Having type 1 or 2 diabetes requires a person to always know what their blood sugar levels are. This normally takes time and can be quite invasive – normally people prick their finger with a special device and place a small drop of blood on a testing strip. Others have a device implanted just under their skin that continuously measures their blood sugar levels and sends the information to an external device.
We hear a lot about Mars, Jupiter, and Saturn, and that’s because we have extremely fancy hardware floating around and, in some cases, cruising on the surface of those planets. The planets that lie further away from the Sun don’t get nearly as much attention, but they may soon, as NASA is currently spitballing some missions that will give us a better look at Uranus than we’ve ever gotten.
Brace yourselves for a possible ‘second wave’ of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers dump last month.
Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed “EnglishmanDentist,” “EsteemAudit,” and “ExplodingCan.”
As of this writing, the WannaCry ransomware outbreak infected 350,000 victims in more than 150 countries.
What makes WannaCry unique?
WannaCry is a unique ransomware strain that exploits a critical Microsoft Windows Server Message Block (SMB) vulnerability to spread like a worm, leading to its rapid propagation after just a few hours of initial detection. The SMB exploit spreads across network shares, so the effect of the attack was minimal to consumers.
The unique trifecta of a broadly available vulnerability with a working exploit and the ability for execution without human intervention created the perfect environment for a “wormable” ransomware attack. Since the WannaCry attack, another attack called Adylkuzz has surfaced that takes advantage of the same Windows vulnerability, emphasizing the need for action.
Pictures from the Elektro-L No.1 Russian weather satellite of Earth are the highest-detail images yet, and come in at 121 megapixels. The color scheme comes from the image capture method, which combines data from three visible and one infrared wavelength of light when it takes full-sized images of Earth every 30 minutes.
CAPE CANAVERAL, Fla. (AP) — SpaceX successfully launched and then retrieved its first recycled rocket Thursday, a historic feat and the biggest leap yet in its bid to drive down costs and speed up flights.
It was the first time SpaceX founder Elon Musk tried to fly a booster that soared before on an orbital mission. He was at a loss for words after the Falcon 9 core landed on the bull’s-eye of the ocean platform following liftoff with a broadcasting satellite, achieving what some had once told him was impossible.
On March 24, 2017, the US Senate passed the broadband privacy law, authorizing broadband providers to sell users’ browsing data without their consent. Yesterday, the US House of Representatives voted similarly to overturn FCC’s internet protections for consumers.
How can we protect our privacy in the face of this? There are thousands of tools, with both defensive and offensive security capabilities, to help internet users protect their privacy and data from the clutches of cyber attackers and to keep their activities private from their ISP and mass surveillance by the government.
To stay safe from these surveillance, I have handpicked 10 security & privacy tools which can help you protect your personal information.
They say ‘Free World’… but the truth is that it’s not as free as you may think.
In fact, there are over a dozen places on our planet which you CANNOT gain access to.
From top-secret military bases to exclusive clubs and Armageddon bunkers.
In this article, we take a look at the FIFTEEN most restricted places on the surface of out planet.