This is an unbelievably cool application for the Raspberry PI: Emulate a 68040 that is super powerful compared to what was available in the eighties, and connect it to a Commodore Amiga. Throw in USB bridge, SCSI, etc.
-RESPECT-
I would have done a few things differently though :)
Update: It's fake: https://www.buzzfeednews.com/article/briannasacks/glitter-bomb-package-thief-video-not-entirely-real
Cool visualization of largest known breaches since 2004.
Black-hat hackers pull off some incredibly clever stuff. This one is specially cool. But the weakness of credit card security surely doesn't help.
Nice explanation of one of the most common hacking techniques.
This goes to show how vulnerable we are to a hack by a dedicated attacker.
Computer security is hard to do. Just look at what a disaster it was for MS in the pre-Win7 era, and they are a software company! You cannot just add security to a system as an afterthought, it needs to be something that permeates the design. The problem is that it is hard and time consuming (though expensive) to do right, and it doesn't get reflected in the bottom line until disaster strikes. Then it's too late.
Hacking a large corporation is easier than most people think. The weakest link tend to be the non-technical humans.
It's like stuff out of a movie.
Waterloo labs automates paintball guns. What could go wrong?
Best. Hack. Ever.
Excellent, detailed, slightly technical, highly scary article on password hacking.
Interesting read. Hacking groups are becoming more and more prominent as political activists.
With all the recen high profile hacking going on, I'm seriously thinking about recreating all my passwords somewhat they are unique and unguessable.
Anonymous vs the State of Israel. Odd.
Charile Miller, the guy who discovered the SMS exploit for the iPhone is interviewed. Lots of details on how the hack works and how it was found.