A Dormant HP Keylogger Found, Uber Pays Ransom – ThreatWire

Keyloggers were found in WordPress and HP, mobile apps have all sorts of vulnerabilities, and Uber is hiding behind bug bounties? All that coming up now on ThreatWire. All that coming up now on ThreatWire.

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
——————————

Links:

Keyloggers:
https://thehackernews.com/2017/12/hp-laptop-keylogger.html

http://www.zdnet.com/article/keylogger-uncovered-on-hundreds-of-hp-pcs/
https://zwclose.github.io/HP-keylogger/
https://support.hp.com/us-en/document/c05827409
https://www.virustotal.com/#/file/706d3dbe8c7f217e3bb10c359bfa8b69c8ab107e3be69e3c00acaaf0a4c32e5d/detection
http://www.securityweek.com/dormant-keylogging-functionality-found-hp-laptops

More than 5,000 WordPress websites plagued with Keylogger

https://blog.sucuri.net/2017/12/cloudflare-solutions-keylogger-on-thousands-of-infected-wordpress-sites.html

Mobile Apps:
https://thehackernews.com/2017/12/android-malware-signature.html
http://www.securityweek.com/vulnerability-allows-modification-signed-android-apps

Android Flaw Allows Attackers to Poison Signed Apps with Malicious Code

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13156
https://www.guardsquare.com/en/blog/new-android-vulnerability-allows-attackers-modify-apps-without-affecting-their-signatures
https://thehackernews.com/2017/12/mitm-ssl-pinning-hostname.html
http://www.cs.bham.ac.uk/~garciaf/publications/spinner.pdf

Banking Apps Found Vulnerable to MITM Attacks

Uber:
https://thehackernews.com/2017/12/uber-hacker.html
https://www.cnet.com/news/florida-man-20-reportedly-behind-massive-hack-at-uber/
https://www.cnet.com/news/uber-hack-ftc-settlement-data-privacy-security/
https://arstechnica.com/information-technology/2017/12/uber-used-bug-bounty-program-to-launder-blackmail-payment-to-hacker/
https://www.reuters.com/article/us-uber-cyber-payment-exclusive/exclusive-uber-paid-20-year-old-florida-man-to-keep-data-breach-secret-sources-idUSKBN1E101C?feedType=RSS&feedName=technologyNews&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29

Youtube Thumbnail credit:
https://static.pexels.com/photos/230324/pexels-photo-230324.jpeg

Source: Security news


Source: Zologic

Remote Care! The Great Healthcare Disruptor

In late October in Boston, Mass., the top minds in healthcare and technology came together at the Connected Health Conference to envision how connected healthcare will transform patient care and the systems used to deliver it, making remote care the standard of care. And right after the conference, as if on cue, Medicare published new reimbursement rules for 2018 that promise to greatly accelerate adoption of effective remote care models.

An increasingly connected world is fueling industries from manufacturing to entertainment with the enormous benefits of merging data with technology, thus enabling end-user interaction in better and more personal ways than ever before. Healthcare is no exception. What the Connected Health Conference demonstrated is that we are at a rare inflection point. Healthcare stakeholders are aligned, aided by the indisputable evidence in efficacy, and with technological breakthrough already underway, the remote care revolution is imminent, set to improve patient access and patient outcomes, while creating efficiencies and lowering costs.

A human checks their blood pressure during a connected health conference in 2017.

Distributing the Delivery of Care

Similar to the sea change that occurred in care delivery with the establishment of the institutional hospital system in the 1800s, the path to transformation today lies in taking patient care from the most expensive place, the hospital, to the least expensive, like a person’s residence. In fact, today’s most dramatic improvements in outcomes—both for the patient and for the system at large—result from the use of some form of remote care, the need and benefit for which has already been widely researched and documented in the industry.

One of the biggest problems we face in healthcare today—aside from prohibitive costs and lack of universal access—is the absence of a cohesive data ecosystem that fuses insights seamlessly into assisting the clinician workflow. Healthcare data today flows through numerous disparate channels that don’t speak to each other. As many industry experts agree, we need to build a dataflow ecosystem into the collaborative workflow of care teams, patients and family simultaneously. Giving people this greater access to their care group through clear, efficient data gathered by the devices they already use will not only improve the quality of care, but it can eliminate unnecessary hospital readmissions and provide a reliable, proactive, and connected continuum of care. This will truly rival the revolutionary changes brought about by the first hospital system two centuries ago.

IoT-enabled devices can help keep humans healthy.

A Vision for Remote Care

Intel Health Application Platform (HAP) is a new category of technology architected to aid the transformation to remote care. When coupled with the Intel-architecture-based design specification implemented by Flex, this software can help enable healthcare solution providers to securely and reliably deliver distributed healthcare services across an always-connected and ever-expanding healthcare edge and to any cloud. When combined with the Flex IoT Compute Engine, the Intel HAP can empower the healthcare industry to develop novel and exciting products and services at the edge with enterprise-grade stability, security, and longevity.

With Intel HAP, solution providers are working to usher in this new age where devices and data are connected regardless of the environment or records that are used, information can be delivered privately and securely to patient and provider, and adverse health events can be avoided rather than responded to.

At the conference, I was also delighted to once again spend some time with Dr. Clayton Christensen, a Harvard professor and one of the world’s top experts on innovation and growth, in discussion of the shared belief that technology and healthcare will merge but only when innovators create the new business models that enable remote patient care in the first place.

Indeed, in order to overcome the barriers to remote care adoption, we need a shift in provider and consumer behavior, a change in the economic model, and to ensure access to technology. Hospitals are already innovating and deploying new models, and better business and health outcomes are happening, helping more people live healthier lives. The road ahead will require not just technologies like IoT, but also new legislation and reimbursement frameworks, so that the technological progress can be sustained by a business model that enables doctors and patients to embrace remote care as a new medical standard of care.

To stay informed about Intel IoT developments, subscribe to our RSS feed for email notifications of blog updates, or visit intel.com/IoTLinkedInFacebook and Twitter.


Source: Network News

WTB: German Spy Agency Warns of Chinese LinkedIn Espionage

The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Botnet, Data leak, Malspam, Malvertising, Pre-installed keylogger, Ransomware, Targeted attacks, Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.

Trending Threats

German Spy Agency Warns of Chinese LinkedIn Espionage (December 10, 2017)
The German intelligence agency, the Federal Office for the Protection of the Constitution (BfV), has stated that Chinese intelligence is using the networking website “LinkedIn” to target approximately 10,000 Germans. The BfV released information regarding multiple fake LinkedIn profiles it discovered and believes that the accounts are evidence of China’s efforts to spy on, and possibly recruit German individuals and subvert German politics.
Tags: Targeted attacks, LinkedIn
Click here for Anomali Recommendation

Pre-Installed Keylogger Found On Over 460 HP Laptop Models (December 8, 2017)
A security researcher going by the name “ZwClose” has released information regarding a pre-installed keylogger located in the “Synaptics” touchpad driver. The Synaptics driver is shipped with HP machines, and approximately 460 HP models were observed to contain this keylogging feature. Researchers note that the keylogger feature is disabled by default, however, threat actors could use open source tools for bypassing the User Account Control to enabled the keylogger “by setting a registry value.”
Tags: Pre-Installed threat, Keylogger, HP
Click here for Anomali Recommendation

A Peculiar Case of Orcus RAT Targeting Bitcoin Investors (December 7, 2017)
As the value of the “Bitcoin” cryptocurrency continues to increase (approximately $17,740 USD as of this writing) threat actors are subsequently increasing their efforts to target Bitcoin investors. Fortinet researchers have found that actors are targeting Bitcoin investors with a Remote Access Trojan (RAT) called “Orcus” via a phishing campaign. The phishing emails purport to be an announcement of a new, legitimate bitcoin trading bot called “Gunbot.” The email attachment contains a VB script that, when executed, will download a file impersonating a .jpeg. The .jpeg file is actually a portable executable binary file. The executable was found to be a trojanized version of an open source inventory tool called “TTJ-Inventory System.” Inside this malicious versions, researcher discovered the presence of the “Orcus” RAT, which is advertised as a Remote Access Tool created by Orcus Technologies. Orcus has numerous features and commands that it can run, however, researcher note that what separates Orcus is the ability to load custom plugins.
Tags: Targeted attacks, Bitcoin investors, Malspam, Orcus RAT
Click here for Anomali Recommendation

New Targeted Attack in the Middle East by APT34, A Suspected Iranian Threat Group, Using CVE-2017-11882 (December 7, 2017)
FireEye researchers have published a report regarding a new Advanced Persistent Threat (APT) group they have dubbed “APT34.” The group is believed to be based in Iran, and has been observed exploiting a Microsoft Office vulnerability (CVE-2017-11882) that Microsoft patched on November 14, 2017. The vulnerability was exploited while attacking an unnamed government organization in the Middle East. Researchers believe that the APT group has been conducting a long-term cyber espionage campaign to benefit Iranian national interests. The group is believed to have been active since at least 2014. The group was observed using spear phishing emails that attempt to drop public and custom malicious tools, such as the group’s custom PowerShell backdoor to achieve its goals.
Tags: APT, APT34, Targeted attacks
Click here for Anomali Recommendation

Master Channel: The Boleto Mestra Campaign Targets Brazil (December 7, 2017)
Palo Alto Unit 42 researchers have discovered a new malspam campaign, dubbed “The Boleto Mestre Campaign” because the links and attachments in the emails masquerade as “Boleto Bancário.” Boleto Bancário is an official payment method that is regulated by the Central Bank of Brazil. Researchers have observed over 260,000 emails that fall under this theme since June 2017. The objective of this campaign is trick a user into following a malicious link or open a document that will infect the recipient with an information stealing trojan.
Tags: Malspam, Boleto Bancario-themed, Data theft
Click here for Anomali Recommendation

Mailsploit: It’s 2017, and You Can Spoof The “From” in Email to Fool Filters (December 6, 2017)
Penetration tester, Sabri Haddouche, has discovered that more than 30 email clients are vulnerable to email source spoofing. The vulnerability has been dubbed “Mailsploit.” The email clients are vulnerable to spoofing because of improper implementation of the Request For Comments (RFC) 1342 (which dates back to 1992) that can allow source spoofing to bypass spam filters and security features such as Domain-based Message Authentication, Reporting and Conformance (DMARC). RFC 1342 has to do with the representation of non-ASCII character in Internet message headers. Haddouche identified that the mail client interfaces do not properly sanitize a non-ASCII string after it is decoded.
Tags: Vulnerability, Mailsploit, Email clients
Click here for Anomali Recommendation

StorageCrypt Ransomware Infecting NAS Devices Using SambaCry (December 5, 2017)
A new ransomware, dubbed “StorageCrypt,” is targeting Network-Attached Storage (NAS) devices, according to Bleeping Computer researchers. The threat actors behind this campaign are using the Linux Samba vulnerability “SambaCry,” Samba is a Windows suite of programs for Linux and Unix. Exploitation of the vulnerability allows an actor to open a command shell on the affected machine that can be used to download file and execute commands. The actors are demanding a ransom from anywhere between 0.4 (approximately $6,356 USD) to 2 (approximately $31,779 USD) bitcoins for the decryption key.
Tags: Ransomware, StorageCrypt, Vulnerability, SambaCry
Click here for Anomali Recommendation

Quantize or Capitalize (December 5, 2017)
Forcepoint researchers have found that the “Quant” trojan loader, usually used to distribute “Locky” ransomware and the information stealing malware “Pony,” has added new features to its malicious capabilities. Quant is now able to steal credentials as well as various cryptocurrencies including Bitcoin, Peercoin, Primecoin, and Terracoin. The credential stealing feature is accomplished via the Delphi based library that is capable of stealing operating systems and application login credentials.
Tags: Malware, Downloader, Quant, Credential theft
Click here for Anomali Recommendation

Virtual Keyboard Developer Leaked 31 Million of Client Records (December 5, 2017)
A MongoDB database that appears to belong to the Tel Aviv-based startup company “AI.Type” was configured for public access which exposed approximately 31 million user records, according to the Kromtech Security Center. The company designed a virtual keyboard that works on mobile devices for both Android and iOS. The exposed database contained 557 gigabytes of data that consists of user registration records in addition to information that was entered onto the keyboard.
Tags: Misconfigured database, MongoDB, Data leak
Click here for Anomali Recommendation

Dridex is Back, Baby! – Necurs Botnet Malspam Pushes Dridex (December 4, 2017)
Researchers have discovered that “Necurs” botnet has resumed its distribution of the “Dridex” banking malware. Researchers note that the last occurrence of Necurs Dridex distribution was identified in June 2017, and that this Necurs campaign is separate from the “Globeimposter” ransomware campaign. The emails purport to be discussing a credit card payment and provides a link to receive the confirmation of the payment. If the link if followed, it will retrieve a malicious Word document. Inside the document is an embedded object that generates up to four URLs to retrieve the Dridex installer.
Tags: Malspam, Botnet, Necurs, Banking trojan, Dridex
Click here for Anomali Recommendation

Apache Software Foundation Releases Security Updates (December 4, 2017)
An alert has been released by the United States Computer Emergency Readiness Team (US-CERT) concerning vulnerabilities in Apache products. Specifically, the vulnerabilities are located in Apache Struts versions 2.5 through 2.5.14. The US-CERT states that an actor could exploit one of these vulnerabilities to take control of an affected system. One of the vulnerabilities can be exploited by an actor via a custom JSON request that can be used to conduct a Denial-of-Service (DoS) when using an outdated json-lib with Struts REST plugin. The second vulnerability is located in the Jackson JSON library, however, the impact of the issue is, as of this writing, still being researched further.
Tags: Alert, Vulnerabilities, Apache
Click here for Anomali Recommendation

Mozilla Releases Security Update for Firefox (December 4, 2017)
The United States Computer Emergency Readiness Team (US-CERT) has issued an alert regarding vulnerabilities located in the Mozilla Firefox web browser. The US-CERT states that a remote threat actor could exploit these vulnerabilities to take control of an affected system. The vulnerabilities, registered as “CVE-2017-7843” and “CVE-2017-7844,” involves Private Browsing mode storing data across multiple private browsing mode sessions. The latter vulnerability includes an external SVG image referenced on one page, and the coloring of anchor links stored within the image that can be used to determine which pages a user has in their history.
Tags: Alert, Vulnerabilities, Mozilla, Firefox web browser
Click here for Anomali Recommendation

Necurs Botnet Malspam Pushed Globeimposter Ransomware (December 4, 2017)
Researchers have observed that the “Necurs” botnet, known for distributing “Locky” ransomware, is currently distributing the “Globeimposter” ransomware. The ransomware is being distributed via malspam that contain malicious attachments. The emails purport that a message is ready to be sent with the following file or link attachments, or that an attached file is a confirmation of a credit card payment per the recipient’s request. Opening the attachment will begin the infection process for Globeimposter. The threat actors behind this campaign are demanding 0.088 Bitcoin (approximately $1,037 USD) for the decryption key.
Tags: Malspam, Botnet, Necurs, Ransomware, Globeimposter
Click here for Anomali Recommendation

Seamless Campaign Serves RIG EK via Punycode (December 4, 2017)
Malwarebytes Labs researchers have published information regarding the history and current activity regarding the “Seamless” malvertising campaign. The Seamless campaigns are known for almost exclusively distributing the “Ramnit” banking trojan via the RIG exploit kit. Threat actors are currently running two Seamless campaigns simultaneously; one that use static strings and IP literal URLs (URLs that skip DNS), and another that uses special characters. In the latter campaign, actors are using a Cryllic-based domain name that is then transcribed via “Punycode” (encoding used to convert Unicode characters to ASCII). According to researchers, the malvertisements are typically distributed via adult portals that redirect to malicious domains to begin the infection process for Ramnit.
Tags: Malvertising, Seamless campaign, RIG EK, Trojan, Ramnit
Click here for Anomali Recommendation

Observed Threats

This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. Click here to request a trial.

RIG exploit kit Tool Tip
The RIG exploit kit is a framework used to exploit client side vulnerabilities in web browsers. The RIG exploit kit takes advantage of vulnerabilities in Internet Explorer, Adobe flash, Java and Microsoft Silverlight. The RIG exploit kit was first observed in early 2014. The RIG exploit kit’s objective is to upload malicious code to the target system. The RIG exploit kit is known to distribute ransomware, spambots and backdoors. Victims are redirected to the RIG exploit kit with a landing page coming from malvertising or compromised sites.
Tags: RIG, exploitkit


Source: Honeypot Tech

Tech Gifts for Mom – TekThing Holiday Christmas Gift Guide! – TekThing Short

Check out this holiday gift guide for tech gift ideas for mom!

1. Amazon Echo – http://amzn.to/2BBPbzk
2. Google Home – https://store.google.com/product/google_home
3. Wonderboom – http://amzn.to/2Ac1MF0
4. Digital Photo Frame – http://amzn.to/2ALKmQW
5. Digitize her negatives – https://www.memoriesrenewed.com/

——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekthing
——
EMAIL US!
ask@tekthing.com
——
Amazon Associates: http://amzn.to/2ALKmQW
Subscribe: https://www.youtube.com/c/tekthing
——
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
THANKS!
HakShop: https://hakshop.myshopify.com/
Dale Chase Music: http://www.dalechase.com/
——
SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

Wi-Fi Maintenance Update

Hello WatchGuard Wi-Fi Cloud Users,

We are planning a brief maintenance on Friday December 8, 2017 between 7:00PM and 8:00PM Pacific Time to deploy improvements to the Wi-Fi Cloud.

During the maintenance window, access to the Wi-Fi Cloud Dashboard will be down for maintenance (approximately 15 minutes). Your access points and splash pages will continue to pass client traffic and will not be interrupted. 

If you have any questions regarding the update, please visit www.watchguard.com/support

Regards,

WatchGuard Wi-Fi Cloud Team


Source: WatchGuard

What Slugs in a Garden Can Teach Us About Security

Design principles observed in nature serve as a valuable model to improve organizations’ security approaches.
Source: Vulnerabilitys & Threats

Rutkowska: Trust Makes Us Vulnerable

Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.
Source: Vulnerabilitys & Threats

What is Threat Intelligence?

Written by Steve Miller and Payton Bush

Threat intelligence is a subset of intelligence focused on information security. Gartner (sorry, people) defines threat intelligence as “evidence-based knowledge…about an existing or emerging menace or hazard…to inform decisions regarding the subject’s response to that menace or hazard.” In short, threat intelligence is curated information intended to inform you and help you make better decisions about how to stop bad things from happening to you.

There are a few schools of thought and several sets of vernacular used to describe cyber threat intelligence. But there are generally three “levels” of cyber threat intelligence: strategic, operational and tactical. Some of the similarities and differences between these kinds of intelligence are summarized below:

Collecting each flavor of intelligence is important because they serve different functions.

 Type  Tagline  Half life of utility (for good guys and bad guys)  Focus  Built on the analysis of  Output data types
 Strategic 

 Who? 

 Why?

 Long (multiyear)  Non-technical   Big campaigns, groups, multi victim intrusions (and operational intel)  Long form writing about: victimology, YoY methodology, mapping intrusions and campaigns to conflicts, events and geopolitical pressures
 Operational 

 How?

 Where? 

 Medium (one year plus)  Mixed (both really)   Whole malware families, threat groups, human behavior analysis (and tactical intel)  Short form writing, bulleted lists, about: persistence and comms techniques, victims, group profiles, family profiles, TTP descriptions, triggers, patterns, and methodology rules
 Tactical  What?   Short (months)   Technical   Security events, individual malware samples, phishing emails, attacker infrastructure  Atomic and machine-readable indicators such as IPs, domains, IOCs, “signatures”

Analysts deal with a lot of alerts. Alerts enriched with tactical intelligence provide more context and help analysts determine which threats are worth worrying about and which can safely be ignored. These atomic indicators are often changed quickly though, making it important to also incorporate operational and strategic intelligence into decisions.

Operational intelligence helps fuel meaningful detection, incident response and hunting programs. For example, it can help identify patterns in attacks with with we can create logical rules in tech systems that will detect malicious activity specific indicators.

Strategic intelligence can help with assessing and mitigating current and future risks to organizations. For example, a corporation releasing a new product or completing a merger will want to understand not only the potential impact but also the associated risks. This intelligence is particularly useful for people in leadership roles such as CISOs and executive leadership who must justify budgets and make better informed investment decisions.

The sum of these different kinds of threat intelligence is the ability to make informed decisions on how to proactively and reactively respond to threats. This includes what solutions to use, how they should be leveraged, and even just who to keep tabs on.

Check back in January for a deeper look into what these three kinds of intelligence look like and how they’re used.


Source: Honeypot Tech

TekThing 154 – OnePlus 5T vs. Google Pixel 2, Linksys WRT32X Gaming Router Review, Amazon Echo or Google Home???

Flagship Phone Bargain: OnePlus 5T! Linksys WRT32X Gaming Router, Apple HomePod, Amazon Echo or Google Home???
——
01:57 OnePlus 5T Review
Can the 5T, a $500 flagship phone from OnePlus, hang with Google’s $850 Pixel 2 XL? The answer might surprise you! We show you pictures taken with both phones in the video! They pack the same Qualcomm® Snapdragon™ 835 CPU and Adreno graphics… watch the video to find out where the OnePlus 5T beats Google’s top model, and where it falls short!
https://oneplus.net/5t
https://store.google.com/product/pixel_2

13:40 Linksys WRT32X AC3200 Gaming Router
“Purpose built to prioritize gaming!” Linksys’s latest, the WRT32X AC3200 Dual-Band Wi-Fi Gaming Router packs Rivet Network’s Killer Prioritization Engine, to keep your online gaming traffic as fast as possible. Does it work? Is it fast? Will your gaming PC work with it? Watch the video to find out!
https://www.linksys.com/us/p/P-WRT32X/
http://www.killernetworking.com/technology/killer-prioritization-engine

22:08 Amazon Alexa or Google Home???
Ronald’s thinking about adding voice control to his home… should he go with Amazon Alexa or Google Home? A Sonos One? He writes, “Not sure which one to drop cash on. I prefer something with good sound for listening to podcasts and streaming music. Also looking to maybe IoT integration in the future.” He’s in an Apple house, but the HomePod won’t be out until 2018… so we explain why how to choose between Home and Echo in the video!
https://www.apple.com/homepod/
https://store.google.com/product/google_home
http://amzn.to/2Br6yCN
https://www.sonos.com/en-us/shop/one.html

26:51 Keep LED Christmas Lights From Dying!
Ben’s got a tip for everybody that’s had trouble keeping LED Christmas lights alive… hint, it involves plugging ’em into a sure protector! And, yes, surge protectors do wear out over time… when they do, they don’t protect your gear anymore!
http://amzn.to/2C6VMhG

The Best Surge Protector

30:00 Do Something Analog
Like Brian, who’s adopted a fuzzy new friend he found outside his garage!
——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekthing
——
EMAIL US!
ask@tekthing.com
——
Amazon Associates: https://www.amazon.com/shop/shannonmorse
Subscribe: https://www.youtube.com/c/tekthing
——
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
THANKS!
HakShop: https://hakshop.myshopify.com/
Dale Chase Music: http://www.dalechase.com/
——
SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

Hak5 2313 – Remotely Control a 3d Printer with Octoprint

Today on Hak5, David Randolph of http://www.printedsolid.com
teaches us how to use Octoprint and Raspberry Pi’s to remotely run print jobs on your 3d Printer!

http://octoprint.org/

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
——————————

Source: Security news


Source: Zologic