noise cameras
tech-realism
Auterion Skynode | PX4 Guide (main)
PX4 User and Developer Guide
LexipolLeaks - Distributed Denial of Secrets
A 501(c)(3) dedicated to archiving and publishing hacked and leaked data.
America Turns to Ukraine to Build Better Drones
DARPA’s REMA Program to Add Mission Autonomy to Commercial Drones
How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons
Massive ‘Typhoon’ cyberattacks on U.S. infrastructure and telecoms sought to lay the groundwork for potential conflict with Beijing, as intruders gathered data and got in position to impede response and sow chaos.
How Suicide Drones Transformed the Front Lines in Ukraine
Outnumbered and desperate, the nation began hacking cheap consumer drones with explosives — bringing a brutal new form of violence to 21st-century warfare.
Ukraine Advances Killer Robot Drones With More Automation, Efficiency
Ukraine’s military-tech companies hone deadly drones, adding automation and efficiency to take on more functions from human pilots—but humans remain in control.
China Hacked Treasury Dept. in ‘Major Incident,’ U.S. Says
The department notified lawmakers of the breach, which it said was linked to a state-sponsored actor in China.
Exclusive | Killer Robots Are About to Fill Ukrainian Skies
Kyiv’s drone suppliers are ramping up production of computer-guided drones that are cheap to produce and can’t be electronically jammed.
Exclusive | U.S. Agency Warns Employees About Phone Use Amid Ongoing China Hack
The Consumer Financial Protection Bureau tells workers to reduce use of cellphones for work due to risk from China-linked telecom intrusion.
US Agency Warns Employees About Phone Use Amid Ongoing China Hack - Slashdot
A federal agency has issued a directive to employees to reduce the use of their phones for work matters due to China's recent hack of U.S. telecommunications infrastructure, WSJ reported on Thursday, citing people familiar with the matter. From the report: In an email to staff sent Thursday, the chi...
Millions of U.S. Cellphones Could Be Vulnerable to Chinese Government Surveillance - Slashdot
Millions of U.S. cellphone users could be vulnerable to Chinese government surveillance, warns a Washington Post columnist, "on the networks of at least three major U.S. carriers." They cite six current or former senior U.S. officials, all of whom were briefed about the attack by the U.S. intellige...
Russian Drone Jockeys Hunt Front-Line Shop Clerks and Repairmen in Ukraine - WSJ
Drone attacks in the city of Kherson have made any time outdoors, even for a grocery run or a cigarette break, potentially deadly.
What the Exploding Pager Attack Means for Air Travel
Booby-trapped pagers raise questions about whether everyday electronics could present security hurdles for air travelers. For now, travelers can expect business as usual.
Rise of the Dragons: Fire-Breathing Drones Duel in Ukraine
Drones are getting another new twist: Soldiers attach canisters to them to create weapons capable of spitting out molten metal that burns at 4,400 degrees.
U.S. Indicts 2 Linked to Oct. 7 Cyberattack on Israeli Warning System
The Justice Department has accused two Sudanese brothers of cyberattacks on U.S. infrastructure as well as preventing possibly lifesaving alerts from reaching Israelis as the Hamas attack unfolded.
Mystery Drones Swarmed a U.S. Military Base for 17 Days. The Pentagon Is Stumped.
U.S. officials don’t know who is behind the drones that have flown unhindered over sensitive national-security sites—or how to stop them.
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond – Communications of the ACM
Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack - WSJ
AT&T and Verizon are among the broadband providers breached in the “Salt Typhoon” hack, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
Fears of Weakness in Water Cybersecurity Grow After Kansas Attack
The White House plans a new push to boost cybersecurity in water sector after an aborted attempt last year.
How Sonos Botched an App and Infuriated Its Customers - Bloomberg
Ignoring “tech debt,” disregarding employee warnings and cutting costs combined to create a crisis that the high-end audio company is still struggling to recover from.
Another wave of blasts hits Lebanon, as Hezbollah reels from pager explosions
Following Tuesday's stunning attack on pagers, Lebanon was hit by another deadly wave of exploding communications devices on Wednesday.
Ware report - Wikipedia
Security Controls for Computer Systems, commonly called the Ware report,[1][2] is a 1970 text by Willis Ware that was foundational in the field of computer security.[3]
"How Certification Systems Fail: Lessons from the Ware Report"
How Navy chiefs conspired to get themselves illegal warship Wi-Fi
A scathing Navy investigation reveals how USS Manchester's enlisted leaders endangered their ship with an unauthorized Starlink Wi-Fi setup.
For the third time in a month, software glitch crashes SEPTA’s payment system
For the third time in a month, a software glitch has prevented SEPTA from collecting new fares from riders. During the morning rush, SEPTA riders were unable to add money to their Travel Wallets, buy new passes, or pay a Regional Rail conductor.
The CrowdStrike Outage and Market-Driven Brittleness - Schneier on Security
Ex-bank CEO gets 24 years after falling for crypto scam, causing bank collapse | Ars Technica
Former bank CEO ignored warnings that he was being scammed while tanking bank.
The Software Patch That Shook the World
A CrowdStrike security update rendered computers unusable, and underscored the fragility of modern global technology.
AT&T Says Phone Data of ‘Nearly All’ Customers Was Breached in 2022 (Gift Article)
More than 100 million customers’ phone records were exposed, but the breach did not include contents of calls, texts or data such as Social Security numbers and passwords.