable an unauthenticated, remote attacker to upload arbitrary files.
#cisco #hacking #securityaffairs
6h ago
From gomoot.com
Il gruppo LockBit colpito da un pesante attacco informatico
1 1
Il gruppo ransomware LockBit è stato colpito a sua volta da un attacco informatico: fuga di dati che ha rivelato Bitcoin wallet e trattative con le vittime
#php #blog #news #tech #xoxo #picks #praga #defaced #hacking #lockbit
9h ago
From securityaffairs.com
U.S. CISA adds GoVision device flaws to its Known Exploited Vulnerabilities catalog
1 1
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds GoVision device flaws to its Known Exploited Vulnerabilities catalog.
#cisa #hacking #securityaffairs
11h ago
From securityaffairs.com
Polish authorities arrested 4 people behind DDoS-for-hire platforms
1 1
Polish police arrested 4 people behind DDoS-for-hire platforms used in global attacks, offering takedowns for as little as €10.
#ddos #hacking #securityaffairs
12h ago
From redhotcyber.com
L'Era dell'AI Selvaggia Sta per finire, almeno in Cina. Pechino lancia una campagna shock
1 1
La Cyberspace Administration of China lancia una campagna nazionale contro l’abuso delle tecnologie di intelligenza artificiale. Due fasi, sei categorie di violazioni e un obiettivo: fermare deepfake, fake news e contenuti pericolosi.
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
15h ago
From redhotcyber.com
Play Ransomware sfrutta 0-Day in Windows: attacco silenzioso prima della patch di aprile 2025
1 1
Il gruppo ransomware Play ha sfruttato una vulnerabilità 0-Day in Windows prima che Microsoft la correggesse. Ecco i dettagli e le vittime colpite.
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
15h ago
From cyberdaily.au
LockBit hacked: crypto addresses, chat logs, ransomware builds all compromised
1 1
The once dominant ransomware gang has become the victim of a data leak that could be a boon for researchers and law enforcement.
#hacking #ransomware #cybersecurity
17h ago
From cyberdaily.au
Exclusive: BreachForums drama continues as alleged previous admin ponders transfer of ownership
1 1
An individual claiming to be the infamous hacker ShinyHunters says old domain no longer under their control.
#hacking #cybercrime #cybersecurity
18h ago
From github.com
1 1
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest...
#ctf #news #tips #github #hacking #infosec #redteam #blueteam #software #opensource
on Wed, 8PM
From securityaffairs.com
Play ransomware affiliate leveraged zero-day to deploy malware
1 1
The Play ransomware gang exploited a high-severity Windows Common Log File System flaw in zero-day attacks to deploy malware.
#play #hacking #ransomware #securityaffairs
on Wed, 8PM
From futurism.com
Trump’s Deportation Airline Just Got Hacked by Anonymous
1 4
An Anonymous hacker has allegedly defaced GlobalX Air's website, accessed pilot software, and deleted sensitive company data.
#news #resist #hacking #anonymous #computers #deportation #madkingdonald
on Wed, 1AM
From redhotcyber.com
Buffer Overflow nel 2025? Si tratta di una vergogna! Parola di FBI e CISA
1 1
l'FBI e il CISA hanno recentemente portato l'attenzione che nel 2025 viene l'abilità di tipo buffer overflow sono inaccettabili
#ai #it #cti #news #online #hacking #privacy #cybercrime #innovation #technology
on Feb 17
From youtube.com
1 1
Bekijk je favoriete video's, luister naar de muziek die je leuk vindt, upload originele content en deel alles met vrienden, familie en anderen op YouTube.
#ai #hack #cisco #hacker #hacking #infosec #firewall #security #sponsored #ciscoliveemea
on Feb 17
From cnbc.com
These are the 50 most common four-digit PINs leaked on the dark web—make sure none of them are yours
1 1
When choosing a PIN code, you should pick a number combination that is long, random and unique, cybersecurity experts say.
#pin #hacked #darkweb #hackers #hacking #infosec #password #security #cybersecurity
on Feb 16
From kayssel.com
selfdestruct Unleashed: How to Hack Smart Contracts and Fix Them
1 1
Explore how Ethereum’s powerful selfdestruct function can be exploited to bypass deposit restrictions and drain smart contract funds. This guide breaks down a real-world attack, explains the vulnerability, and provides actionable steps to secure contracts against similar exploits.
#web3 #hacking #infosec #pentesting #cybersecurity #smartcontracts
on Feb 16
From securityaffairs.com
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 33
1 1
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
#hacking #malware #newsletter #securityaffairs
on Feb 16
From github.com
1 1
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
#c #python #hacking #redteam #edrevasion #cybersecurity #payloadhiding #steganography #malwaredevelopment #penetrationtesting
on Feb 16
From redhotcyber.com
1 1
Un attacco informatico su vasta scala ha colpito il sistema bancario iraniano ad agosto. Gli hacker hanno richiesto un riscatto milionario, e il governo è stato costretto a pagare per evitare la diffusione di dati sensibili di milioni di cittadini.
#AI #it #cti #News #online #hacking #privacy #Technology #cybercrime #innovation
on Sep 6
From redhotcyber.com
Eserciti in Azione: L'Elitè USA Hackera una Base Nemica Durante Swift Response 24
1 1
Scopri come i Berretti Verdi hanno integrato l'hacking nelle loro operazioni militari durante l'esercitazione Swift Response 24 in Svezia. Un mix di alta tecnologia e tattiche militari
#AI #it #cti #News #online #hacking #privacy #Technology #cybercrime #innovation
on Sep 6
From cyberdaily.au
The ASD’s ACSC and other security agencies warn of active Russian military hackers
1 1
According to a joint advisory released by CISA, the ASD, and 14 other agencies, Russian hackers are targeting infrastructure in the US and abroad.
#hacking #espionage #cybersecurity
on Sep 6
From redhotcyber.com
Al via la Terza Edizione del Corso Darkweb & Cyber Threat Intelligence di Red Hot Cyber (CTIP)
1 1
Scopri il corso Dark Web e Cyber Threat Intelligence di Red Hot Cyber. Al via la terza edizione in partenza per giugno.
#AI #it #cti #News #online #hacking #privacy #Technology #cybercrime #innovation
on Sep 6