Scammers Extort BitTorrent Users Posing as Law Enforcement

According to information obtained by SJD the accusations are not made up. This means that the IP-addresses were indeed “caught” sharing the files listed in the letter. However, it is a mystery how the “Internet Copyright Law Enforcement Agency” obtained the home addresses of the subscribers.

via Scammers Extort BitTorrent Users Posing as Law Enforcement | TorrentFreak.

It was only a matter of time before these kind scams surfaced.  The outfit in question is here.  Fearful of real life charges of real crimes involving interstate commerce probably convinced them to publish this on their site:

Effective immediately, the Internet Copyright Law Enforcement Agency has ceased operations. Please disregard any notices you received from us, and please do not send us any payments.

Throwing and catching an inverted pendulum

Armed with a good theoretical model and knowledge of its strengths and limitations, the researchers set out on a process of engineering the complete system of balancing, throwing, catching, and re-balancing the pendulum. This involved leveraging the theoretic insights on the problem’s key design parameters to adapt the physical system. For example, they equipped both quadrocopters with a 12cm plate that could hold the pendulum while balancing and developed shock absorbers to add at the pendulum’s tips.

via Video: Throwing and catching an inverted pendulum – with quadrocopters | Robohub.

Below is the Youtube video.

More info at the Flying Machine Arena.

The Flying Machine Arena (FMA) is a portable space devoted to autonomous flight. Measuring up to 10 x 10 x 10 meters, it consists of a high-precision motion capture system, a wireless communication network, and custom software executing sophisticated algorithms for estimation and control.

What is AP Isolation Mode and why should I disable it on my router?

In the computer networking world, AP stands for Access Point, or in this case, a wireless access point. AP Isolation effectively creates a “virtual” network among wireless clients, in which each device is an individual entity that cannot communicate with other wireless devices on the same Wi-Fi access point. This configuration can be useful for public Wi-Fi hotspots to separate potentially malicious network traffic from other.

via What is AP Isolation Mode and why should I disable it on my router? – Customer Feedback & Ideas for Photosmith.

The tomato router has this option.  Other APs do not.

Attribution Is Much More Than A Source IP

What seems to be happening in many intrusion cases is that an IP located in China has been associated with the attack. The immediate assumption, often by inexperienced persons involved in the investigation, is that someone in China, most likely state-sponsored, targeted their incredibly important information.

via Tech Insight: Attribution Is Much More Than A Source IP – Dark Reading.

TIFF Files Can Attack BlackBerry Server

Hiding malicious code inside image files isn’t new: way back in ye olden days of 2004, malware hidden inside JPEG files plagued Windows machines. Some administrators are doubtlessly wondering why, after all this time, this sort of vulnerability hasn’t been decisively eliminated from the online world.

via TIFF Files Can Attack BlackBerry Server.

From: BlackBerry Vulnerability Could Allow Access to Enterprise Server

An attacker could rig a TIFF image with malware and get a user to either view the image via a specially crafted website or send it to the user via email or instant message. The last two exploit vectors could make it so the user wouldn’t have to click the link or image, or view the email or instant message, for the attack to prove successful. Once executed, an attacker could access and execute code on Blackberry’s Enterprise Server. According to the advisory, an attacker could also “extend access to other non-segmented parts of the network,” depending on privileges.

Dropbox Offers a Way to Free Data from Mobile Apps with New Sync API Feature for Developers

He found in a recent survey that Apple and Dropbox are the two cloud services most used by U.S. consumers, with 27 percent and 17 percent of just over 2,000 respondents, respectively. Allowing people to control their content across devices from different companies provides one way for Dropbox to stand out, he says.

via Dropbox Offers a Way to Free Data from Mobile Apps with New Sync API Feature for Developers | MIT Technology Review.