An Open Source Client for World of Warcraft


The media in this post is not displayed to visitors. To view it, please log in.

When World of Warcraft was launched in 2004, it became somewhat of a juggernaut in the MMORPG space. Millions of players continue to login every month. [Kelsi Davis] is one such player, but she doesn’t always log in with the regular client anymore. That’s because she put together WoWee—an open-source alternative of her very own.

WoWee is an acronym—World of Warcraft Engine Experiment. Coded in native C++, it’s a homebrewed client that uses a custom OpenGL renderer to display the game world. [Kelsi] notes that it’s strictly an “educational/research” project, built without using any official Blizzard assets, data or code. Instead, it grabs some client data from a legally-obtained install to operate and loads certain assets this way.

It’s currently compatible with the vanilla game as well as The Burning Crusade and Wrath of the Lich King expansions. It should be highlighted how much work this project has already involved—with [Kelsi] needing to recreate various functional minutae in the game, from character creation screens to weather systems and skyboxes. There’s still a lot to do, as well, like adding 3D audio support and making it more interoperable with the quest system.

It’s rare that any MMO gets an open-source client, even less so while the original game is still being actively supported by the developers. Still, we do see some creative hacks in this space.

youtube.com/embed/Pd9JuYYxu0o?…


hackaday.com/2026/02/18/an-ope…

The Raspberry Pi as a Studio Camera


The media in this post is not displayed to visitors. To view it, please log in.

The Raspberry Pi has brought digital camera experimentation within the reach of everybody, with its combination of an accessible computing platform and some almost-decent camera sensors. If there’s a flaw in the Pi as a camera though, it lies in the software, which can be slow and frustrating to use. [Martijn Braam] is here with an interesting project that might yield some useful results in this direction, he’s making a Raspberry Pi studio camera.

His camera hardware is very straightforward, a Pi 5 and touchscreen with the HD camera module in a rough but serviceable wooden box. The interesting part comes in the software, in which he’s written a low-latency GUI over an HDMI output camera application. It’s designed to plug into video mixing hardware, and one of the HDMI outputs carries the GUI while the other carries the unadulterated video. We can see this used to great effect with for example OBS Studio. It’s for now a work in progress as you can see in the video below the break, but we expect that it can only get better.

The video below exposes the obvious flaw in many Pi camera setups, that the available lenses don’t match the quality of the sensor, in that good glass ain’t cheap. But we think it’s one to watch, and could provide competition for CinePi.

youtube.com/embed/otN7aUJbgck?…


hackaday.com/2026/02/18/the-ra…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia 🚨

🏴‍☠️ gruppo #SpaceBears
🧬 Pidielle SPA Elgon Cosmetics | Nerviano (MI)
🎯 settore: cosmesi
🔗 elgoncosmetic.com
🗓️ 18 febbraio 2026

📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 8 marzo 2026 (offff, how ironic!)

#ransomNews #cybersecurity #cyberthreats

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia 🚨

🏴‍☠️ gruppo #Tengu
🧬 Fermar Group SRL | Catania
🎯 settore: logistica
🔗 femar.it
🗓️ 18 febbraio 2026

📄 sample: sì
▪️ dati esfiltrati dichiarati: 145.00GB
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 27 febbraio 2026

#ransomNews #cybersecurity #cyberthreats

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

NOVITÀ SUL MERCATO: L'Action Figure che mancava in ufficio! 🚨

#GDPR #Privacy #CyberSecurity #HumorAziendale #ActionFigure #RedHotCyber #ConsulenzaCreative #Ammiocuggino #redhotcyber #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

VS Code extensions with 125M+ installs expose users to cyberattacks
securityaffairs.com/188185/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

VS Code extensions with 125M+ installs expose users to cyberattacks
securityaffairs.com/188185/sec…
#securityaffairs #hacking

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Attacco informatico al Viminale: i dati di 5.000 agenti Digos in mano agli hacker cinesi

📌 Link all'articolo : redhotcyber.com/post/attacco-i…

#redhotcyber #news #cybersecurity #hacking #minaccesibernetica #sicurezzanazionale #hacker #dataprivacy #violazione #dati #APT #ciberattacchi

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Notepad++ rafforza la sicurezza contro gli attacchi degli hacker cattivi

📌 Link all'articolo : redhotcyber.com/post/notepad-r…

#redhotcyber #news #notepad++ #sicurezzainformatica #aggiornamentosicuro #cybersecurity #hacking #malware #ransomware #sicurezzadigital

Cybersecurity & cyberwarfare ha ricondiviso questo.

#China-linked #APT weaponized #Dell #RecoverPoint zero-day since 2024
securityaffairs.com/188176/apt…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. CISA adds #Google Chromium CSS, Microsoft #Windows, #TeamT5 ThreatSonar Anti-Ransomware, and #Zimbra flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com/188163/unc…
#securityaffairs #hacking

Data breach di Odido: quando il social engineering batte qualsiasi firewall


@Informatica (Italy e non Italy)
L’operatore telefonico Odido è rimasto vittima di un importate data breach: 6,2 milioni di clienti esposti, Salesforce come vettore, e autenticazione MFA bypassata. Un caso di violazione dati che è un manuale di social engineering che ogni CISO

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Bug critico nelle telecamere Honeywell: rischio compromissione totale. Il CISA Avverte

📌 Link all'articolo : redhotcyber.com/post/bug-criti…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #cve20261670 #sicurezzainformatica #telecamere #cctv #honeywell

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Keenadu #backdoor found preinstalled on #Android devices, powers Ad fraud campaign
securityaffairs.com/188147/mal…
#securityaffairs #hacking #malware
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🔥 WEBINAR INTRODUTTIVO AL CORSO “CYBER OFFENSIVE FUNDAMENTALS”?

La registrazione è quì: 👉 youtube.com/watch?v=z92gaV2zgN…

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Non stanno rubando solo password: ora i malware puntano direttamente agli agenti AI

📌 Link all'articolo : redhotcyber.com/post/non-stann…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #intelligenzaartificiale #sicurezzainformatica #dataprivacy

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

229 – Il nuovo muro non è a Berlino. È nelle risposte dell’Intelligenza Artificiale camisanicalzolari.it/229-il-nu…
in reply to Marco Camisani Calzolari

🤖 Tracking strings detected and removed!

🔗 Clean URL(s):
camisanicalzolari.it/229-il-nu…

❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Dell sotto attacco: uno 0-day sfruttato dagli hacker cinesi dal 2024

📌 Link all'articolo : redhotcyber.com/post/dell-sott…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #minacciestatali #operazionecinese

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Intelligenza Artificiale e lavoro: la minaccia è reale, la risposta pure (spoiler: attenzione al ritardo)

📌 Link all'articolo : redhotcyber.com/post/intellige…

#redhotcyber #news #intelligenzaartificiale #ia #tecnologia #futuro #innovazione #analisi #riflessione #urgente #avanzamento

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il CISO insonne: perché il sonno è una Patch di sicurezza per la mente

📌 Link all'articolo : redhotcyber.com/post/il-ciso-i…

#redhotcyber #news #sonnoe salute #manager #esaurimentoemotivo #qualitadelsenno #sentinelleinsonni #decisionicritiche #salutementale

Retro Rover: LT6502 Laptop Packs 8-Bit Power on the Go


The media in this post is not displayed to visitors. To view it, please log in.

6502 based laptop

Making your own laptop can be a challenging project, but a doable one, especially given the large number of options available today for computing. Of course nothing says you need to use a modern component in your build, and in the LT6502 project by [TechPaula] they didn’t go with a modern RPi or the like, nope went right back to about 50 years ago to use a 6502 at the heart of this DIY laptop build.

The 6502 is an 8-bit microprocessor from the 1970s, found in the Commodore 64 and Apple II. This wasn’t their first venture into 8 MHz world of the 6502, prior to this laptop build there was a desktop build the PC6502 bringing this chip of old into a PC/104 form factor. The LT6502 adds in the things you’d expect with a laptop, a 9-inch foldable screen, a 10,000 mAh battery, several external ports for things such as serial console and USB-C charging. A custom keyboard adds in low-profile switches as well as including a HDSP-style 8-character display, a great addition for a modern take on this vintage chip. Onboard there is 46 KB of RAM and with the addition of the CompactFlash for storage the LT6502 runs EhBASIC which we’ve seen before in some other great projects.

The case is mainly 3D-printed safely enclosing the custom PCBs for both the keyboard and motherboard, and providing a satisfying glow with the built-in LEDs within. All of the files are up on the project’s site so be sure to swing by and check out both this and the desktop PC/104 predecessor to it. Great job [TechPaula], looking forward to seeing the future installments on the LT6502 such as implementing the included internal expansion slot.


hackaday.com/2026/02/17/retro-…

Paolo Redaelli reshared this.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

SSHStalker: 16 bug per compromettere Linux. Vecchi ma ancora molto letali

📌 Link all'articolo : redhotcyber.com/post/16-bug-pe…

I #ricercatori di Flare hanno scoperto una nuova botnet #Linux, SSHStalker. Il malware si infiltra nei #dispositivi tramite attacchi brute-force SSH, quindi utilizza #sistemi compromessi per trovare nuovi obiettivi, diffondendosi efficacemente come un #worm.

Gli attacchi della #botnet prendono di mira principalmente l’infrastruttura #Oracle #Cloud. Secondo gli #esperti, l’infezione iniziale avviene tramite #scansione SSH automatizzata e attacchi brute-force.

A cura di Bajram Zeqiri

#redhotcyber #news #cybersecurity #hacking #malware #botnet #linux #sshstalker #oraclecloud #gcc #attacchibruteforce #sicurezzainformatica

Bruteforcing Accidental Antenna Designs


The media in this post is not displayed to visitors. To view it, please log in.

Antenna design is often referred to as a black art or witchcraft, even by those experienced in the space. To that end, [Janne] wondered—could years of honed skill be replaced by bruteforcing the problem with the aid of some GPUs? Iterative experiments ensued.

[Janne]’s experience in antenna design was virtually non-existent prior to starting, having a VNA on hand but no other knowledge of the craft. Formerly, this was worked around by simply copying vendor reference designs when putting antennas on PCBs. However, knowing that sometimes a need for something specific arises, they wanted a tool that could help in these regards.

The root of the project came from a research paper using an FDTD tool running on GPUs to inversely design photonic nanostructures. Since light is just another form of radio frequency energy, [Janne] realized this could be tweaked into service as an RF antenna design tool. The core simulation engine of the FDTD tool, along with its gradient solver, were hammered into working as an antenna simulator, with [Janne] using LLMs to also tack on a validation system using openEMS, an open-source electromagnetic field solver. The aim was to ensure the results had some validity to real-world physics, particularly important given [Janne] left most of the coding up to large language models. A reward function development system was then implemented to create antenna designs, rank them on fitness, and then iterate further.

The designs produced by this arcane system are… a little odd, and perhaps not what a human might have created. They also didn’t particularly impress in the performance stakes when [Janne] produced a few on real PCBs. However, they do more-or-less line up with their predicted modelled performance, which was promising. Code is on Github if you want to dive into experimenting yourself. Experienced hands may like to explore the nitty gritty details to see if the LLMs got the basics right.

We’ve featured similar “evolutionary” techniques before, including one project that aimed to develop a radio. If you’ve found ways to creatively generate functional hardware from boatloads of mathematics, be sure to let us know on the tipsline!


hackaday.com/2026/02/17/brutef…

Custom VR Headset Uses Unconventional Displays


The media in this post is not displayed to visitors. To view it, please log in.

Cathode ray tubes (CRTs) are a fascinating display technology that has been largely abandoned outside of retro gaming and a few other niche uses. They use magnets to steer a beam of electrons rapidly across a screen, and while a marvel of engineering for their time, their expense, complexity, and weight all led to them being largely replaced by other displays like LCDs and LEDs. They were also difficult to miniaturize, but there were a few companies who tried. [dooglehead] located a few of the smallest CRT displays he could find and got to work putting them in the most unlikely of situations: a virtual reality headset.

The two displays for his headset come from Sony Watchmans, compact over-the-air black-and-white handheld televisions from the late 1900s. [dooglehead] had to create a method for sending video to these units which originally had no input connections, and then also used an FPGA to split a video signal into two parts, with one for each display. The two displays are placed side by side and attached to a Google Cardboard headset, with an off-the-shelf location tracker attached at the top. An IMU tracks head rotation while this location tracker tracks the motion of the unit through 3D space.

With everything assembled and ready to go, the CRT VR headset only weighs in a few grams heavier than [dooglehead]’s modern HTC headset, although it’s lacking a case (which is sorely needed to cover up the exposed high voltage of the CRTs). He reports surprisingly good performance, with notable interlacing and focus issues. He doesn’t plan to use it to replace any of his modern VR displays anytime soon, but it was an interesting project nonetheless. There are some rumors that CRTs are experiencing a bit of a revival, so we’d advise anyone looking to toss out an old CRT to at least put it on an online market place before sending it to a landfill.

youtube.com/embed/rYPhC9lsVYs?…


hackaday.com/2026/02/17/custom…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Researchers from Amnesty International found Intellexa Predator spyware used against prominent journalist in Angola.

The Intellexa customer contacted the journalist on WhatsApp and after a few days of chatting started sending him malicious links, until he clicked one and got infected.

The spyware disappeared after reboot, but the researchers were able to still find forensic traces of it, and they linked the infection servers used here to known Intellexa infrastructure.

techcrunch.com/2026/02/17/inte…

reshared this

3D Printed Jack Mixes Two Filaments For Great Performance


The media in this post is not displayed to visitors. To view it, please log in.

If you’re looking to jack up your car and you don’t have anything on hand, your 3D printer might not be the first tool you look towards. With that said, [Alan Reiner] had great success with a simple idea to create a surprisingly capable scissor jack with a multi-material print.

The design will look familiar if you’ve ever pulled the standard jack out of the back of your car. However, this one isn’t made fully out of steel. It relies on an M6 bolt and a rivet nut, but everything else is pure plastic. In this scissor jack design, rigid PETG arms are held in a scissor jack shape with a flexible TPU outer layer. Combined with the screw mechanism, it’s capable of delivering up to 400 pounds of force without failing. It’s an impressive figure for something made out of 80 grams of plastic. The idea came about because of [Alan’s] recent build of a RatRig VCore4 printer, which has independent dual extruders. This allowed the creation of single prints with both rigid and flexible filaments included.

[Alan] did test the jack by lifting up his vehicle, which it kind of achieved. The biggest problem was the short stroke length, which meant it could only raise the back of the car by a couple inches. Printing a larger version could make it a lot more practical for actual use… if you’re willing to trust a 3D-printed device in such use.

Files are on Printables if you wish to make your own. It’s worth paying attention to the warning upfront that [Alan] provides—”THIS CAN CREATE A LOT OF FORCE (400+ lbs!), WHICH MEANS IT CAN STORE A LOT OF ENERGY THAT MIGHT BE RELEASED SUDDENLY. Please be cautious using 3d-printed objects for high loads and wear appropriate safety equipment!”

Funnily enough, we’ve featured 3D printed jacks before, all the way back in 2015! Video after the break.

youtube.com/embed/jUN-VxLh3Ro?…


hackaday.com/2026/02/17/3d-pri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Polish #cybercrime Police arrest man linked to #Phobos #ransomware operation
securityaffairs.com/188128/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il Parlamento europeo blocca l’intelligenza artificiale sui dispositivi del personale

📌 Link all'articolo : redhotcyber.com/post/il-parlam…

#redhotcyber #news #intelligenzaartificiale #riservatezzadeidati #protezionedatidigitali #sicurezzainformatica #parlamentoeuropeo #datisensibili

reshared this

LEGO Orrery Gets A Real-Time Drive Upgrade


The media in this post is not displayed to visitors. To view it, please log in.

An orrery is a beautiful type of mechanical contrivance, built to demonstrate the motion of heavenly objects. LEGO happens to offer just such a device, built using its Technic line of blocks, shafts, and gears. Only, it has a serious limitation—it has to be cranked manually to make it spin the Earth around the sun. [Görkem] set out to fix this glaring oversight with some good old-fashioned hardware.

The setup removes just five LEGO pieces from the original design, eliminating the hand crank from the mechanism. In its place, [Görkem] installed a NEMA 17 stepper motor, paired with a custom PCB mounted on the back. That carries an ESP32 microcontroller and a TMC2208 stepper motor driver set up for silent drive. Rigged up like so, the orrery can simulate the motion of the Earth and Moon around the Sun in real time. There’s also a knob to track back and forth in time, and a button to reset the system to the correct real-time position.

The final build looks great, combining the LEGO Technic parts with some chunky electronics and 7-segment displays that make it a wonderful techy desk decoration. Down the line, [Görkem] hopes to offer a plug-and-play kit to others who wish to duly animate their own LEGO orrery sets (set #42179).

We love a good LEGO build around these parts. We’ve featured everything from parts sorters to functional typewriters in the past.

youtube.com/embed/fJtKCgjGhCY?…


hackaday.com/2026/02/17/lego-o…

Running Pokémon with a Compass and Straightedge


The media in this post is not displayed to visitors. To view it, please log in.

An animated set of circles and lines are drawn on a black screen. Meanwhile, in a smaller window in the lower right corner, the boot screen of a Game Boy is displayed.

The ancient question of whether or not it’s possible to construct a circle with the same area as a given square using only a drawing compass and straightedge was finally answered in 1882, where it was proved that pi is a transcendental number, meaning it cannot be accurately represented in a compass-and-straightedge system. This inability to accurately represent pi is just one of the ways in which these systems resemble a computer, a similarity that [0x0mer] explored in CasNum.

The core of the program represents operations with a drawing compass and unmarked straightedge. There are only a few operations that can be used for calculation: constructing a line through two points, constructing a circle centered at one point and intersecting another point, and constructing the intersection(s) of two lines, a line and a circle, or two circles. An optional viewer visualizes these operations. Another class builds on top of this basic environment to perform arithmetic and logical operations, representing numbers as points in the Cartesian plane. To add two numbers, for example, it constructs the midpoint between them, then doubles the distance from the origin.

There are some examples available, including the RSA algorithm. [0x0mer] also altered a Game Boy emulator to implement the ALU instructions using compass and straightedge operations. In testing, it took about fifteen minutes to boot, and runs at a “totally almost playable” speed, near one FPS. This is after extensive caching has been applied to minimize computation time; the performance here is impressive, but in a more qualitative than quantitative sense.

Being virtual, this system is discrete, but a physical compass and straightedge form a simple analog computer capable of dealing with continuous values.


hackaday.com/2026/02/17/runnin…

The Complicated Legacy of Mind Controlled Toys


The media in this post is not displayed to visitors. To view it, please log in.

Imagine a line of affordable toys controlled by the player’s brainwaves. By interpreting biosignals picked up by the dry electroencephalogram (EEG) electrodes in an included headset, the game could infer the wearer’s level of concentration, through which it would be possible to move physical objects or interact with virtual characters. You might naturally assume such devices would be on the cutting-edge of modern technology, perhaps even a spin-off from one of the startups currently investigating brain-computer interfaces (BCIs).

But the toys in question weren’t the talk of 2025’s Consumer Electronics Show, nor 2024, or even 2020. In actual fact, the earliest model is now nearly as old as the original iPhone. Such is the fascinating story of a line of high-tech toys based on the neural sensor technology developed by a company called Neurosky, the first of which was released all the way back in 2009.

Yet despite considerable interest leading up to their release — fueled at least in part by the fact that one of the models featured Star Wars branding and gave players the illusion of Force powers — the devices failed to make any lasting impact, and have today largely fallen into obscurity. The last toy based on Neurosky’s technology was released in 2015, and disappeared from the market only a few years later.

I had all but forgotten about them myself, until I recently came across a complete Mattel Mindflex at a thrift store for $8.99. It seemed a perfect opportunity to not only examine the nearly 20 year old toy, but to take a look at the origins of the product, and find out what ultimately became of Neurosky’s EEG technology. Was the concept simply ahead of its time? In an era when most people still had flip phones, perhaps consumers simply weren’t ready for this type of BCI. Or was the real problem that the technology simply didn’t work as advertised?

Shall We Play a Game?


NeuroSky was founded in 1999 to explore commercial applications for BCIs, and as such, they identified two key areas where they thought they could improve upon hardware that was already on the market: cost, and ease of use.

Cost is an easy enough metric to understand and optimize for in this context — if you’re trying to incorporate your technology into games and consumer gadgets, cheaper is better. To reduce costs, their hardware wasn’t as sensitive or as capable as what was available in the medical and research fields, but that wasn’t necessarily a problem for the sort of applications they had in mind.

Of course, it doesn’t matter how cheap you make the hardware if manufacturers can’t figure out how to integrate it into their products, or users can’t make any sense of the information. The average person certainly wouldn’t be able to make heads or tails of the raw data coming from electroencephalography or electromyography sensors, and the engineers looking to graft BCI features into their consumer products weren’t likely to do much better.

NeuroSky engineer Horance Ko demonstrates a prototype headset in 2007.

To address this, NeuroSky’s technology presented the user with simple 0 to 100 values for more easily conceptualized parameters like concentration and anxiety based on their alpha and beta brainwaves. This made integration into consumer devices far simpler, albeit at the expense of accuracy and flexibility. The user could easily see when values were going up and down, but whether or not those values actually corresponded with a given mental state was entirely up to the interpretation being done inside the hardware.

These values were easy to work with, and with some practice, NeuroSky claimed the user could manipulate them by simply focusing their thoughts. So in theory, a home automation system could watch one of these mental parameters and switch on the lights when the value hit a certain threshold. But the NeuroSky BCI could never actually sense what the user was thinking — at best, it could potentially determine how hard an individual was concentrating on a specific thought. Although in the end, even that was debatable.

The Force Awakens


After a few attempted partnerships that never went anywhere, NeuroSky finally got Mattel interested in 2009. The result was the Mindflex, which tasked the player with maneuvering a floating ball though different openings. The height of the ball, controlled by the speed of the blower motor in the base of the unit, was controlled by the output of the NeuroSky headset. Trying to get two actionable data points out of the hardware was asking a bit much, so moving the ball left and right must be done by hand with a knob.

youtube.com/embed/er-92i_hzKw?…

But while the Mindflex was first, the better known application for NeuroSky’s hardware in the entertainment space is certainly the Star Wars Jedi Force Trainer released by Uncle Milton a few months later. Fundimentally, the game worked the same way as the Mindflex, with the user again tasked with controlling the speed of a blower motor that would raise and lower a ball.

But this time, the obstacles were gone, as was the need for a physical control. It was a simpler game in all respects. Even the ball was constrained in a clear plastic tube, rather than being held in place by the Coandă effect as in the Mindflex. In theory, this made for a less distracting experience, allowing the user to more fully focus on trying to control the height of the ball with their mental state.

But the real hook, of course, was Star Wars. Uncle Milton cleverly wrapped the whole experience around the lore from the films, putting the player in the role of a young Jedi Padawan that’s using the Force Trainer to develop their telekinetic abilities. As the player attempted to accurately control the movement of the ball, voice clips of Yoda would play to encourage them to concentrate harder and focus their minds on the task at hand. Even the ball itself was modeled after the floating “Training Remote” that Luke uses to practice his lightsaber skills in the original film.

The Force Trainer enjoyed enough commercial success that Uncle Milton produced the Force Trainer II in 2015. This version used a newer NeuroSky headset which featured Bluetooth capability, and paired it with an application running on a user-supplied Android or Apple tablet. The tablet was inserted into a base unit which was able to display “holograms” using the classic Pepper’s Ghost illusion. Rather than simply moving a ball up and down, the young Jedi in training would have to focus their thoughts to virtually lift a 3D model of an X-Wing out of the muck or knock over groups of battle droids.

youtube.com/embed/BrCeND4Ppug?…

Unfortunately, Force Trainer II didn’t end up being as successful as its predecessor, and was discontinued a few years later. Even though the core technology was the same as in 2009, the reviews I can still find online for this version of the game are scathing. It seems like most of the technical problems came from the fact that users had to connect the headset to their own device, which introduced all manner of compatibility issues. Others claimed that the game doesn’t actually read the player’s mental state at all, and that the challenges can be beaten even if you don’t wear the headset.

Headset Hacking


The headsets for both the Mindflex and the original Force Trainer use the same core hardware, and NeuroSky even released their own “developer version” of the headset not long after the games hit the market which could connect to the computer and offered a free SDK.

Over the years, there have been hacks to use the cheaper Mindflex and Force Trainer headsets in place of NeuroSky’s developer version, some of which have graced these very pages. But somehow we missed what seems to be the best source of information: How to Hack Toy EEGs. This page not only features a teardown of the Mindflex headset, but shows how it can be interfaced with the Arduino so brainwave data can be read and processed on the computer.

I haven’t gone too far down this particular rabbit hole, but I did connect the headset up to my trusty Bus Pirate 5 and could indeed see it spewing out serial data. Paired with a modern wireless microcontroller, the Mindflex could still be an interesting device for BCI experimentation all these years later. Though if you can pick up the Bluetooth Force Trainer II headset for cheap on eBay, it sounds like it would save you the trouble of having to hack it yourself.

My Mind to Your Mind


So the big question: does the Mindflex, and by extension NeuroSky’s 2009-era BCI technology, actually work?

Before writing this article, I spent the better part of an hour wearing the Mindflex headset and trying to control the LEDs on the front of the device that are supposed to indicate your focus level. I can confidently say that it’s doing something, but it’s hard to say what. I found that getting the focus indicator to drop down to zero was relatively easy (story of my life) and nearly 100% repeatable, but getting it to go in the other direction was not as consistent. Sometimes I could make the top LEDs blink on and off several times in a row, but then seconds later I would lose it and struggle to light up even half of them.

Some critics have said that the NeuroSky is really just detecting muscle movement in the face — picking up not the wearer’s focus level so much as a twitch of the eye or a furrowed brow which makes it seem like the device is responding to mental effort. For what it’s worth, the manual specifically says to try and keep your face as still as possible, and I couldn’t seem to influence the focus indicator by blinking or making different facial expressions. Although if it actually was just detecting the movement of facial muscles, that would still be a neat trick that offered plenty of potential applications.

I also think that a lot of the bad experiences people have reported with the technology is probably rooted in their own unrealistic expectations. If you tell a child that a toy can read their mind and that they can move an object just by thinking about it, they’re going to take that literally. So when they put on the headset and the game doesn’t respond to their mental image of the ball moving or the LEDs lighting up, it’s only natural they would get frustrated.

So what about the claims that the Force Trainer II could be played without even wearing the headset? If I had to guess, I would say that if there’s any fakery going on, it’s in the game itself and not the actual NeuroSky hardware. Perhaps somebody was worried the experience would be too frustrating for kids, and goosed the numbers so the game could be beaten no matter what.

As for NeuroSky, they’re still making BCI headsets and offer a free SDK for them. You can buy their MindWave Mobile 2 on Amazon right now for $130, though the reviews aren’t exactly stellar. They continue to offer a single chip EEG sensor (datasheet, PDF) that you can integrate into your projects as well, the daughterboard for which looks remarkably similar to what’s in the Mindflex headset. Despite the shaky response to the devices that have hit the market so far, it seems that NeuroSky hasn’t given up on the dream of bringing affordable brain-computer interfaces to the masses.

Cybersecurity & cyberwarfare ha ricondiviso questo.

I just published a small security fix for a rarely used API in filippo.io/edwards25519. v1.1.1 is v1.1.0 + fix, while v1.2.0 has a few other nice changes.

If you get notified about it but you don't use MultiScalarMult, consider switching to a vulnerability scanner that actually respects your attention, like govulncheck!

github.com/FiloSottile/edwards…

Cyber attacchi, l’Italia è il paese più esposto: come proteggersi nell’era della GenAI in azienda


@Informatica (Italy e non Italy)
Secondo il Global Threat Intelligence Report di Check Point Research, a gennaio 2026, l'Italia registra 2.400 cyber attacchi a settimana, in aumento a doppia cifra rispetto alla media globale. Ecco perché
L'articolo

Cybersecurity & cyberwarfare ha ricondiviso questo.

#SmartLoader hackers clone Oura MCP project to spread #StealC #malware
securityaffairs.com/188135/ai/…
#securityaffairs #hacking
in reply to informapirata ⁂

⚠️AGGIORNAMENTO: Il server che gestisce i servizi di poliverso.org e poliversity.it ha avuto un problema e i tentativi di reboot hardware non sono andati a buon fine.
È stato richiesto l'intervento dei tecnici OVH che a breve eseguiranno un controllo.
Vi informeremo a stretto giro sulle novità

@fediverso

reshared this

Come evolvono le truffe telefoniche in Italia


@Informatica (Italy e non Italy)
Sempre più impeccabili nei contenuti e sempre più mirate. Un’ondata di telefonate a cui seguono messaggi WhatsApp aiuta a comprendere il nuovo corso delle truffe telefoniche e quali strumenti usare per scongiurare il peggio
L'articolo Come evolvono le truffe telefoniche in Italia proviene da Cyber Security 360.

#Cybersecurity360 è

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Muore a 84 anni il reverendo Jesse Jackson, icona dei diritti degli afroamericani e di tutti gli oppressi

"Nostro padre era un leader al servizio della nostra famiglia, ma anche degli oppressi, dei senza voce e degli ignorati in tutto il mondo", ha affermato la famiglia Jackson in una dichiarazione martedì.

nbcnews.com/news/obituaries/re…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

La Newsletter di @programmailfuturo su #scuola e software libero - n.52 - febbraio 2026

L’informatica nella scuola, la nuova serie di Webinar di #ProgrammaIlFuturo, Software libero oggi (opportunità, sfide e tendenze 2026), #Wikipedia per la scuola, il #SaferInternetDay, l'Unione Europea e l’indipendenza digitale e il progetto italiano @ufficiozero Linux

programmailfuturo.it/comunita/…

@scuola

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I password manager cloud non sono così sicuri come credi

📌 Link all'articolo : redhotcyber.com/post/i-passwor…

I gestori di password #cloud sono stati a lungo pubblicizzati come “una cassaforte a cui nessuno tranne te può accedere”. Ma i #ricercatori del Politecnico federale di Zurigo hanno dimostrato che, nella pratica, la #sicurezza può essere molto meno elevata.

In alcuni casi, un aggressore che prende il #controllo del #server del #servizio può non solo visualizzare le password memorizzate, ma anche modificarle. Milioni di #persone utilizzano i gestori di password.

A cura di Carolina Vivianti

#redhotcyber #news #sicurezzainformatica #gestoridipassword #vulnerabilita #cybersecurity #hacking #malware #password #crittografia #datipersonali #protezionedatidipersonali #sicurezzadaticloud #cloudsecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’IA ha ucciso l’anonimato delle foto: GeoSpy può localizzarti in pochi secondi

📌 Link all'articolo : redhotcyber.com/post/geospy-la…

#redhotcyber #news #intelligenzaartificiale #fotogeolocalizzazione #geolocalizzazionefoto #analisiimmagini #architettura #morfologia #vegetazione

reshared this