English
-
Apple and Chrome Zero-Days Exploited to Hack Egyptian ex-MP with Predator Spyware
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a...
-
Decker Is The Cozy Retro Creative Engine You Didn’t Know You Needed
[John Earnest]’s passion project Decker is creative software with a classic MacOS look (it’s not limited to running on Macs, however) for...
-
Bending Light to Fit Technology
Solar power is an excellent way of generating electricity, whether that’s for an off-grid home or for the power grid. With no moving parts...
-
DIY Repair Brings an X-Ray Microscope Back Into Focus
Aside from idle curiosity, very few of us need to see inside chips and components to diagnose a circuit. But reverse engineering is another...
-
That’s not a Junker… That’s My Generator
If you live somewhere prone to power outages, you might have thought about buying a generator. The problem is that small generators are cheap...
-
TikTok API Rules Stymie Analysis of US User Data, Academics Say
Terms of service for API access give TikTok publication review over findings and limit access to critical data on the platform's impact on US...
-
Youth hacking ring at the center of cybercrime spree
SCOTTSDALE, Ariz. — Over the past two years, a string of prominent cybersecurity breaches all have one thing in common: the involvement of a...
-
RP2040 Emulator Brings the Voice of the 80s Back to Life
You may not have heard, but there’s a chip shortage out there. And it’s not just the fancy new chips that are in short supply; the chips that...
-
Hackers Let Loose on Voting Gear Ahead of US Election Season
Ethical hackers were given voluntary access to digital scanners, ballot markers, and electronic pollbooks, all in the name of making the voting...
-
Ham Radio Mini Beam
Years ago, ham radio operators more often than not had land, and usually there weren’t any restrictions on what kind of antenna they could...
-
Akira Ransomware Mutates to Target Linux Systems, Adds TTPs
The newly emerged ransomware actively targets both Windows and Linux systems with a double-extortion approach.
-
Hackaday Podcast 237: Dancing Raisins, Coding on Apples, and a Salad Spinner Mouse
This week, Editor-in-Chief Elliot Williams and Kristina Panos gathered over the Internet and a couple cups of coffee to bring you the best...
-
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII
The league is working with more than 100 partners to workshop responses to a host of hypothetical cyberattacks on the upcoming Big Game in Las Vegas.