Hottest (and coolest) San Diego ComicCon 2014 cosplay action

// November 17th, 2014 // No Comments » // Cosplay Girls
Hot cosplay from Comic-Con 2014 (San Diego)

The San Diego Comic-Con is legendary – as is the cosplay action that top cosplayers from around the country bring to the event each year. 2014 was no exception with hundreds of cosplayers attending the July 24-24, 2014 show. Check out the hottest cosplay action in this sexy pictorial.

Oldest known photograph of a human being dates back to 1838

// November 9th, 2014 // No Comments » // Technology
Oldest known photograph of a human being dates back to 1838

The black and white photograph depicting an early 19th century scene was taken by Louis Daguerre in 1838 on the streets of Paris, France. With a seven minute exposure time, two stationary humans were captured on camera, making it the oldest known photograph containing actual images of people. Oddly, there were likely many other people […]

Silk Road 2.0 bites the dust – does the U.S. government have a foothold in Tor?

// November 6th, 2014 // No Comments » // Hacking and Security
Silk Road - the anonymous market

A year after the infamous Deep Web site, Silk Road, was shuttered by federal law enforcement, Silk Road 2.0 (a nearly identical dark web site which opened a month after Silk Road shut down) has suffered the same fate. Officials announced yesterday that they have arrested Blake Benthall (aka Defcon) in connection with the ownership […]

Music artists’ (e.g. Taylor Swift) power moves over streaming services leaves consumers in uncomfortable three-way

// November 3rd, 2014 // No Comments » // Moves, TV, and Music News
Come on Taylor Swift - loose the attitude

I can’t think of a more uncomfortable three-way than the contradictory relationship between music artists, streaming services, and the music listeners who pay everyone’s bills. Between streaming services trying in vain to keep costs down, listeners trembling at the thought of increasing prices, and the music industry’s million-dollar music artists dreaming that the value their […]

Rough start for Apple Pay alternative – CurrentC mobile payment data systems hacked today

// October 29th, 2014 // No Comments » // Hacking and Security
CurrentC - mobile payment system alternative to Apple Pay

MCX’s CurrentC payment system, the alternative to Apple Pay backed by Walmart, Best Buy, CVS, Rite Aid, Gap, and others, was hacked today. Reports indicate the data breach involves the theft of email addresses of early beta participants and others who expressed interest in testing the new mobile payment system. No word yet on how […]

List of comic book characters (superheroes and villains) and their real names and true identities

// October 21st, 2014 // No Comments » // Comic Books
Comic book superheroes and their true identities

Practically every comic book character has an alternate identity. Many have more than one. Here’s a list of well-known comic book characters, both superheroes and villains, and their real-life identities.

New Jersey school teachers snaps most terrifying great white shark photo ever!

// October 11th, 2014 // No Comments » // General Science News
Terrifying photo of a great white shark

National Geographic reported this unbelievably terrifying photo of a Great White Shark lunging for bait dangling from shark cage. The photo was taken by 26-year-old Amanda Brewer who acts as a courageous cage diver by night and a, wait for it… New Jersey school teacher by day! She took the photo of the female great […]

JPMorgan Chase security breach not what you think – military attack against key financial institutions turns over keys to the kingdom

// October 4th, 2014 // No Comments » // Hacking and Security
Estonian military hackers?

Although I’m disappointed that JPMorgan Chase delayed the disclosure of the breach that touched more than 83 million U.S. households (they knew about it at least four months ago), I’m even more upset at what they disclosed – that key customer financial data was not stolen. JPMorgan may tout the expertise of their security team […]

Rare cross-platform malware targets iOS and Android devices of Hong Kong protestors

// October 1st, 2014 // No Comments » // Hacking and Security
xsser.com anonymous domain registration

An Israeli security firm has discovered evidence of a cross-platform (iOS and Android) malware attack targeting the Operation Central (Umbrella Revolution) protestors in Hong Kong. The spyware, Xsser mRAT (or Xsser.0day), exposes information on the devices such as SMS and email messages, instant messages (e.g. Tencent Archive), GPS location data, phone call logs, contact information, […]

Spike DDoS toolkit details – frightening new DDoS botnet could potentially utilize Linux, Windows, and ARM IoT devices

// September 26th, 2014 // No Comments » // Hacking and Security
Partial disassembly of Spike DDoS toolkit code shows interesting hardcoded strings

Security researchers have discovered an unusual, and frightening, new toolkit capable of infecting not only Windows and Linux computers, but also routers and IoTs. Dubbed Spike, it has demonstrated DDoS attacks as high as 215 gigabit/second against targets in Asia and the United States. Spike toolkit interfaces discovered by Akamai used Mandarin and thus, it […]

Shellshock (Bash bug) vulnerability – critical security vulnerability discovered in Bash (Bourne-Again Shell)

// September 25th, 2014 // No Comments » // Hacking and Security
Example of the Shellshock (bash bug) bash security vulnerability

If your Linux/Unix (or Apple Mac OS X) applications are running with root permissions and call on the shell, this vulnerability (called “Bash Bug” or “$hellshock”) is huge as it allows an attacker to remotely execute shell commands by attaching malicious code into environment variables used by the OS. The flaw is present in GNU […]

Will Samsung Galaxy Note 4/Gear VR become bigger than the Internet? [UPDATED]

// September 21st, 2014 // No Comments » // Futuristic Technology
Samsung Galaxy Note 4 paired with Gear VR virtual reality technology

The new Galaxy Note 4 is a nice upgrade from your Galaxy Note 3. The new sensors (heart rate sensor, fingerprint scanner, UV sensor) are cool and might prompt some interesting new apps. The CPU is a tad bit faster and the 16MB camera is a step up from the Note 3. But what really […]

New law will grant FBI authority to crack your Tor/VPN connection – it’s time to up your game

// September 19th, 2014 // No Comments » // Hacking and Security
No Tor

If a recent DOJ proposal to amend Rule 41 of the Federal Rules of Criminal Procedure passes, granting the FBI the legal right to crack your Tor or VPN connection, you might have to be even more cautious – to the point of keeping up with file checksum/hashes to determine if you’ve been compromised, routinely […]

Does anyone remember Barrett Brown?

// September 18th, 2014 // No Comments » // Hacking and Security
You can

I’ve written about Mr. Brown several times before. Barrett Brown is the guy that the government tagged as the “voice of Anonymous”, the young man that suffered a tragedy of injustice from charges that most feel were laughable at best and fragrantly unjust and illegal at worst. Lest we forget (and history repeat itself), let’s […]

Ten more cool street art murals that provide a unique take on their surroundings

// September 18th, 2014 // No Comments » // Entertainment
Cool street art

Check out ten more cool street art murals that create an interesting, and unique, take on their environment. The art featured here use various methods – stencil graffiti, wheatpasted poster art or sticker art – to add a bit of flare to their otherwise mundane surroundings.


View site map | View more news | View more feature articles

My videos. Featured videos.