Part film video, part face paint, and part stop-motion video – this is ghoulish and cute at the same time. Filming by Erica Luke, sound by Matthew Perryman.
Posts in October, 2012
Most hardcore geeks have been there and a few hardy souls visit it regularly. Known variously as the Deep Web, Deepnet, Invisible Web, Hidden Web, and Undernet, it is claimed to be several orders of magnitude larger than the surface web – if you can find the buried, hidden content that lies deep within. But […]
Thieves take advantage of bank software bug to steal $1 million from cash advance machines without overdrawing accounts
Citigroup software includes a mechanism intended to prevent the same “cash advance kiosk” withdrawal from being posted twice to an account. If near identical, near simultaneous transactions are submitted, the system is programmed to ignore all but one of the transactions. Thieves in California and Nevada discovered the flaw and took advantage of it.
5 Japanese Android mobile application developers arrested for embedding personal information-stealing malware in Android applications
Japanese police arrested five Android mobile application developers for creating and embedding information stealing code in mobile applications that they distributed through the Android Market Place (Play Store). It is believed that more than 10 million “pieces of information” were stolen. The developers created a video-related application which included code to silently obtain and send […]
NASA’s Curiosity rover conducts first soil sample analysis and finds the soil is volcanic and similar to soil on Hawaiian Islands
NASA’s Curiosity Mars rover conducted its first soil sample analysis using its miniaturized X-Ray diffraction instrument that is a part of CheMin instrument (a miniature lab on wheels). The soil sample was collected from an area known as Rocknest in the Gale Crater. The analysis revealed that the sample is a weathered volcanic type similar […]
Unique home built inside an abandoned nuclear missile silo in Abilene, Texas gives owner some piece and quiet
Wired Magazine ran a cool piece on a guy, Bruce Townsley, that bought an abandoned missile silo and built a home in it. He purchased the 2,2000 square foot Atlas F silo in 1997 at a price of $99,000. It’s located in Abilene, Texas and from above, looks like an empty lot with a flag […]
Georgia silently takes over Russian hacker’s computer – uses his webcam to secretly take video footage of him at work
In a report titled “Cyber Espionage against Georgian Government”, the Georgian CERT (Computer Emergency Response Team) claims it has linked an attack on its systems to Russia’s security services. The report describes how Georgia’s CERT purposely infected one of their own machines with malware, a ZIP file named “Georgian-NATO agreement”. The hacker took the bait […]
Wonderful Dogxter parody video shows what the intro to Dexter would be if the serial killer were a dog
This will easily be your favorite video of the day. Dogxter, a parody of Dexter’s Morning Routine, takes an up-close-and-personal look a dog’s breakfast routine. The Pet Collective star “Jazzy” plays Michael C. Hall / Dexter, and really sinks her teeth into the role. Don’t worry folks, she didn’t actually eat all that food, though […]
Huffington Post and its tilted censorship policies – they apparently censor content critical of their advertisers
It appears as if Huffington Post moderates their user comments to suit their advertisers, a bit shocking and not something you’d expect from a liberal publication like Huffington Post. Arianna Huffington herself stated that Huffington Post’s goal was to “go beyond the traditional liberal/left and conservative/right divide in American politics and news media” but this […]
There’s a thief in the building – ideas Apple has “stolen” from other companies throughout the years
Apple often gets credit for its ingenuity. Others argue that marketing has driven its success. Beast Master recently published an infographic documenting the history of several Apple “innovations” – you may be surprised to learn that most of Apple’s “ideas” originated outside the company. Here are some quick bulleted facts regarding those origins.
Yes, after the last few days of Countdown to Halloween posts, we finish off with one last Halloween treat. Here’s a collection of pictures that’ll knock your socks off. Our apologies if you had planned on sleeping tonight.
Reminder – for Hurricane Sandy victims, here are two relief organizations that allow for easy donations via text message
As our northeastern citizens dig themselves out from under the wrath of Hurricane Sandy, remember that there are several relief organizations that allow for quick donations through quick and easy (and free) text messages. America Red Cross and the Salvation Army are two that come to mind. You simply text the number and the charge […]
We are Legion: the Story of the Hacktivists, takes you inside the complex counter-culture and history of the collective hacker group known as Anonymous. It is available now on iTunes and the We are Legion website for $9.99 using a credit card or your Amazon account. Don’t expect to pay using PayPal though. In typical […]
If you’re looking for Hurricane Sandy updates, don’t count on Huffington Post of BuzzFeed to fuel your information needs – they were knocked offline by Hurricane Sandy. BuzzFeed noted: “The Tumblr quotes a DataGram rep as saying “Basement flooded, fuel pump off line – we got people working on it now. 5 feet of water […]
Intel has prototyped a 48-core CPU chip for smartphones that could revolutionize computing as we know it
Computerworld is reporting that Intel is working on a 48-core processor for smartphones and tablets. They have a working prototype and expect the revolutionary CPU to hit the market in 5-10 years. “If we’re going to have this technology in five to 10 years, we could finally do things that take way too much processing […]
The FBI has announced that they have put in place an initiative to uncover and investigate web-based intrusion attacks using a crew of specially trained computer scientists who are able to extract hackers’ digital signatures from the mountains of malicious code they have released on the world. The Next Generation Cyber Initiative’s key aim is […]