Building a Self-Playing Chess Board Robot
As popular as the game of chess is, it has one massive flaw. This being that it requires two participants, which can be a challenge. Although playing chess on a computer against an AI has been a thing for many decades, it’s hard to beat physical chess boards that give you all the tactile pleasure of handling and moving pieces, yet merging the two is tricky. You can either tell the player to also move the opponent’s pieces, or use a mechanism to do so yourself, which [Joshua Stanley] recently demonstrated in a video.
There are a few ways that you can go about having the computer move and detect the pieces. Here [Joshua] chose to use Hall magnetic sensors to detect the magnets that are embedded in the 3D printed chess pieces as well as their absence. These sensors are mounted to the back side of a PCB which is also the playing field, thus using the silkscreen for the board markings.
For the electromagnet that moves the chess pieces core x/y kinematics were used to move it underneath the PCB, engaging when moving pieces but otherwise deactivated. This is all controlled by an ESP32 MCU, while the computer runs the open-source Stockfish chess engine. As the human player changes piece positions this is detected by the magnet’s presence, with the change input into Stockfish.
As the demonstration at the end of the video shows, it definitely works, yet some issues remain. Ignoring the mistake with making the near-right corners black instead of white, the pieces are large enough that e.g. moving a knight piece between others pushes them to the side, requiring these to be put back in place.
There is also no way for the computer to detect which piece is placed where, which can be incredibly helpful on some commercial self-playing chess boards like this for new players, as well as to detect invalid moves, but this might be on the list for a potential V2 of this build.
Best part of this build is probably the use of a PCB for the playing field, which would allow you to go pretty crazy with custom designs and colors, especially now that some PCB places are offering multi-color silkscreens that allow for custom graphics.
youtube.com/embed/tLgXvUgsYmw?…
The Best USB To VGA Converter For The Job
There are many adapters, dongles, and cables designed for interfacing display standards, and no doubt some of you have them in the glue of your entertainment system or work space. They’re great for standards, but what about something that’s not quite standard? [Stephen] has an arcade cabinet with a CRT that runs at an unusual 336 by 262 pixel resolution. It can be driven as 320 by 240 but doesn’t look great, and even that “standard” resolution isn’t supported by many dongles. He’s shared the story of his path to a unique USB to VGA converter which may have application far beyond this arcade machine.
We follow him on a path of discovery, through RP2040 PIOs, simple resistor ladder DACs, and home-made kernel modules, before he arrives at GUD, a USB display protocol with its own upstreamed Linux kernel driver. It’s designed to be used with a Raspberry PI deriving an LCD or HDMI display, but for his task he implemented the protocol on one of the more expensive STM32 series microcontrollers. The result after several false starts and some fiendish PCB routing is a standalone GUD-based USB-to-VGA converter that delivers perfect 34-bit colour at this unusual resolution, and also presumably others if required. It’s a worthwhile read for the many hints it gives on the subject of driving displays, even if you’re not driving an odd cabinet monitor.
securityaffairs.com/187848/unc…
#securityaffairs #hacking
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-days
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
The developer of the JokerOTP phishing kit was arrested in the Netherlands today
politie.nl/nieuws/2026/februar…
Verdachte aangehouden in cyberonderzoek
De politie hield op 10 februari een 21-jarige man uit Dordrecht aan in een cybercrime-onderzoek van Team Cybercrime Oost-Brabant. We verdenken de man ervan dat hij een systeem verspreidde waarmee eenmalige wachtwoorden onderschept konden worden.www.politie.nl
reshared this
NEW: Google sent ICE the personal financial data of a student and journalist who attented a pro-Palestinian protest in 2024.
The agency had sent Google an admininistrative subpoena, a request that companies are not mandated to respond to.
techcrunch.com/2026/02/10/goog…
Google sent personal and financial information of student journalist to ICE | TechCrunch
The tech giant handed over the personal information of a journalist and student who attended a pro-Palestinian protest in 2024.Lorenzo Franceschi-Bicchierai (TechCrunch)
reshared this
EU approves Google's acquisition of Wiz
ec.europa.eu/commission/pressc…
Commission approves Google\'s acquisition of Wiz
The European Commission has unconditionally approved, under the EU Merger Regulation, the proposed acquisition by Google of Wiz. The Commission concluded that the transaction would raise no competitioEuropean Commission - European Commission
reshared this
Is That Ancient Reel Of PLA Any Good?
When it comes to knowledge there are things you know as facts because you have experienced them yourself or had them verified by a reputable source, and there are things that you know because they are common knowledge but unverified. The former are facts, such as that a 100mm cube of water contains a litre of the stuff, while the latter are received opinions, such as the belief among Americans that British people have poor dental care. The first is a verifiable fact, while the second is subjective.
In our line there are similar received opinions, and one of them is that you shouldn’t print with old 3D printing filament because it will ruin the quality of your print. This is one I can now verify for myself, because I was recently given a part roll of blue PLA from a hackerspace, that’s over a decade old. It’s not been stored in a special environment, instead it’s survived a run of dodgy hackerspace premises with all the heat and humidity that’s normal in a slightly damp country. How will it print?
It Ain’t Stringy
In the first instance, looking at the filament, it looks like any other filament. No fading of the colour, no cracking, if I didn’t know its age it could have been opened within the last few weeks. It loads into the printer, a Prusa Mini, fine, it’s not brittle, and I’m ready to print a Benchy.
A wobbly print from our old filament.
My first surprise on printing the Benchy is that it’s a pretty good print. Received Opinion tells me that PLA is hydrophobic, and if you leave some out for a decade it will absorb so much moisture as to be unusable. In fact I was expecting a very stringy print indeed because I’ve seen that before with filament left out for about a year in the damp British climate. But this Benchy had almost no hairiness, its only flaw was a little bit of collapse along its prow line. I know the Mini isn’t at fault here as I’ve seen it print a flawless Benchy with new PLA, so that’s strike one to the ancient plastic.
Manipulating the Benchy, I found strike two. This is a reasonable print, but with not-too-hard pressure on the cabin I could snap it. The layer adhesion wasn’t as much as it is with a new-filament Benchy, and it has broken cleanly along the layer lines in the cabin pillars. Since snapping a Benchy isn’t a quantitative measure of how much the layer adhesion had degraded, I decided to formulate a test for layer adhesion. If I print something designed for measuring layer adhesion failure in both this old PLA and some new PLA, I can compare the two. It’s not perfect as I don’t have a new reel of the same formulation as the old stuff, but it’ll be close enough.
Punishing Prints, And Risking Holes In The Floor
My 3D print stress test setup
What I have come up with is a 150 mm long box section with a 2 mm wall. If I clamp the first 5 0mm to the edge of a table, I can apply a force to the far end of the 100 mm poking out into free space, and find its breaking point. To that end I’ve printed two, one in my blue old PLA, and another in brand new grey PLA. I’m dangling a collection of angle brackets each of which weighs 130 g from the end of the box section, and adding brackets until it breaks.I couldn’t even break the new filament print with a floor-damaging 3Kg piece of rail!
I had only twenty brackets, and as expected the old PLA broke first, at ten brackets, or a 1.3 kg load. My back of the envelope calculation from high school physics gives me about a 130 N force on the top edge of the layer boundary over the fulcrum on the edge of the table to do this. I ran out of brackets and other hardware to try to break the grey box section, and finally admitted defeat when it refused to break with a 3 kg piece of rail I’ve been hoarding to make an anvil dangling from its end. I have proved that layer adhesion with ancient PLA is more than three times weaker than on the same printer with new PLA. It’s interesting when examining the break, the layers have parted very cleanly, this is not tearing of the PLA but simply poor adhesion between layers.
In doing these experiments I’ve discovered, not unexpectedly, that ancient PLA isn’t as good as new PLA. I am assuming that this was as good a PLA as the modern stuff when it was new — indeed I remember printing back in the day and my prints seemed just as good as today. What does surprise me though is that how it’s deteriorated isn’t what I expected. It produces good prints in terms of their physical form, without the hairiness I was expecting. In turn I didn’t expect the prints with this stuff to be weak, so what’s going on?
When The Volatiles Depart, What’s Left?
PLA filament is not pure PLA, instead it has chemicals added to modify its properties. The most obvious one in this reel is the blue pigment, but others might modify its plasticity or melting characteristics, to name two possibilities. These are not going to be stable solids like the polymer, instead they will be volatile compounds which are capable of evaporating over time.
I’m no polymer chemist, so I’ll draw my engineer’s conclusions here and prepare for a roasting from the chemists if I’m wrong. What I think has happened is that the volatile additives in the filament have departed over the years, and both the stringiness in damp newer PLA and the strength in prints made with new PLA are as much due to their presence or absence as to the PLA itself. In my tests here I think I have seen something closer to PLA alone with the additive chemistry absent, and along the way I may have touched on why the manufacturers add it in the first place.
It’s likely few of you are printing using ancient PLA, so while interesting, these results have limited direct relevance to your printing. But I have to wonder whether there’s a lesson to be learned in filament storage, and perhaps using a warm environment to stave off moisture might hasten the departure of those volatiles. Perhaps the best thing is not to be a hoarder, and to use your filament up as quickly as you can. Meanwhile, this isn’t the first time we’ve ventured into backyard physical measurements.
ReMemory is the Amnesia-hedging Buddy Backup You Didn’t Know You Needed
What would happen if you lost your memory, even partially? With so much of our lives being digital, forgetting your passwords (or the master key to your password manager) could be disastrous. Haunted by that specter after a concussion, [eljojo] created ReMemory, a tool based on Shamir’s Secret Sharing to help your friends help you.
Shamir’s Secret Sharing, for the uninitiated, is a way to split up important data between parties so that the full picture is only available when a quorum comes together. The classic example is giving everyone a couple of digits out of the combination to the bank vault, but no one the full combination. Together, they can open the vault.
ReMemory works the same way. Rather than the combination to a bank vault, the locally-hosted, browser-based interface splits the encryption key to your sensitive data. If you’re old fashioned that might be a plaintext list of passwords, or for the more modern the recovery codes to your password manager. It could be literally anything, like your Aunt Edna’s famous cupcake recipe, which surely should not be lost to time.Aunt Edna could probably handle this.
You can chose how many friends to split your data betwixt, and how many will be required to meet quorum– the minimum, of course, being two, but the suggested default is to split the data five ways, and allow decryption from any three parties. Each bundle includes the complete recovery tool, so anyone in your circle of trust can start the process of decrypting your data if they get the others on board. Since it’s self-hosted and browser based, those friends don’t have to be particularly tech-savvy, as long as they can be trusted to hold onto the files. Everything is explained in the readme included in each bundle.
This does have the downside of requiring you to have multiple close friends, at least some of whom you trust to come through in a crunch, and all of whom you trust not to collude behind your back. Still, if you’re the social type, this seems like it might be a useful tool. The code is available under an Apache 2.0 license, so you can audit it for yourself — a must for any tool you plan on entrusting your secrets to.
The best part of the sharing algorithm is that it’s not vulnerable to quantum computing. While [eljojo] was thinking of amnesia when he put the tool together, we can’t help but think this also solves the postmortem password problem.
Gaming on an Arduino Uno Q in Linux
After Qualcomm’s purchase of Arduino it has left many wondering what market its new Uno Q board is trying to target. Taking the ongoing RAM-pocalypse as inspiration, [Bringus Studios] made a tongue-in-cheek video about using one of these SoC/MCU hybrid Arduino boards for running Linux and gaming on it. Naturally, with the lack of ARM-native Steam games, this meant using the FEX x86-to-ARM translator in addition to Steam’s Proton translation layer where no native Linux game exists, making for an excellent stress test of the SoC side of this board.Technically, this is a heatsink. (Credit: Bringus Studios, YouTube)
We covered this new ‘Arduino’ board previously, which features both a quad-core Cortex-A53 SoC and a Cortex-M33 MCU. Since it uses the Uno form factor, all SoC I/O goes via the single USB-C connector, meaning that a USB-C docking station is pretty much required to use the SoC, though there’s at least 16 GB of eMMC to install the OS on. A Debian-based OS image even comes preinstalled, which is convenient.
With a mere 2 GB of LPDDR4 it’s not the ideal board to run desktop Linux on, but if you’re persistent and patient enough it will work, and you can even play 3D video games as though it’s Qualcomm’s take on Raspberry Pi SBCs. After some intense gaming the SoC package gets really quite toasty, so adding a heatsink is probably needed if you want to peg its cores and GPU to 100% for extended periods of time.
As for dodging the RAM-pocalypse with one of these $44 boards, it’s about the same price as the 1 GB Raspberry Pi 5, but the 2 GB RPi 5 – even with the recent second price bump – is probably a better deal for this purpose. Especially since you can skip the whole docking station, but losing the eMMC is a rawer deal, and the dedicated MCU could be arguably nice for more dedicated purposes. Still, desktop performance is a hard ‘meh’ on the Uno Q, even if you’re very generous.
Despite FEX being a pain to set up, it seems to work well, which is promising for Valve’s upcoming Steam Frame VR glasses, which are incidentally Qualcomm Snapdragon-based.
youtube.com/embed/YrrqF2y-dlM?…
UNC1069 colpisce fintech e startup crypto: ecco cosa sapere
📌 Link all'articolo : redhotcyber.com/post/unc1069-c…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #socialengineering #cryptosicurezza
UNC1069 colpisce fintech e startup crypto: ecco cosa sapere
Il gruppo nordcoreano UNC1069 utilizza malware e AI per attaccare startup crypto e società di venture capital. Scopri come difendersi.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
L'intelligenza artificiale non riduce il lavoro, lo rende più estenuante
Sebbene la sensazione di avere un "partner" favorisca un senso di slancio, la realtà mostra un continuo cambio di attenzione, un controllo frequente degli output dell'IA e un numero crescente di attività aperte. Ciò crea un carico cognitivo e una sensazione di continuo destreggiarsi tra le varie attività, anche se il lavoro sembra produttivo.
simonwillison.net/2026/Feb/9/a…
AI Doesn’t Reduce Work—It Intensifies It
Aruna Ranganathan and Xingqi Maggie Ye from Berkeley Haas School of Business report initial findings in the HBR from their April to December 2025 study of 200 employees at a …Simon Willison’s Weblog
reshared this
@parapiglia quando uno se lo sente. Come direbbe Cipputi... 😁
Intelligenza Artificiale reshared this.
Una giuria ha affermato che Meta e Google hanno "progettato la dipendenza" in un processo storico negli Stati Uniti
Meta e YouTube, di proprietà di Google, sono stati accusati lunedì di aver promosso app altamente coinvolgenti sui bambini, mentre un processo storico sui social media è iniziato sul serio in un tribunale della California.
techxplore.com/news/2026-02-ju…
Jury told that Meta, Google 'engineered addiction' at landmark US trial
Meta and Google-owned YouTube were accused Monday of pushing highly addictive apps on children as a landmark social media trial began in earnest in a California court.Benjamin LEGENDRE (Tech Xplore)
reshared this
Piantedosi, Urso, il Capo della Polizia e dell’Intelligence tra gli speaker di CyberSEC2026: l’agenda
@Informatica (Italy e non Italy)
È online l’Agenda della 5^ edizione di CyberSEC, la Conferenza internazionale promossa ed organizzata da Cybersecurity Italia, il quotidiano dedicato alla cultura cyber del nostro Gruppo editoriale. L’edizione 2026
reshared this
securityaffairs.com/187820/mal…
#securityaffairs #hacking #malware
ZeroDayRAT spyware grants attackers total access to mobile devices
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS devices for spying and data theft.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Bug critico nel Semantic Kernel da 9.9 di score: i file sono a rischio. Aggiorna subito
📌 Link all'articolo : redhotcyber.com/post/bug-criti…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #microsoft #semanticKernel #sicurezzainformatica
Bug critico nel Semantic Kernel da 9.9 di score: i file sono a rischio. Aggiorna subito
Scopri la vulnerabilità critica nel Semantic Kernel di Microsoft e come proteggerti. Aggiorna subito per evitare danni ai tuoi sistemi.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
reshared this
🚀 AVVIATE LE ISCRIZIONI ALLA SETTIMA LIVE CLASS DEL CORSO "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" DI LIVELLO INTERMEDIO IN PARTENZA A MARZO (POSTI LIMITATI)
✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…
Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #formazioneonline #ethicalhacking #cti #cyberthreatintelligence #cybersecurity #cybercrime #cybersecuritytraining #cybersecuritynews #privacy #cti #cyberthreat #intelligence #infosec #corsi #corsiprartici #liveclass
Live Class Dark Web e Cyber Threat Intelligence - Red Hot Cyber
Vuoi conoscere il darkweb e disporre degli strumenti per accedervi in sicurezza, effettuare ricerche e comprendere i concetti di cyber threat intelligence (CTI)? Questo corso fa per te.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
RE: flipboard.com/@wireditalia/sci…
O era un antesignano del Go o la prima campagna di DnD in cui esordivo come Dungeon Master =D
Cybersecurity & cyberwarfare reshared this.
An Orange Cyberdefense report concludes that hacktivism has evolved from a form of digital protest into the realm of hybrid warfare
reshared this
securityaffairs.com/187811/dat…
#securityaffairs #hacking #malware
Senegal shuts National ID office after ransomware attack
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and biometric services.Pierluigi Paganini (Security Affairs)
reshared this
Google Cloud has published a report looking at all the threat actors targeting companies in the Defense Industrial Base. The report goes over the main groups from all major foreign adversaries and what their main focus has been over the past decade
cloud.google.com/blog/topics/t…
Threats to the Defense Industrial Base
The defense sector faces a relentless barrage of operations conducted by state-sponsored actors and criminal groups.Google Threat Intelligence Group (Google Cloud)
reshared this
A US judge has sentenced a Chinese national to 20 years in prison for laundering funds from Cambodian cyber scam compounds
That's the maximum sentence, btw
justice.gov/opa/pr/man-sentenc…
Man Sentenced to 20 Years in Prison for Role in $73 Million Global Cryptocurrency Investment Scam
A dual national of China and St. Kitts and Nevis was sentenced in absentia today in the Central District of California to the statutory maximum of 20 years in prison and three years of supervised release for his role in an international cryptocurrenc…www.justice.gov
reshared this
New report claims that after a close Orban ally bought Euronews, the TV network turned into a propaganda machine for autocratic regimes
reshared this
securityaffairs.com/187806/sec…
#securityaffairs #hacking
Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the data protection authority and courts.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
📣 ISCRIVITI AL WEBINAR GRATUITO DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
📅 Data Webinar: Martedì 17 Febbraio ore 18
Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
Attraverso laboratori isolati e replicabili, potrai sperimentare:
✅Ricognizione e analisi delle vulnerabilità
✅Exploitation controllata e post-exploitation in sicurezza
✅Uso professionale di strumenti come Nmap, Metasploit, BloodHound e Nessus
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
IBM Made a Sound Card? Who Knew!
Even in a field you think you know intimately, the Internet still has the power to surprise. Sound cards of the 1990s might not be everyone’s specialist subject, but since the CD-ROM business provided formative employment where this is being written, it’s safe to say that a lot of tech from that era is familiar. It’s a surprise then when along comes [DOS Storm] with a new one. The IBM Mwave was the computer giant’s offering back in the days when they were still pushing forward in the PC space, and sadly for them it turned out to be a commercial disaster.
The king of the sound cards in the ’90s was the SoundBlaster 16, which other manufacturers cloned directly. Not IBM of course, who brought their own Mwave DSP chip to the card, using it as both the sound card and the engine behind an on-board dial-up modem. This appears to have been its undoing, because aside from its notoriously flaky drivers, using both sound and modem at the same time just wasn’t a pleasant experience. To compound the problem, Big Blue resorted to trying to bury the problem with NDAs rather than releasing better drivers, so unsurprisingly it faded from view. Perhaps the reason it was unfamiliar here had something to do with it not being sold in Europe, but given that the chipset found its way into ’90s ThinkPads, we’d have expected to have seen something of it.
In the video below the break he introduces the card, and with quite some trouble gets it working. There are several demos of period games which sound a little scratchy, but we can’t judge from this whether they’d have sounded better on the Creative card. If you’d like to immerse yourself in the folly of ’90s multimedia, have a little bit of Hackaday scribe reminiscing.
youtube.com/embed/v1RmAd9iwwA?…
DK 10x21 - Rancore
Uno ci prova a restare positivo, ma poi sei costretto a constatare che gli LLM sono un cancro che sta corrodento ogni campo del sapere, e allora...
spreaker.com/episode/dk-10x21-…
securityaffairs.com/187792/apt…
#securityaffairs #hacking
China-linked APT UNC3886 targets Singapore telcos
China-linked group UNC3886 targeted Singapore ’s telecom sector in a cyber espionage campaign, Singapore’s Cyber Security Agency revealed.Pierluigi Paganini (Security Affairs)
reshared this
Safer Internet Day 2026: il vettore d’attacco nell’era dell’AI non è più il malware, ma la comunicazione
@Informatica (Italy e non Italy)
Oggi il rischio non è più Internet, ma social, messaggistica, AI generativa e Agentic AI. Tuttavia l'appello a condividere dati in modo consapevole significa proteggere noi stessi e gli altri. Ecco cosa
reshared this
Buon compleanno a Gary McKinnon che compie 60 anni: l’hacker che sfidò la NASA in cerca degli UFO!
📌 Link all'articolo : redhotcyber.com/post/hacker-fa…
#redhotcyber #news #hacker #security #nasa #ufo #extradizione #statunitensi #scozzese #cybersecurity #hacking
Hacker famosi: la storia di Gary McKinnon
Pochi mesi dopo l'attacco alle torri gemelle, uno strano messaggio apparve su un computer dell'esercito americano: "Il tuo sistema di sicurezza è una merda"!Silvia Felici (Red Hot Cyber)
Ricardo Antonio Piana likes this.
reshared this
La mente dietro le password: quando squilla il telefono. Puntata 8
📌 Link all'articolo : redhotcyber.com/post/la-mente-…
#redhotcyber #news #sicurezzainformatica #sicurezzadigital #cybersecurity #hacking #phishing #spoofing
La mente dietro le password: quando squilla il telefono. Puntata 8
Scopri come lo spoofing telefonico sfrutta le debolezze della mente umana, inducendo a rivelare informazioni sensibili con tecniche di inganno psicologico.Simone D'Agostino (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
224 - La pubblicità è impazzita: stessa audience online vale poco, in TV vale oro - Marco Camisani Calzolari
La pubblicità è impazzita: stessa audience online vale poco, in TV vale oro. Questo è un tema che riguarda chiunque guadagni dalla pubblicazione di contenuti online: per la stessa audience, l’online vale poco e in TV vale oro.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
⏳ RHC CONFERENCE 2026 – SPONSOR PROGRAM: ULTIME SETTIMANE PER ADERIRE
📍 Pagina evento: redhotcyber.com/red-hot-cyber-…
📩 Per informazioni e sponsorizzazioni: sponsor@redhotcyber.com
#redhotcyber #rhcconference #cybersecurity #informationsecurity #digitalinnovation #sponsorship #infosecurity
RHC Conference 2026
Red Hot Cyber è lieta di annunciare la prossima RHC Conference 2026. In questa pagina potete trovare tutte le informazioni relative all'evento.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
Zero-click, zero avvisi: così le estensioni di Claude prendono il controllo del tuo PC
📌 Link all'articolo : redhotcyber.com/post/zero-clic…
#redhotcyber #news #intelligenzaartificiale #sicurezzainformatica #vulnerabilit #cybersecurity #hacking #malware
Zero-click, zero avvisi: così le estensioni di Claude prendono il controllo del tuo PC
Scoperta una vulnerabilità zero-click nelle estensioni Claude Desktop che permette l'esecuzione di codice locale senza interazione utente.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Campagne zero-day e ransomware su larga scala: più attacchi ma meno riscatti
📌 Link all'articolo : redhotcyber.com/post/campagne-…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroDay #estorsione #dati
Campagne zero-day e ransomware su larga scala: più attacchi ma meno riscatti
Le campagne di estorsione di dati su larga scala stanno perdendo efficacia. Scopri come le aziende stanno cambiando atteggiamento e come i gruppi criminali stanno cambiando tattica.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Humanoid presenta KinetIQ: il sistema di controllo degli sciami robot
📌 Link all'articolo : redhotcyber.com/post/humanoid-…
#redhotcyber #news #robotica #intelligenzaartificiale #sistemidigestiorobot #kinetiq #humanoid #robot #autonomia
Humanoid presenta KinetIQ: il sistema di controllo degli sciami robot
Un sistema di controllo robotico che gestisce un'intera flotta di macchine, assegnando compiti e monitorando i risultati in ambienti industriali e domestici.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Why Haven’t Quantum Computers Factored 21 Yet?
If you are to believe the glossy marketing campaigns about ‘quantum computing’, then we are on the cusp of a computing revolution, yet back in the real world things look a lot less dire. At least if you’re worried about quantum computers (QCs) breaking every single conventional encryption algorithm in use today, because at this point they cannot even factor 21 yet without cheating.
In the article by [Craig Gidney] the basic problem is explained, which comes down to simple exponentials. Specifically the number of quantum gates required to perform factoring increases exponentially, allowing QCs to factor 15 in 2001 with a total of 21 two-qubit entangling gates. Extrapolating from the used circuit, factoring 21 would require 2,405 gates, or 115 times more.
Explained in the article is that this is due to how Shor’s algorithm works, along with the overhead of quantum error correction. Obviously this puts a bit of a damper on the concept of an imminent post-quantum cryptography world, with a recent paper by [Dennish Willsch] et al. laying out the issues that both analog QCs (e.g. D-Wave) and digital QCs will have to solve before they can effectively perform factorization. Issues such as a digital QC needing several millions of physical qubits to factor 2048-bit RSA integers.
New academic research has found that Chrome's new MV3 extension API is not that bad after all
"Ad blocker providers appear to have successfully navigated the MV3 update, finding solutions that maintain the core functionality of their extensions"
reshared this
A Working Intercom From Antique Telephones
Although it can be hard to imagine in today’s semiconductor-powered, digital world, there was electrical technology around before the widespread adoption of the transistor in the latter half of the 1900s that could do more than provide lighting. People figured out clever ways to send information around analog systems, whether that was a telegraph or a telephone. These systems are almost completely obsolete these days thanks to digital technology, leaving a large number of rotary phones and other communications systems relegated to the dustbin of history. [Attoparsec] brought a few of these old machines back to life anyway, setting up a local intercom system with technology faithful to this pre-digital era.
These phones date well before the rotary phone that some of us may be familiar with, to a time where landline phones had batteries installed in them to provide current to the analog voice circuit. A transformer isolated the DC out of the line and amplified the voice signal. A generator was included in parallel which, when operated by hand, could ring the other phones on the line. The challenge to this build was keeping everything period-appropriate, with a few compromises made for the batteries which are D-cell batteries with a recreation case. [Attoparsec] even found cloth wiring meant for guitars to keep the insides looking like they’re still 100 years old. Beyond that, a few plastic parts needed to be fabricated to make sure the circuit was working properly, but for a relatively simple machine the repairs were relatively straightforward.
The other key to getting an intercom set up in a house is exterior to the phones themselves. There needs to be some sort of wiring connecting the phones, and [Attoparsec] had a number of existing phone wiring options already available in his house. He only needed to run a few extra wires to get the phones located in his preferred spots. After everything is hooked up, the phones work just as they would have when they were new, although their actual utility is limited by the availability of things like smartphones. But, if you have enough of these antiques, you can always build your own analog phone network from the ground up to support them all.
youtube.com/embed/mkJmT9kiu30?…
Upcycling an iPad into a Touchscreen Display for your PC
Installing an RPi Pico board like it’s a modchip. (Credit: Tucker Osman, YouTube)
Although generally iPads tend to keep their resale value, there are a few exceptions, such as when you find yourself burdened with iCloud-locked devices. Instead of tossing these out as e-waste, you can still give them a new, arguably better purpose in life: an external display, with touchscreen functionality if you’re persistent enough. Basically someone like [Tucker Osman], who spent the past months on making the touchscreen functionality play nice in Windows and Linux.
While newer iPads are easy enough to upcycle as an external display as they use eDP (embedded Display Port), the touch controller relies on a number of chips that normally are initialized and controlled by the CPU. Most of the time was thus spent on reverse-engineering this whole process, though rather than a full-depth reverse-engineering, instead the initialization data stream was recorded and played back.
This thus requires that the iPad can still boot into iOS, but as demonstrated in the video it’s good enough to turn iCloud-locked e-waste into a multi-touch display. The SPI data stream that would normally go to the iPad’s SoC is instead intercepted by a Raspberry Pi Pico board which pretends to be a USB HID peripheral to the PC.
If you feel like giving it a short yourself, there’s the GitHub repository with details.
Thanks to [come2] for the tip.
youtube.com/embed/3t8xT-2vBE0?…
urbanaid
in reply to Lorenzo Franceschi-Bicchierai • • •urbanaid
in reply to Lorenzo Franceschi-Bicchierai • • •#unplugtrump
Check ➡️ @kuketzblog ⬅️
➡️ kuketz-blog.de/unplugtrump-fre… ⬅️
#UnplugTrump: Free Yourself Digitally from Trump and Big Tech
www.kuketz-blog.deObbie King
in reply to Lorenzo Franceschi-Bicchierai • • •