Thin ‘Deep Insert’ ATM Skimmers
https://krebsonsecurity.com/2022/09/say-hello-to-crazy-thin-deep-insert-atm-skimmers/
Are you a parent of a (in your own opinion) gifted child? Then this video is for you: https://www.youtube.com/watch?v=y37BlbviL6k
"USB4 goes where no USB standard has gone before"
"Has any #RustLang developer moved to #Embedded device programming?"
https://news.ycombinator.com/item?id=32494606
this is the best one of these i've seen yet
https://twitter.com/RCAVictorCo/status/1558861458834075648
Linux 6.0 debuts, missing some Rusty bits
https://www.theregister.com/2022/08/15/linux_60_debuts_missing_some/
> We discover ÆPIC Leak, the first [...] CPU bug that leaks stale data from the microarchitecture WITHOUT using a side channel. [...] leaks stale data incorrectly returned by reading undefined APIC-register ranges.
> ÆPIC Leak is like an uninitialized memory read in the CPU itself.
What a wonderful time to be alive. https://aepicleak.com/
ImHex: A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM
Is it just me being old-fashioned? Or is this a common opinion these days?
So I was listening to an episode of Open Source Security Podcast. This is not a bad podcast, but sometimes I'm wondering what they are thinking.
So despite the name of the show, they went on and on about how terrible Linux is, and how Windows has caught up, etc, etc.
In another episode they were talking about how security issues are solved by rewriting things in Rust (I'm pretty sure the hosts are not programmers).
I'm confused. These people are supposed to be professionals but I hear far too much regurgitated nonsense.
"PlayStation 3 - lv0ldr: Teensy in the Middle"
https://github.com/MikeM64/Exploit-Writeups/blob/main/PS3/lv0ldr-spi-mitm/lv0ldr-spi-mitm.md
" Impact
With these vulnerabilities, it is possible to ship pirated games on bluray discs. That is possible even without a kernel exploit as we have JIT capabilities."
PS4/PS5: bd-j exploit chain
"Below are 5 vulnerabilities chained together that allows an attacker to gain JIT capabilities and execute arbitrary payloads."
-"When the going gets weird, the weird turn pro..."