The jumbo flying squid (Dosidicus gigas) uses its color-changing ability as a language:
In 2020, however, marine biologists discovered that jumbo flying squid are surprisingly coordinated. Despite their large...
Read more
The jumbo flying squid (Dosidicus gigas) uses its color-changing ability as a language:
In 2020, however, marine biologists discovered that jumbo flying squid are surprisingly coordinated. Despite their large...
Read more
The USB Rubber Ducky is getting better and better.
Already, previous versions of the Rubber Ducky could carry out attacks like creating a fake Windows pop-up box to...
Read more
This vulnerability was reported to Zoom last December:
The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order...
Read more
This is more of a demonstration than a real-world vulnerability, but researchers can use electromagnetic interference to remotely control touchscreens.
From a news article:
It’s important to note that...
Read more
Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught.
No one knows how common this scam...
Read moreI think the U is forced: SQUID consists of five steps: Stop, Question, Understand, Imagine, and Decide. As usual, you can also use this squid post to talk about the security...
Read moreTwitter accidentally exposed the personal information—including phone numbers and email addresses—for 5.4 million accounts. And someone was trying to sell this information.
In January 2022, we received a report...
Read more
My personal definition of a brilliant idea is one that is immediately obvious once it’s explained, but no one has thought of it before. I can’t believe that no...
Read moreThis is the first—of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices.
Read more
Recent Comments