News & Updates

The first season of Attack on Titan ended back in 2009 and since then, fans have been eagerly waiting for the next season to arrive. There has been no official word on when the next season will air, but various rumors and leaks have confirmed that there will be a season 2. Judging from the […]

The post Attack on Titan Season 2 Release Date And Spoilers: Eren To Be End Of Survey Corps? Mission Of Survey Corps To Be Revealed appeared first on MobiPicker.


Enlarge (credit: Getty | Dmitry Rogulin )

Routine hormone injections into the buttocks of 320 men dramatically shrunk their sperm counts and prevented pregnancies during a year-long, early-phase trial, researchers reported Thursday.

The findings suggest that a future hormonal male contraceptive may one day be possible. However, the data also revealed high rates of side effects, such as acne and mood swings, suggesting much more work is needed before such a birth control method is realized.

“A male hormonal contraceptive is possible,” lead author Mario Festin, a medical officer with the department of reproductive health and research at the World Health Organization, told the Chicago Tribune. “We have to continue searching for or investigating the right drugs, and their combinations, with the highest efficacy and safety, and acceptability, with the least side effects.”

Read 9 remaining paragraphs | Comments


Before you take the easy burn, no there’s not a mod that adds multiplayer. High hopes die hard, don’t they? Yet here we are broke and still wanting to live in a world that isn’t as trashy as No Man’s Sky. But there is hope for one group and that is the PC players. These […]

The post No Man’s Sky: Here Are The Top 5 Mods For the Game appeared first on MobiPicker.


It has been seen that when a TV show becomes quite popular and successful, it either goes on for multiple seasons, or one of the stars move on for better prospects. Of course, everyone has a career to grow, and it seems like Jamie Dornan might move on from ‘The Fall’. Yes, it has been […]

The post ‘The Fall’ Season 3 May Be the Last Run as Jamie Dornan Might Leave the Show appeared first on MobiPicker.


Remember the FIFA 17 corner glitch which guaranteed that you score a goal 99.9% of the time? The bizarre corner glitch allowed players to score a goal with an amazing success rate. Well, FIFA 17 has had its fair share of glitches so far. While most of these have been fixed, few glitches continue to […]

The post FIFA 17 Glitch: Sure Shot Way Of Scoring With Penalty Kick appeared first on MobiPicker.


Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back it.

The Mirai botnet, this name is familiar to security experts due to the massive DDoS attack that it powered against the Dyn DNS service a few days ago.

The Mirai malware was first spotted by the researcher MalwareMustDie that confirmed it was designed to hack into poorly configured and vulnerable IoT devices. Its source code was leaked on the popular criminal hacker forum Hackforum by a user with moniker “Anna-senpai” giving the opportunity to anyone to compile and customize its own version of the threat.

Experts who reviewed the code have discovered a weakness that could be exploited to shut down the botnet stopping it from flooding the targets with HTTP requests, this means that it is possible to hack back the threat. The experts from Invincea discovered three vulnerabilities in the Mirai code, one of them, a stack buffer overflow, could be exploited to halt the DDoS attack powered by the botnet. The buffer overflow vulnerability affects the way Mirai parses responses from HTTP packets.

“Perhaps the most significant finding is a stack buffer overflow vulnerability in the HTTP flood attack code. When exploited it will cause a segmentation fault (i.e. SIGSEV) to occur, crash the process, and therefore terminate the attack from that bot. The vulnerable code has to do with how Mirai processes the HTTP location header that may be part of the HTTP response sent from an HTTP flood request.” reported the analysis published by the security firm Invincea.


The researchers highlighted that their attack would not have helped in the DNS-based DDoS attack against provider Dyn, but it would halt the Layer 7 attack capabilities of the Mirai botnet implemented in the coded leaked online.

The researchers at Invincea successfully tested a proof-of-concept exploit in a virtual environment setting up a debug instance of the Mirai bot, a command and control server and a target machine.

“This simple “exploit” is an example of active defense against an IoT botnet that could be used by any DDoS mitigation service to defend against a Mirai-based HTTP flood attack in real-time. While it can’t be used to remove the bot from the IoT device, it can be used to halt the attack originating from that particular device. Unfortunately, it’s specific to the HTTP flood attack, so it would not help mitigate the recent DNS-based DDoS attack that rendered many websites inaccessible.” explained the Scott Tenaglia, Research Director in the cyber capabilities team at Invincea Labs.

Tenaglia remarked that the method proposed by the company doesn’t clean the compromised devices, instead it could be effective against HTTP flooding powered by the Mirai Botnet.

The method proposed by the researchers is a form of active defense that has important legal implications because anyway, who is defending its system from the attack power a response attack against the attacker’s infrastructure.

Hacking back is illegal under the Computer Fraud and Abuse Act.

Hacking a bot means to make an unauthorized access to a computer system and such kind of operations have to be authorized by a court order.

Invincea has made an excellent work and isn’t suggesting the hacking back, but limited its analysis on the technical aspect of the Mirai botnet and its vulnerabilities.

“It’s in the gray space of active defense,” Tenaglia told to ThreatPost. “In the defense world, this is a hotly contested issue. Say if your IoT is already compromised and bad code is already running, if I do something to the bad guy’s code, am I breaking law?”

“I would never comment on the legality of this,” Tenaglia said. “I think this gives us another point to discuss with regard to active defense. Is this something we think is ok? I don’t think it would hurt the system; it might help it. If a bot is degrading performance of the Internet connection because of the packets it’s sending out, and if this attack kills the process and the connection gets better, have we helped you? That’s why this is a gray area.”

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

(Security Affairs – Linux Mirai malware, IoT)

The post Hacking back the Mirai botnet, technical and legal issues appeared first on Security Affairs.

Source: Security affairs

In the days of mainframe computing, one system stood miles ahead of the rest. PLATO (Programmed Logic for Automatic Teaching Operations) wasn’t special for its power or speed or graphical prowess, though. It was remarkable for the ideas that drove its development and for the breadth of its impact—starting in the 1960s and accelerating through the ’70s and ’80s, PLATO terminals became omnipresent throughout schools, universities, and offices around the world.

The PLATO system was designed for education. It had a programming language called TUTOR that was simple enough for non-technical people to use for writing software; it also notably offered a social environment. It was an online community as much as it was a computing platform, and in this capacity it envisaged much of the future of communication. PLATO had chat rooms, message boards, touch panels built into the (flat, plasma) screens, emoticons, animations, virtual economies, and more.

But PLATO also had a less heralded but equally influential component. And even if history has glossed over this detail and neglected to celebrate it, PLATO’s gaming archives remain unforgettable for anyone who was there to experience the platform. These “lessons” infuriated administrators, delighted students, and, importantly, pushed the system to its limits.

Read 48 remaining paragraphs | Comments


The infamous botnet that was used in the recent massive distributed denial of service (DDoS) attacks against the popular DNS provider Dyn, causing vast internet outage on last Friday, itself is flawed.

Yes, Mirai malware, which has already enslaved millions of Internet of Things (IoT) devices across 164 countries, contains several vulnerabilities that might be used against it in order to


Hackers of the Cyber Hunta collective leaked thousands of emails allegedly stolen from the account of Vladislav Yuryevich Surkov.

Last week a Russian government website was hacked by the Jester hacker who defaced the website of the Russian Ministry of Foreign Affairs, in retaliation for the recent attacks against US targets.

This week a Ukrainian hacker collective called “Cyber Hunta” released a cache of emails linked to the Kremlin’s Vladislav Surkov, also known as the grey cardinal.

Cyber Hunta is a group of hacktivists operates against threat actors from the outside and “internal enemies.”

The group claims to have access breached the internal networks of the Russian presidential administration and the Parliament.

Experts from the Atlantic Council’s Digital Forensic Research Lab who analyzed the Surkov leaks confirmed that email account hacked by the attackers, [email protected], was apparently managed by Surkov’s assistants.

“The hacked inbox was for [email protected], which was handled by his secretaries or assistants, including a “Masha” (Mariya) and “Yevgenia” (last names unclear). The majority of the emails are briefings from Surkov’s assistants, such as Aleksandr Pavlov. ” states the Atlantic Council’s Digital Forensic Research Lab.

On the other side, the Russian Government denied that the leaked emails belong to Surkov as he did not use email.

According to the Ukrainian security service, the SBU, the leaked emails are genuine, the Associated Press who analyzed the leaked email share the same opinion.

The Ukranian hacker leaked a 1 Gb Outlook data file (.pst) containing 2,337 messages. Some messages contain information about the current internal political developments in the Republic of Abkhazia, Republic of South Ossetia, Ukraine, and the Republic of Moldova.

Cyber Hunta surkov-leaks

The precious archive includes email messages related to the war in Donbass, including government expense data and a list of casualties. The messages also show connections between the pro-Russia separatists in eastern Ukraine and Russian government and pro-Russia separatists that operated in the area to destabilize the Ukrainian government.

Who is behind the Cyber Hunta? In the group linked to some governments that is opposite to the Kremlin? Which one?

Perhaps in time we will have some answers.

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

(Security Affairs – Cyber Hunta, data breach)

The post Ukrainian hackers Cyber Hunta leaked emails of Putin’s Advisor appeared first on Security Affairs.

Source: Security affairs


UNIVERSAL STUDIOS, Calif.—On Friday evening Tesla officially announced an integrated solar roof and Powerwall product for individual use. When or if the roof and the Powerwall become available to consumers is most likely contingent on Tesla and SolarCity investors voting to approve Tesla’s offer to buy SolarCity in a $2.6 billion (£2.1 billion) all-stock deal on November 17.

Tesla set up an elaborate “neighborhood” display on the Universal Studios lot in Los Angeles. The company unveiled several model homes with Tesla Powerwalls mounted on the side and a variety of custom roofs with photovoltaic cells disguised as tiles.

“You really need to make solar panels as appealing as electric cars have become,” Tesla CEO Elon Musk told a crowd of several hundred people as the sun set on the artificial neighborhood. “The goal is to have a roof that’s less than the installed cost of a roof plus electricity.”

Read 19 remaining paragraphs | Comments