How to grow an arm
Using tiny electrical currents to go from stump to fully functioning appendage. Read on.The Architecture of Evil: Dystopian Megacorps in Speculative Fiction Films
The evil corporation has always held a special place in film. From Blade Runner's Tyrell Corporation to Robocop's Omni Consumer Products and beyond, dystopian capitalism is a staple of many films' most successful antagonists.Field of Vision - Relatively Free
Journalist and activist Barrett Brown is released from prison after four years. On his drive across Texas to a halfway house, he discusses his extraordinary case and considers what the future now holds for him and other radical journalists. See more from ...Blade Runner 2049 Official Trailer
What do you think about the Trailer?Artist turns Black Mirror' episodes into classic comic book covers
The British science fiction series Black Mirror was a cult hit for years until Netflix picked it up this year in the U.S. and the series went mainstream. Now an artist has taken some of the most talked about episodes and turned them into brilliant old sch...Virtual Revolution - Official Trailer
My Yahoo Account Was Hacked! Now What?
krebsonsecurity.comhttps://krebsonsecurity.com/2016/12/my-yahoo-account-was-hacked-now-what/Critical flaw opens Netgear routers to hijacking
The vulnerability allows execution of Linux commands by simply appending the command to a URL. Following models are affected: NetGear AC1750-Smart WiFi Router (Model R6400) NetGear AC1900-Nighthawk Smart WiFi Router (Model R7000) NetGear AC230...I Work Alone, by Alonewolf
soundcloud.comOn the weekend I found this artist Alonewolf. What do you think about the music?Apple rolling out 'Report Junk' feature for iCloud Calendar
Apple is rolling out a fix for te iCloud Calendar spam issue that has plagued users over the past few weeks. On iCloud.com, the company has added a new Report Junk feature. This lets users remove spammy invites from their calendar and reports the sender t...Helpnetsecurity - Remote access options for unidirectionally protected networks
Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about remote access options for unidirectionally protected networks.Issue 52: December 2016 - (IN)SECURE Magazine
A new tool can crack a credit card number in six seconds
techcrunch.comResearchers can extract over a brute force attack, different credit card informations. But only Visa Card holders are affected by this attack, because MasterCards system shutdown the card after 100 attempts.8 Books Security Pros Should Read
darkreading.comI can recommend the following books from this list: Cyberspies The Web Application Hacker's Handbook are very greatWolf People | Ruins
Ruins, the new album from the amazing Band Wolf People. This is my album for the month November, maybe for the whole year! Do you know Wolf People? How do you find the music and the new Album? Here you can find the music from Wolf People: Youtube Bandcamp...What is your reaction to the Ghost in the Shell Trailer
Ghost in the Shell Official Trailer What is your reaction to the Ghost in the Shell Trailer? Do you find it is the good old cyberpunk feeling!? A new age of the Cyberpunk!? Or you find this is crap!?- Cyberpunk it is best6 votes
- It could be a good movie34 votes
- Not bad, not good8 votes
- I'm confused4 votes
- What was that3 votes
- Oh no...6 votes
More Than 1 Million Google Accounts Breached by Gooligan
checkpoint.comA checkpoint security research team found out, that more than 1 Million Google Accounts was breached by the malware "Gooligan". This Malware root your device, steal your email adress and your authentication tokens. In this Article, from the Checkpoint Blo...Cylance Discloses Voting Machine Vulnerability
really fascinatingSan Francisco Rail System Hacker Hacked
krebsonsecurity.comThis is very amusing :DAkira 28
This project started many years ago when both Dean and I lived on Tybee Island. I came to Dean with the idea to do a tribute "trailer" to Akira. As a long time fan of the original film he of course loved the idea!Hedberg - The Bionic Hand Made from One Keurig Coffee Maker
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove use...Linux Flaw Allows Attackers to Hijack Web Connections
Researchers discovered that a Transmission Control Protocol (TCP) specification implemented in Linux creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks. The flaw, tracked as CVE-2016-5696, is related ...Masashi Wakui - Cyberpunk Photos
Explore Masashi Wakui's 1,232 photos on Flickr!






