writes "Stanford researchers demonstrated last week at the Defcon how to attack game using on fly memory analysis and manipulation. A video that shows how to use their tool Kartograph to create a map hack for Supreme commander 2 is available from http://vimeo.com/13638066. The slides are available at http://ly.tl/t9s and a video of them that include all the demos is available here: http://vimeo.com/13972467."
writes "I am developing a web application and, after registering the domain, I am now looking for a suitable web hosting provider.
It should be cheap enough so I can start small, but should allow me to scale up if the web site is successful (as I hope).
The idea is simple enough so I do not need other investors to implement it. This also means that I don't have a lot of money to put on it
at the moment.
Users of the website will post their pictures (no, it's not going to be a porn website), so scalability might be an issue even with a moderately high
number of users.
I would like to find a good web hosting provider from day one, so I don't have to go through the pain of a data migration.
Which web host would you choose?"
writes "Many medical devices, such as pacemakers, come equipped with wireless communication systems these days, allowing doctors to monitor patients or change device's parameters. The use of wireless communications in pacemakers or implanted defibrillators opens the door to attacks. However, researchers from the ETH Zurich and INRIA, the French National Institute for Research in Computer Science, have now developed a scheme for protecting implantable medical devices against wireless attacks. The approach, presented at ACM CCS'09, relies on using ultrasound waves to determine the exact distance between a medical device and the wireless reader attempting to communicate with it. Access to implantable medical devices is restricted depending on the physical proximity of the communicating device. A device will always be accessible from up to 10 meters away, and will normally enforce a series of authentication steps before allowing access. In an emergency, however, when the device detects that the patient using it is in trouble, it will grant access to anyone who is physically close to the patient (within about three centimeters)."
writes ""A new paper by Princeton computer scientists and economists suggests that complex financial
derivatives are computationally intractable to detect: that is, once you have mixed together a bunch
of weird-ass securities and derivatives, you literally can't tell if the resulting security is being
tampered with as it pays off (or doesn't)." A nice and simple explanation of the idea behind the paper is given by Richard J. Lipton."Link to Original Source