Search found 37 matches

by BlackSt0rm
Thu Apr 14, 2016 11:11 am
Forum: PC Gaming
Topic: How I spent two hours in No Man’s Sky
Replies: 0
Views: 12849

How I spent two hours in No Man’s Sky

Suzy Wallace is acting pretty casually, considering that she’s about to show me the way to the center of the universe. She’s the Senior Producer on No Man’s Sky, and after the past year’s-worth of vague allusions to what might lie at the heart of its galactic tangle, her offer sounds too good to be ...
by BlackSt0rm
Thu Apr 14, 2016 11:08 am
Forum: Other
Topic: If you know how to program read this.
Replies: 2
Views: 9864

Re: If you know how to program read this.

Interesting idea, but I doubt you would get many people on-board to develop it without some sort of incentive :P
by BlackSt0rm
Tue Apr 12, 2016 7:08 pm
Forum: Other
Topic: MovieSwap Cancels DVD Cloud Streaming Service
Replies: 0
Views: 11818

MovieSwap Cancels DVD Cloud Streaming Service

https://torrentfreak.com/images/movie-swap-small.jpg “What if you had an unlimited access to the LARGEST ONLINE MOVIE LIBRARY EVER? A community based library, where you could watch any movie online. A library where you could swap films with contributors all over the world and discover an infinite n...
by BlackSt0rm
Wed Apr 06, 2016 12:03 pm
Forum: Other
Topic: Are esports actually sports
Replies: 3
Views: 11278

Re: Are esports actually sports

No...
An eSport is an eSport, just as eMail is not mail.
by BlackSt0rm
Mon Apr 04, 2016 7:23 pm
Forum: Other
Topic: PNG Embedded – Malicious payload hidden in a PNG file
Replies: 2
Views: 10252

Re: PNG Embedded – Malicious payload hidden in a PNG file

0day mitigation is still a pretty new field of technology, but there are a few rather decent options which you don't need to fork out thousands for. They all function the same in the end. Monitor payload delivery points for odd behavior, such as overflows and heap sprays which are not exactly stealt...
by BlackSt0rm
Thu Mar 31, 2016 4:21 pm
Forum: Other
Topic: PNG Embedded – Malicious payload hidden in a PNG file
Replies: 2
Views: 10252

PNG Embedded – Malicious payload hidden in a PNG file

One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional phishing and using techniques where the malicious payload is...
by BlackSt0rm
Thu Mar 31, 2016 4:18 pm
Forum: Other
Topic: “All your creds are belong to us”
Replies: 1
Views: 11316

“All your creds are belong to us”

https://cdn.securelist.com/files/2012/08/pdf_small5.gif   Download the full report (PDF) With astonishing annual revenues of over a hundred billion dollars, the gaming industry has in the past been compared to Hollywood’s burgeoning business, repeatedly demonstrating the influence behind its ever e...
by BlackSt0rm
Thu Mar 31, 2016 3:22 pm
Forum: Other
Topic: South African BitTorrent users beware
Replies: 0
Views: 11672

South African BitTorrent users beware

http://mybroadband.co.za/news/wp-content/uploads/2015/12/BitTorrent.jpg Dutch anti-piracy group BREIN recently announced it will  collect IP addresses and other evidence to prosecute those using BitTorrent to share copyrighted content. BREIN said it received permission from the Dutch data protectio...
by BlackSt0rm
Thu Mar 31, 2016 2:46 pm
Forum: Other
Topic: Student bypasses Valve’s review process, publishes game on Steam
Replies: 0
Views: 11919

Student bypasses Valve’s review process, publishes game on Steam

Sometimes the only way to get an organization to listen to you when it comes to existing vulnerabilities in their products is to exploit them yourself and make the proof of the exploitation visible. That’s what Ruby Nealon, a 16-year-old computer science student at University of Salford did: in orde...
by BlackSt0rm
Thu Mar 31, 2016 2:38 pm
Forum: Other
Topic: 1,400+ vulnerabilities found in automated medical supply system
Replies: 0
Views: 11605

1,400+ vulnerabilities found in automated medical supply system

Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies – that are still being used in the healthcare and public health sectors in the US and around the world. http://www.helpnetsecurity.com/images/p...

Go to advanced search