"All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near. Appear weak when you are strong, and strong when you are weak."

– Sun Tzu, The Art of War

Bidgear ad


Have you ever wondered how NASA updates Voyager's software from 15 billion miles away? Or how Voyager's memories are stored? In this video, we dive deeper into the incredible story of how a small team of engineers managed to keep Voyager alive, as well as how NASA could perform a software update on a computer that's been cruising through space for almost half a century.

About 60 credit unions in the US are experiencing outages because of a ransomware attack on an IT provider the credit unions use, a federal agency said Friday.

The National Credit Union Administration (NCUA), the agency that insures deposits at federally insured credit unions, said in a statement to CNN that it was “coordinating with affected credit unions” in the wake of the hack.

In the era of pervasive surveillance reminiscent of Orwellian nightmares, old-school Cold War hacks have staged a comeback, offering a clandestine refuge for the exchange of information.

As Big Brother looms large on every screen, the savvy practitioner must resurrect time-tested techniques to outsmart the puppeteers of miscommunication particularly in the face of impending legal consequences for government-designated purveyors of deceit.

Here, in the spirit of cloak-and-dagger intrigue, are eight tried-and-true methods to outwit the masters of miscommunication:

On Nov. 16, the alleged thief stole some more items including a bench, but Sullivan had hidden some trackers in the items, hoping the thief would be caught in the snare. He said one of the trackers indicated movement, and he contacted the police.

"I saw one of the AirTags had moved to a location in Irvine, so I had the address at that point. I took a screenshot of it and I sent it to the detectives at 2 in the morning," he explained.

The U.S. government requested and received the metadata for accounts connected to, and in alignment with, President Donald J. Trump.

That’s billions of billions of datapoints on millions of American citizens, their locations, their devices, their ip addresses and ultimately their real identities and connected activity as attributed to -and connected with- their connected social media accounts.  Essentially, turning Donald J. Trump into the center of a surveillance virus.

VMware has fixed a critical authentication bypass vulnerability in Cloud Director appliance deployments, a bug that was left unpatched for over two weeks since it was disclosed on November 14th.

Cloud Director is a VMware platform that enables admins to manage data centers spread across multiple locations as Virtual Data Centers (VDC).

Multiple employees reportedly warned the company's board of directors that this project, named Q* (pronounced 'Q star'), was becoming so advanced it could already pass math exams and perform critical thinking tasks.

And they felt Altman was not taking their warnings seriously.

In an interview this week, Altman did not deny the existence of the secret program that some employees said was responsible for his firing.

Instead, he called the revelation of Q* an 'unfortunate leak.'

Israel’s military has made no secret of the intensity of its bombardment of the Gaza Strip. In the early days of the offensive, the head of its air force spoke of relentless, “around the clock” airstrikes. His forces, he said, were only striking military targets, but he added: “We are not being surgical.”

If you haven’t updated your iPhone, iPad or Mac recently, you’re going to want to install the latest patches now as Apple has released emergency security updates to address two new zero-day vulnerabilities.

As reported by BleepingComputer, these new zero-days have already been exploited by hackers in their attacks. However, Cupertino hasn’t provided further details on how hackers are using them nor has it revealed which Apple users are currently being targeted.

Zyxel has addressed multiple security issues, including three critical ones that could allow an unauthenticated attacker to execute operating system commands on vulnerable network-attached storage (NAS) devices.

Zyxel NAS systems are used for storing data in a centralized location on the network. They are designed for high volumes of data and offer features like data backup, media streaming, or customized sharing options.