Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

When trying to analyze malware, have there been cases where malware detected the use of mitmproxy and ceased operation?
If that has happened, would it be a good idea to be constantly using a proxy as a measure for deterring any malware?

Continue reading Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

Cancer-sniffing ants prove as accurate as dogs in detecting disease

A fascinating new proof-of-concept study from a team of researchers in France suggests trained ants could be effective at detecting cancer in humans. The researchers demonstrated a certain species of ant can be quickly trained to detect cancerous cells… Continue reading Cancer-sniffing ants prove as accurate as dogs in detecting disease

Has there ever been a case of dangerous industrial malware, which would destroy motherboards and similar PC components and how to protect [duplicate]

I heard many years ago from word of mouth that this kind of malware exists, which could for example blow up capacitors in your PC.

Has such malware or something even remotely similar ever existed?

How do you technically detect such malwa… Continue reading Has there ever been a case of dangerous industrial malware, which would destroy motherboards and similar PC components and how to protect [duplicate]

Advanced photonic radar captures images down to the centimeter scale

Researchers at the University of Sydney have developed a new type of radar that can measure objects down to centimeters. The new technique uses a photonic system to generate much higher bandwidth signals, enabling radar that can detect smaller objects … Continue reading Advanced photonic radar captures images down to the centimeter scale

Someone has been using my NAS for torrenting. How can I prank them?

I found that someone is actively adding video files to a directory on the root of my NAS – lots of things like movies and TV show episodes. And I see upload and download traffic on it. They must have gained control and are torrenting. Who … Continue reading Someone has been using my NAS for torrenting. How can I prank them?