Security researchers discovered that the EU's new age-verification app can be hacked in just two minutes using simple methods. The app, designed to verify users' ages online, contains vulnerabilities that allow easy bypass of its security measures. This raises concerns about the effectiveness of the system for protecting minors.
#hacking
13 items
The Mythos blockchain project was reportedly hacked on the same day it was announced. The incident raises security concerns for the newly launched platform.
A member of the Scattered Spider cybercrime group known as 'Tylerb' has pleaded guilty to charges related to computer intrusions and extortion. The individual admitted to participating in attacks against multiple organizations, including a major casino and hotel chain.
The EU's age verification system was hacked in just two minutes by security researchers who discovered vulnerabilities. The researchers demonstrated how they could bypass the system and access adult content without proper verification. The incident highlights security flaws in the digital identity verification framework.
A security researcher discovered vulnerabilities in Google's random number generator that allowed predicting future random values. The flaws were reported to Google and subsequently fixed, demonstrating the importance of robust cryptographic implementations.
The Brussels government launched an age verification app that hackers reportedly broke within two minutes. The app was designed to check users' ages for accessing certain services. Security vulnerabilities were quickly exposed by cybersecurity researchers.
The article presents a hacker's perspective on cryptocurrency, arguing that it offers financial freedom and privacy benefits. It discusses how crypto aligns with hacker ethics of decentralization and resistance to centralized control.
The article describes how to hot-wire a Lisp Machine by bypassing the front panel to directly connect to the CPU bus. This allows for low-level debugging and hardware access when the machine is otherwise unresponsive.
A GitHub repository demonstrates how to use Flipper Zero devices to edit store price tags. The project shows the technical process for modifying electronic shelf label displays.
A developer repurposed a Chinese IoT camera to create an owl livestream by modifying its firmware and software. The project involved reverse-engineering the camera's communication protocols and setting up custom streaming infrastructure. This allowed for continuous monitoring of an owl's nesting activities.
An Iran-linked hacktivist group claims responsibility for a data-wiping attack on medical technology company Stryker. The company sent home over 5,000 workers in Ireland and is experiencing a building emergency at its U.S. headquarters.
Redis creator antirez introduced LOLWUT, a new command that generates computer art inspired by Georg Nees' Schotter. The command uses Braille Unicode characters to create pixel art in terminal interfaces and will change with each major Redis version. LOLWUT serves as a reminder that programming originated from exploration, not just utility.
The essay presents a hacker's perspective on understanding and manipulating the universe's fundamental principles. It explores how unconventional thinking can reveal hidden possibilities in technology and physics. The piece encourages readers to approach complex systems with creative problem-solving techniques.