September, 2018

now browsing by month


Hackers Stole Customer Credit Cards in Newegg Data Breach

Newegg is clearing up its website after a month-long data breach. TechCrunch: Hackers injected 15 lines of card skimming code on the online retailer’s payments page which remained for more than a month between August 14 and September 18, Yonathan Klijnsma, a threat researcher at RiskIQ, told TechCrunch. The code siphoned off credit card data from unsuspecting customers to a server controlled by the hackers with a similar domain name — likely to avoid detection. The server even used an HTTPS certificate to blend in. The code also worked for both desktop and mobile customers — though it’s unclear if mobile customers are affected. The online electronics retailer removed the code on Tuesday after it was contacted by incident response firm Volexity, which first discovered the card skimming malware and reported its findings. Newegg is one of the largest retailers in the US, making $2.65 billion in revenue in 2016. The company touts more than 45 million monthly unique visitors, but it’s not known precisely how many customers completed transactions during the period.

Share on Google+

of this story at Slashdot.

…read more

Source:: Slashdot

Braille on a Tablet Computer

Signing up for college classes can be intimidating, from tuition, textbook requirements, to finding an engaging professor. Imagine signing up online, but you cannot use your monitor. We wager that roughly ninety-nine percent of the hackers reading this article have it displayed on a tablet, phone, or computer monitor. Conversely, “Only one percent of published books is available in Braille,” according to [Kristina Tsvetanova] who has created a hybrid tablet computer with a Braille display next to a touch-screen tablet running Android. The tablet accepts voice commands for launching apps, a feature baked right into Android. The idea came to her after helping a blind classmate sign up for classes.

Details on the mechanism are not clear, but they are calling it smart liquid, so it may be safe to assume hydraulic valves control the raised dots, which they call “tixels”. A rendering of the tablet can be seen below the break. The ability to create a full page of braille cells suggest they have made the technology pretty compact. We have seen Braille written on PCBs, a refreshable display based on vibrator motors, and a nicely sized Braille keyboard that can fit on the back of a mobile phone.

…read more

Source:: Hackaday

National Museum of Computing to hold live Enigma code-breaking demo with a Bombe

Turing-Welchman machine to do its thing – with original wartime operator present

The National Museum of Computing (TNMOC) is going to fire up its replica Enigma code-breaker to decrypt encoded messages sent from Poland – with an original wartime Bombe operator supervising the process.…

…read more

Source:: Register

FBI: Phishing Attacks Aim to Swap Payroll Information

Social engineering scams target employees’ payroll credentials so attackers can access and change their bank account data. …read more

Source:: DarkReading

Fortnite star Ninja is first gamer to land ESPN cover – CNET

The gaming-focused issue will hit newsstands later this month. …read more

Source:: CNet

Learn To Loop The Python Way: Iterators And Generators Explained

If you’ve ever written any Python at all, the chances are you’ve used iterators without even realising it. Writing your own and using them in your programs can provide significant performance improvements, particularly when handling large datasets or running in an environment with limited resources. They can also make your code more elegant and give you “Pythonic” bragging rights.

Here we’ll walk through the details and show you how to roll your own, illustrating along the way just why they’re useful.

You’re probably familiar with looping over objects in Python using English-style syntax like this:

people = [['Sam', 19], ['Laura', 34], ['Jona', 23]]
for name, age in people:

info_file = open('info.txt')
for line in info_file:

hundred_squares = [x**2 for x in range(100)]

", ".join(["Punctuated", "by", "commas"])

These kind of statements are possible due to the magic of iterators. To explain the benefits of being able to write your own iterators, we first need to dive into some details and de-mystify what’s actually going on.

Iterators and Iterables

Iterators and iterables are two different concepts. The definitions seem finickity, but they’re well worth understanding as they will make everything else much easier, particularly when we get to the fun of generators. Stay with us!


An iterator is an object which represents a stream of data. More precisely, an object that has a __next__ method. When you use a for-loop, list comprehension or anything else that iterates over an object, in the background the __next__ method is being called on an iterator.

Ok, so let’s make an example. All we have to do is create a class which implements __next__. Our iterator will just spit out multiples of a specified number.

class Multiple:
    def __init__(self, number):
        self.number = number
        self.counter = 0

    def __next__(self):
        self.counter += 1
        return self.number * self.counter

if __name__ == '__main__':
    m = Multiple(463)

When this code is run, it produces the following output:

$ python

Let’s take a look at what’s going on. We made our own class and defined a __next__ method, which returns a new iteration every time it’s called. An iterator always has to keep a record of where it is in the sequence, which we do using self.counter. Instead of calling the object’s __next__ method, we called next on the object. This is the recommended way of doing things since it’s nicer to read as well as being more flexible.

Cool. But if we try to use this in a for-loop instead of calling next manually, we’ll discover something’s amiss.

if __name__ == '__main__':
    for number in Multiple(463):
$ python
Traceback (most recent call last):
File "", line 11, in <module>
for number in Multiple(463):
TypeError: 'Multiple' object more

Source:: Hackaday

A Hybrid Solution to Taming SOC Alert Overload

Technology can free analysts from the burden of manual and tedious tasks so they can operate at the highest level of their abilities. …read more

Source:: Threatpost

8 Keys to a Successful Penetration Test

Pen tests are expensive, but there are key factors that can make them worth the investment. …read more

Source:: DarkReading

XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins

A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining. …read more

Source:: Threatpost

NASA names its first female chief flight director – CNET

Holly Ridings will lead the group directing human spaceflight operations. …read more

Source:: CNet

© 2018: | Easy Theme by: D5 Creation | Powered by: WordPress