A quotation from Colton, Charles Caleb:
«
This is the tax a man must pay to his virtues, — they hold up a torch to his vices, and render those frailties notorious in him which would have passed without observation in another.
»
Full quote, sourcing, notes:
https://wist.info/colton-charles-caleb/62752/
#quote #quotes #quotation #comparison #expectations #flaws #standards #strengths #virtue #weaknesses
#quote #quotes #quotation #comparison #expectations #flaws #standards #strengths #virtue #weaknesses
»#Hackers Trick #AI With 'Bad Math' to Expose #Flaws and #Biases: At DEF CON conference, hacker gets model to say 9 + 10 = 21. AI has chance to transform everything from finance to hiring.« https://www.bloomberg.com/news/articles/2023-08-12/hackers-are-trying-to-root-out-bias-and-errors-in-ai-models?eicker.news #tech #media
#hackers #AI #flaws #Biases #tech #media
#Hacking insecure process sensor systems may have affected the #Chernobyl #nuclear plant site
The compromise of Chernobyl’s process sensor readings reinforces the immediate need for the government and industry cybersecurity communities to address the cybersecurity gaps in control system field devices
by Joe Weiss, Aug. 11, 2023
"Process sensor systems include the physical transducer, conversion electronics, laptops/servers, calibrators, etc. Compromising any of those elements can cause the apparent sensor reading to be wrong. Unfortunately, when it comes to OT cybersecurity, process sensor readings are too often assumed to be uncompromised, authenticated and correct. It should be evident this is not the case. Even worse, in industries like #electric, #water, #oil/#gas, #pipelines, etc., the cybersecurity of process sensors is effectively ignored."
#InfoSec #Cybersecurity #NuclearPlants #Infrastructure #Flaws
#hacking #chernobyl #nuclear #electric #water #oil #Pipelines #infosec #CyberSecurity #nuclearplants #infrastructure #flaws
NEW! Fishing Without Bait 393: I Don’t Know
Audio: https://www.patreon.com/posts/87395066
Video: https://www.patreon.com/posts/87395080/
#Podcast #FishingWithoutBait #JimEllermeyer #ProducerMike #WWE #SummerSlam #Flaws #Negativity #HumanExperience #Understanding #Passion #Perspectives #HumanBehavior
#podcast #fishingwithoutbait #jimellermeyer #producermike #wwe #summerslam #flaws #negativity #humanexperience #understanding #passion #perspectives #humanbehavior
Living with a #chronic #disease doesn't make me a #hero, #brave or an #inspiration. It's a daily #battle, filled with #frustrations and #limitations. I just want to be seen as a #human being, with #hopes, #dreams, and #flaws. Let's #focus on #understanding, #empathy, and #support instead of being put on some kind of pillar. #JustHuman
#chronic #disease #hero #brave #inspiration #battle #frustrations #limitations #human #hopes #dreams #flaws #focus #understanding #empathy #support #justhuman
The #SteamDeck is a #NecessaryEvil
We need it now even with its #Flaws and #AntiFeatures. It is setting an #IndustryStandard, a sort of #reference that we'll all target and aim for, cause most users are gonna be there. Its still selling pretty ok.
Eventually we'll need to break free from #SteamOS so we'll create our own system and remove the anti features
#steamos #reference #industrystandard #antifeatures #flaws #necessaryevil #SteamDeck
Certain design and metallurgy issues in some components have been identified as probable flaws in the indigenously-developed Advanced Light Helicopter (ALH) following a detailed scrutiny of the choppers, people familiar with the matter said on Wednes
#String #Accidents #Flaws #Dhruv #Chopper
https://www.ndtv.com/india-news/certain-metallurgical-design-issues-identified-in-dhruv-chopper-fleet-report-4161112
#string #accidents #flaws #dhruv #chopper
Does your character have one flaw, or many? How many is too many? How many is enough to make the readers sympathise and feel your character is real, without losing them?
#Authodons #writing #amwriting #writingtips #flaws
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks https://thehackernews.com/2023/03/new-golang-based-hinatabot-exploiting.html #DDoS #HinataBot #GoLang #flaws
#ddos #hinatabot #golang #flaws
A NewReport released today by #SurvivalInternational #exposes major #flaws in a #flagship #CarbonCredits #scheme whose customers have included #Meta & #Netflix .
The report “#BloodCarbon : how a #CarbonOffset scheme makes millions from #Indigenous land in Northern #Kenya ” #analyses the Northern Kenya #Grassland #Carbon #Project run by the #NorthernRangelandsTrust (#NRT ) on land inhabited by more than 100,000 Indigenous #Samburu , #Borana & #Rendille people.
#survivalinternational #exposes #flaws #flagship #carboncredits #scheme #meta #netflix #bloodcarbon #carbonoffset #indigenous #kenya #analyses #grassland #carbon #project #northernrangelandstrust #NRT #Samburu #borana #rendille #unceded
#CISA has added 3 more #flaws to its #Known #Exploited #Vulnerabilities (KEV) catalog, citing evidence of active exploitation:
CVE-2022-35914 - Teclib GLPI RCE
CVE-2022-33891 - Apache Spark Command Injection
CVE-2022-28810 - Zoho ADSelfService Plus RCE
Read: https://thehackernews.com/2023/03/cisas-kev-catalog-updated-with-3-new.html #vulnerability #cve #security
#cisa #flaws #known #exploited #vulnerabilities #vulnerability #cve #security
"The most beautiful things in the world are not perfect, they are special." — Bob Marley — — — #BobMarley #quote #quotes #beauty #beautiful #perfection #special #perfect #flaws
#bobmarley #quote #quotes #beauty #beautiful #perfection #special #perfect #flaws
Paper about Predictive Optimization challenges #legitimacy, presents #flaws, includes case studies. Seems to make us #rethink the #validity of such predictions.
Obviously, #automated decisions re. loans, hiring etc. can have great impacts on people and the #economy.
See Prof. @randomwalker post: https://mastodon.social/@randomwalker/109903444603053793
https://predictive-optimization.cs.princeton.edu/
#princetonuniversity #cs #adm #predictiveoptimzation #prediction #predictive #predictivecrime #ml #forecasting #optimisation #optimization #flaw
#flaw #optimization #optimisation #forecasting #ml #predictivecrime #predictive #prediction #predictiveoptimzation #adm #cs #princetonuniversity #economy #automated #validity #rethink #flaws #legitimacy
My flaws
You love, you love my flaws
Think they make me beautiful
You don't see them as flaws at all
That's why
That's why, that's why I love you
'Cause you are, you are the one who
The one who loves my flaws
You think I'm everything when I think I'm nothing
When I hate myself, you still love me
Love me and
My flaws #flaws #KierraSheard
Sometimes, I get a little unsure
A lot insecure
Sometimes, I know I might say some words
That might cause some hurt
Sometimes, I get in my own way
I'm way too much to put up with
But you put up with it all
#flaws #KierraSheard
#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.
This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.
The attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.
A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”
They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.
https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit
TastingTraffic LLC
Founder of #SEO (Search Engine Optimization)
Founder of #RTB (Real Time Bidding)
Founder of #HFT (High Frequency Trading)
Disclaimer: https://tastingtraffic.net and/or http://JustBlameWayne.com (Decentralized SOCIAL Network) and/or its owners [http://tastingtraffic.com] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.
#infotainment_system #user_interaction #SEO #RTB #HFT #tesla #car #Hacked_Remotely #Drone #Zero_Click #exploit #researchers #possibly #other_cars #WITHOUT #any_user_interaction #attack #Comsecuris #Pwn2Own #hacking_competition #CONTEST #prizes #HACKING #bug_bounty #temporarily_eliminate #pandemic #TBONE #exploitation #vulnerabilities #ConnMan #connection_manager #embedded_devices #flaws #full_control
#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.
This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.
The attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.
A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”
They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.
https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit
TastingTraffic LLC
Founder of #SEO (Search Engine Optimization)
Founder of #RTB (Real Time Bidding)
Founder of #HFT (High Frequency Trading)
Disclaimer: https://tastingtraffic.net and/or http://JustBlameWayne.com (Decentralized SOCIAL Network) and/or its owners [http://tastingtraffic.com] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.
#tesla #car #Hacked_Remotely #Drone #Zero_Click #exploit #researchers #possibly #other_cars #WITHOUT #any_user_interaction #attack #Comsecuris #Pwn2Own #hacking_competition #CONTEST #prizes #HACKING #bug_bounty #temporarily_eliminate #pandemic #TBONE #exploitation #vulnerabilities #ConnMan #connection_manager #embedded_devices #flaws #full_control #infotainment_system #user_interaction #SEO #RTB #HFT
#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.
This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.
The attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.
A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”
They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.
https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit
TastingTraffic LLC
Founder of #SEO (Search Engine Optimization)
Founder of #RTB (Real Time Bidding)
Founder of #HFT (High Frequency Trading)
Disclaimer: https://tastingtraffic.net and/or http://JustBlameWayne.com (Decentralized SOCIAL Network) and/or its owners [http://tastingtraffic.com] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.
#tesla #car #Hacked_Remotely #Drone #Zero_Click #exploit #researchers #possibly #other_cars #WITHOUT #any_user_interaction #attack #Comsecuris #Pwn2Own #hacking_competition #CONTEST #prizes #HACKING #bug_bounty #temporarily_eliminate #pandemic #TBONE #exploitation #vulnerabilities #ConnMan #connection_manager #embedded_devices #flaws #full_control #infotainment_system #user_interaction #SEO #RTB #HFT
#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.
This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.
The attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.
A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”
They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.
https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit
TastingTraffic LLC
Founder of #SEO (Search Engine Optimization)
Founder of #RTB (Real Time Bidding)
Founder of #HFT (High Frequency Trading)
Disclaimer: https://tastingtraffic.net and/or http://JustBlameWayne.com (Decentralized SOCIAL Network) and/or its owners [http://tastingtraffic.com] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.
#tesla #car #Hacked_Remotely #Drone #Zero_Click #exploit #researchers #possibly #other_cars #WITHOUT #any_user_interaction #attack #Comsecuris #Pwn2Own #hacking_competition #CONTEST #prizes #HACKING #bug_bounty #temporarily_eliminate #pandemic #TBONE #exploitation #vulnerabilities #ConnMan #connection_manager #embedded_devices #flaws #full_control #infotainment_system #user_interaction #SEO #RTB #HFT