Jack Reviews Mirai's Password

Cracking down on Amazon review profiteers, raking in the dough finding security flaws, the sad state of security, the US loses the keys to the Internet, and lots more as Dedi, Ben, Lyle, and Miles cover the week in geek news. Oh, and Lyle shot himself in the leg.

iPhone 7 is getting the headphone jack back, courtesy of Fuze

If you think Apple killed the headphone jack on the iPhone 7

Let’s Talk About Amazon Reviews: How We Spot the Fakes | The Wirecutter

Like a lot of people, we read Amazon reviews as part of our product research. Getting broad feedback on a product can be very useful when we

iPhone exploit bounty surges to an eye-popping $1.5 million | Ars Technica

A controversial broker of security exploits is offering $1.5 million (

Apple Will Pay a ‘Bug Bounty’ to Hackers Who Report Flaws - The New York Times

At the Black Hat hacking conference, Apple announced a list of vulnerabilities that would command big bounties, including $25,000 for ways around Apple

Cybersecurity expert: Pennsylvania most vulnerable to voting system hacks

The battleground state of Pennsylvania might as well have a target on its back as Election Day nears, the cybersecurity company Carbon Black warned in a new report released Thursday.

Goodnight Rosetta - Bad Astronomy

On Friday, the Rosetta mission came to a close. At 11:19 UTC, the radio signal received at Earth from the spacecraft was cut off when the orbiter became a lander, slowly impacting and coming to rest on the surface of a comet.
At that moment, it became more than it once was; it became a part of the comet it had been chasing since it was launched on March 2, 2004.

xkcd: Rosetta

Randall Monroe uses his famous online comic to poke a little fun at the end of the Rosetta comet-encounter mission.

Source Code for IoT Botnet ‘Mirai’ Released

The source code that powers the

Here’s a Live Map of the Mirai Malware Infecting the World | Motherboard

Here’s a live map of infected nodes in the Mirai botnet.

The psychological reasons behind risky password practices - Help Net Security

The survey revealed that the majority of respondents understand that their digital behavior puts them at risk, but do not make efforts to change it.

Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say

With the 500 million accounts involved in the breach disclosed last week, the stolen passwords were encrypted. Yahoo concluded the risk of misuse was low so it notified users and encouraged them to reset their passwords themselves.

Management, Meetings and Time

Has the US just given away the internet?

A judge in Texas has put the kibosh on a last-minute legal attempt to block the controversial decision for the US to give up control of one of the key systems that powers the internet.

Battered But Not Beaten Commodore C64 Survives Over 25 Years Balancing Drive Shafts In Auto Repair Shop

One common complaint in the twenty-first century is that nothing is built to last. Even complex, expensive computers seem to have a relatively short shelf-life nowadays. One computer in a small auto repair shop in Gdansk, Poland, however, has survived for the last twenty-five years against all odds.


e41 s16