Always Providing You With Ongoing Information

Library Combined Guest House


Secluded library cabin is your dream retreat - Hemmelig Rom Credit: Jason Koxvold/Studio Padron
(Picture: Jason Koxvold/Studio Padron)

The Hemmelig Rom – meaning ‘secret room’ in Norwegian – is a guest house and library in upstate New York.

Secluded library cabin is your dream retreat - Hemmelig Rom Credit: Jason Koxvold/Studio Padron

The Hemmelig Rom – meaning ‘secret room’ in Norwegian – is a guest house and library in upstate New York.


Uber app will have drivers in several US cities to periodically upload selfies before they can begin their shifts. Uber will then use Microsoft’s cognitive-recognition AI to compare the uploaded images with the selfie the company already has on file for the driver.

If the two don’t match, Uber will temporarily suspend the driver’s account while it investigates. This is to prevent fraud.

Check to see if the product you’re researching had been certified by a third party.  If the certification mark looks suspicious — especially if there’s a spelling mistake, and contact the issuing test lab and confirm its authenticity. Beware of items that are “significantly less expensive” than comparable products,This may be an indication that shortcuts were taken during manufacturing. Samsung chose to self-certify under the CE mark for the Galaxy Note 7, rather than use UL or another recognized mark.

Not all safety certifications are equal. In Europe, companies are allowed to mark their products with the “CE” stamp if they have performed in-house testing and can prove (if asked) that their products conform to the applicable safety standards. It’s a process known as self-certification and it means that no independent third-party was involved in verifying the manufacturer’s claims. There’s no legal requirement for consumer products to be safety-certified by an independent third party, like UL


Yahoo admitted that back in 2014 there was a theft of 500 million accounts. However, Verizon who recently acquired Yahoo in July for $4.83 billion has not finalized the acquisition and says this is news to them, they’re just learning about this.

A Warrant For A Tor User?


The past few months, judges, defense lawyers, and the government have been fighting over whether obtaining a Tor user’s real IP address, perhaps through hacking, counts as a search under the Fourth Amendment. The debate has serious consequences for whether law enforcement requires a warrant to break into a suspect’s computer, even if it’s only to learn the target’s IP address. US District Court Judge Robert W Pratt argued that when the FBI hacked suspected Playpen users and grabbed their IP addresses, that constituted a search.

He stated “If a defendant writes his IP address on a piece of paper and places it in a drawer in his home, there would be no question that law enforcement would need a warrant to access that piece of paper—even accepting that the defendant had no reasonable expectation of privacy in the IP address itself,” Pratt writes in his order. Judges are divided over whether obtaining the IP addresses in this way constitutes a search, and whether Tor users have a reasonable expectation of privacy around their real IP address.


The hacking of yahoo account certainly comes at a bad time when Yahoo is in the process of selling its company to the mega giant Verizon. The hack,  became known in August when an infamous cybercriminal named “Peace” said on a website that he was selling credentials of 200 million Yahoo users from 2012 on the dark web for just over $1,800. The data allegedly included user names, easily decrypted passwords, personal information like birth dates and other email addresses.


caramel6_001Teen hacker using the alias “Fear” hacked hundreds of FTP servers owned by the U.S. government. The hacker first  gained access to one server, but then discovered that it listed the access credentials to all FTP servers residing on the .us and .gov domains. The .us servers include public data, private data, program source code, and more sensitive data, while the hacker wouldn’t say what’s loaded on the .gov sites. The teen hacker managed to grab credit card numbers from the First Bank of Ohio because the government has access to that particular bank. In turn, the bank stores the sensitive numbers across several SQL tables, which is a form of Excel-like data storage within a database. Moreover, one FTP server located within Florida wasn’t even password protected. It reportedly serves up one file with 267 million records, one file with 76 million records, another one with 400 million records, and more. Since then, that specific FTP server has now become password protected (even though that may be a case of closing the barn door after the data-rich cow has gotten out). the teen managed to collect credit card numbers by the thousands, and social security numbers by the millions. He managed to get the details of state employees including their telephone numbers, names, addresses, and government positions. Apparently, the FTP sites owned by the U.S. government depend on passwords with only five characters. Soon after the federal government shut down the main .us FTP server.

Tag Cloud

%d bloggers like this: