The San Diego Comic-Con is legendary – as is the cosplay action that top cosplayers from around the country bring to the event each year. 2014 was no exception with hundreds of cosplayers attending the July 24-24, 2014 show. Check out the hottest cosplay action in this sexy pictorial.
The black and white photograph depicting an early 19th century scene was taken by Louis Daguerre in 1838 on the streets of Paris, France. With a seven minute exposure time, two stationary humans were captured on camera, making it the oldest known photograph containing actual images of people. Oddly, there were likely many other people […]
A year after the infamous Deep Web site, Silk Road, was shuttered by federal law enforcement, Silk Road 2.0 (a nearly identical dark web site which opened a month after Silk Road shut down) has suffered the same fate. Officials announced yesterday that they have arrested Blake Benthall (aka Defcon) in connection with the ownership […]
Music artists’ (e.g. Taylor Swift) power moves over streaming services leaves consumers in uncomfortable three-way// November 3rd, 2014 // No Comments » // Moves, TV, and Music News
I can’t think of a more uncomfortable three-way than the contradictory relationship between music artists, streaming services, and the music listeners who pay everyone’s bills. Between streaming services trying in vain to keep costs down, listeners trembling at the thought of increasing prices, and the music industry’s million-dollar music artists dreaming that the value their […]
MCX’s CurrentC payment system, the alternative to Apple Pay backed by Walmart, Best Buy, CVS, Rite Aid, Gap, and others, was hacked today. Reports indicate the data breach involves the theft of email addresses of early beta participants and others who expressed interest in testing the new mobile payment system. No word yet on how […]
Practically every comic book character has an alternate identity. Many have more than one. Here’s a list of well-known comic book characters, both superheroes and villains, and their real-life identities.
National Geographic reported this unbelievably terrifying photo of a Great White Shark lunging for bait dangling from shark cage. The photo was taken by 26-year-old Amanda Brewer who acts as a courageous cage diver by night and a, wait for it… New Jersey school teacher by day! She took the photo of the female great […]
JPMorgan Chase security breach not what you think – military attack against key financial institutions turns over keys to the kingdom// October 4th, 2014 // No Comments » // Hacking and Security
Although I’m disappointed that JPMorgan Chase delayed the disclosure of the breach that touched more than 83 million U.S. households (they knew about it at least four months ago), I’m even more upset at what they disclosed – that key customer financial data was not stolen. JPMorgan may tout the expertise of their security team […]
An Israeli security firm has discovered evidence of a cross-platform (iOS and Android) malware attack targeting the Operation Central (Umbrella Revolution) protestors in Hong Kong. The spyware, Xsser mRAT (or Xsser.0day), exposes information on the devices such as SMS and email messages, instant messages (e.g. Tencent Archive), GPS location data, phone call logs, contact information, […]
Spike DDoS toolkit details – frightening new DDoS botnet could potentially utilize Linux, Windows, and ARM IoT devices// September 26th, 2014 // No Comments » // Hacking and Security
Security researchers have discovered an unusual, and frightening, new toolkit capable of infecting not only Windows and Linux computers, but also routers and IoTs. Dubbed Spike, it has demonstrated DDoS attacks as high as 215 gigabit/second against targets in Asia and the United States. Spike toolkit interfaces discovered by Akamai used Mandarin and thus, it […]
Shellshock (Bash bug) vulnerability – critical security vulnerability discovered in Bash (Bourne-Again Shell)// September 25th, 2014 // No Comments » // Hacking and Security
If your Linux/Unix (or Apple Mac OS X) applications are running with root permissions and call on the shell, this vulnerability (called “Bash Bug” or “$hellshock”) is huge as it allows an attacker to remotely execute shell commands by attaching malicious code into environment variables used by the OS. The flaw is present in GNU […]
The new Galaxy Note 4 is a nice upgrade from your Galaxy Note 3. The new sensors (heart rate sensor, fingerprint scanner, UV sensor) are cool and might prompt some interesting new apps. The CPU is a tad bit faster and the 16MB camera is a step up from the Note 3. But what really […]
If a recent DOJ proposal to amend Rule 41 of the Federal Rules of Criminal Procedure passes, granting the FBI the legal right to crack your Tor or VPN connection, you might have to be even more cautious – to the point of keeping up with file checksum/hashes to determine if you’ve been compromised, routinely […]
I’ve written about Mr. Brown several times before. Barrett Brown is the guy that the government tagged as the “voice of Anonymous”, the young man that suffered a tragedy of injustice from charges that most feel were laughable at best and fragrantly unjust and illegal at worst. Lest we forget (and history repeat itself), let’s […]
Check out ten more cool street art murals that create an interesting, and unique, take on their environment. The art featured here use various methods – stencil graffiti, wheatpasted poster art or sticker art – to add a bit of flare to their otherwise mundane surroundings.