Toggle light / dark theme

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison

A 44-year-old man was sentenced to seven years and four months in prison for operating an “evil twin” WiFi network to steal the data of unsuspecting travelers during flights and at various airports across Australia.

The man, an Australian national, was charged in July 2024 after Australian authorities had confiscated his equipment in April and confirmed that he was engaging in malicious activities during domestic flights and at airports in Perth, Melbourne, and Adelaide.

Specifically, the man was setting up an access point with a ‘WiFi Pineapple’ portable wireless access device and used the same name (SSID) for the rogue wireless network as the legitimate ones in airports.

GreyNoise launches free scanner to check if you’re part of a botnet

GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning operations, like botnet and residential proxy networks.

The threat monitoring firm that tracks internet-wide activity via a global sensor network says this problem has grown significantly over the past year, with many users unknowingly helping malicious online activity.

“Over the past year, residential proxy networks have exploded and have been turning home internet connections into exit points for other people’s traffic,” explains GreyNoise.

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll’s dramatic firsthand account is “a computer-age detective story, instantly fascinating [and] astonishingly gripping” (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker’s code name was “Hunter” — a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases — a one-man sting operation that finally gained the attention of the CIA…and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Laude × CSGE: Bill Joy — 50 Years of Advancements: Computing and Technology 1975–2025 (and beyond)

From the rise of numerical and symbolic computing to the future of AI, this talk traces five decades of breakthroughs and the challenges ahead.


Bill is the author of Berkeley UNIX, cofounder of Sun Microsystems, author of “Why the Future Doesn’t Need Us” (Wired 2000), ex-cleantech VC at Kleiner Perkins, investor in and unpaid advisor to Nodra. AI.

Talk Details.
50 Years of Advancements: Computing and Technology 1975–2025 (and beyond)

I came to UC Berkeley CS in 1975 as a graduate student expecting to do computer theory— Berkeley CS didn’t have a proper departmental computer, and I was tired of coding, having written a lot of numerical code for early supercomputers.

But it’s hard to make predictions, especially about the future. Berkeley soon had a Vax superminicomputer, I installed a port of UNIX and was upgrading the operating system, and the Internet and Microprocessor boom beckoned.

Shop-bought cable helps power two quantum networks

For decades, physicists have dreamed of a quantum internet: a planetary web of ultrasecure communications and super-powered computation built not from electrical signals, but from the ghostly connections between particles of light.

Now, scientists in Edinburgh say they’ve taken a major step toward turning that vision into something real.

Researchers at Heriot-Watt University have unveiled a prototype quantum network that links two smaller networks into one reconfigurable, eight-user system capable of routing and even teleporting entanglement on demand.

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

That’s not all. Since the attack plays out via the web browser, it’s also a cross-platform threat. This essentially turns any browser application on any platform that subscribes to the malicious notifications to be enlisted to the pool of clients, giving adversaries a persistent communication channel.

Matrix Push C2 is offered as a malware-as-a-service (MaaS) kit to other threat actors. It’s sold directly through crimeware channels, typically via Telegram and cybercrime forums, under a tiered subscription model: about $150 for one month, $405 for three months, $765 for six months, and $1,500 for a full year.

“Payments are accepted in cryptocurrency, and buyers communicate directly with the operator for access,” Dr. Darren Williams, founder and CEO of BlackFog, told The Hacker News. “Matrix Push was first observed at the beginning of October and has been active since then. There’s no evidence of older versions, earlier branding, or long-standing infrastructure. Everything indicates this is a newly launched kit.”

Microsoft to remove WINS support after Windows Server 2025

Microsoft has warned IT administrators to prepare for the removal of Windows Internet Name Service (WINS) from Windows Server releases starting in November 2034.

The legacy WINS computer name registration and resolution service has been deprecated with the release of Windows Server 2022 in August 2021, when Microsoft stopped active development and working on new features.

Windows Server 2025 will be the final Long-Term Servicing Channel release to come with WINS support, with the feature to be removed from future releases.

How the French philosopher Jean Baudrillard predicted today’s AI 30 years before ChatGPT

One of the most important members of this enlightened club is the philosopher Jean Baudrillard – even though his reputation over the past couple of decades has diminished to an association with a now bygone era when fellow French theorists such as Roland Barthes and Jacques Derrida reigned supreme.

In writing our new biography of Baudrillard, however, we have been reminded just how prescient his predictions about modern technology and its effects have turned out to be. Especially insightful is his understanding of digital culture and AI – presented over 30 years before the launch of ChatGPT.

Back in the 1980s, cutting-edge communication technology involved devices which seem obsolete to us now: answering machines, fax machines, and (in France) Minitel, an interactive online service that predated the internet. But Baudrillard’s genius lay in foreseeing what these relatively rudimentary devices suggested about likely future uses of technology.

/* */