Human Augmentation for Weight Loss

If you read almost any article about powered human implants, you will encounter the same roadblock, “it could be so much better with more powerful batteries.” Our fleshy power systems are different from electrical systems, but we are full of moving parts, so [Xudong Wang] and fellow researchers have harnessed that power (Sci Hub Alt) and turned it right back into something else our body understands.

The goal of this project is to control obesity by tricking the vagus nerve into thinking we are full as we digest our current meal. The treatment has already been proven with battery-powered implants, …read more

Continue reading Human Augmentation for Weight Loss

Internal Power Pills

Arguably the biggest hurdle to implanted electronics is in the battery. A modern mobile phone can run for a day or two without a charge, but that only needs to fit into a pocket and were its battery to enter a dangerous state it can be quickly removed from the pocket. Implantable electronics are not so easy to toss on the floor. If the danger of explosion or poison isn’t enough, batteries for implantables and ingestibles are just too big.

Researchers at MIT are working on a new technology which could move the power source outside of the body and …read more

Continue reading Internal Power Pills

Magnet Implants, Your Cyborg Primer

What would you do to gain a sixth sense? Some of us would submit to a minor surgical procedure where a magnet is implanted under the skin. While this isn’t the first time magnet implants have been mentioned here on Hackaday, [The Thought Emporium] did a phenomenal job of gathering the scattered data from blogs, forum posts, and personal experimentation into a short video which can be seen after the break.

As [The Thought Emporium] explains in more eloquent detail, a magnet under the skin allows the implantee to gain a permanent sense of strong magnetic fields. Implantation in a …read more

Continue reading Magnet Implants, Your Cyborg Primer

U.S. warns of ’emerging’ global cyber-espionage campaign by Chinese hackers

An “emerging” international cyber-espionage campaign by a group with suspected ties to the Chinese government is affecting a growing number of companies globally, according to a warning from the U.S. government. Cybersecurity researchers and intelligence analysts have been tracking the hacker group known as APT10 or MenuPass Group since at least 2009. In the past, the group has targeted construction, engineering, aerospace and telecom companies as well as government agencies in the U.S., Europe and Japan. APT10’s past activity suggests it acts in “support of Chinese national security goals, including acquiring valuable military and intelligence information as well as the theft of confidential business data to support Chinese corporations,” according to cybersecurity firm FireEye, which has extensively monitored and studied the group. The U.S. National Cybersecurity and Communications Integration Center continues to review APT10’s recent activity and said it is working with victims “across different sectors,” according to a U.S. Computer […]

The post U.S. warns of ’emerging’ global cyber-espionage campaign by Chinese hackers appeared first on Cyberscoop.

Continue reading U.S. warns of ’emerging’ global cyber-espionage campaign by Chinese hackers

That was fast: Thousands of computers now compromised with leaked NSA tools, researchers say

Thousands of Microsoft Windows machines worldwide are infected with an NSA-developed backdoor that hackers installed by reusing leaked executable code from an outdated hacking toolkit belonging to the spy agency, multiple security researchers tell CyberScoop. The mysterious Shadow Brokers group published a package of internal NSA documents last week, containing among other things the computer code for a series of exploits, implants and other hacking tools. In the days since the leak first became public, hackers have mulled over the trove and begun reverse-engineering and recycling some of the capabilities, CyberScoop previously reported. One of these hacking tools, a backdoor implant codenamed DOUBLEPULSAR — which is used to run malicious code on an already compromised box — has already been installed on 30,000 to 50,000 hosts, according to Phobos Group founder Dan Tentler. Other researchers have also engineered different detection scripts to quickly scan the internet for infected computers. John Matherly, […]

The post That was fast: Thousands of computers now compromised with leaked NSA tools, researchers say appeared first on Cyberscoop.

Continue reading That was fast: Thousands of computers now compromised with leaked NSA tools, researchers say

Oracle databases at risk because of a leaked NSA hacking tool, researcher says

The recent leak of NSA hacking tools designed to compromise SWIFT Service Alliance servers comes with a key to pry open thousands of Oracle databases around the globe, new research suggests. While most of the hacking tools revealed April 14 by the group known as the Shadow Brokers target vulnerabilities in outdated versions of Microsoft Windows operating systems, the release also contained an implant and two scripts apparently engineered by the NSA to breach and exfiltrate data from Oracle databases. Those tools were part of an expansive U.S. espionage operation aimed at hacking into Middle Eastern SWIFT service bureaus. SWIFT is an international computer network that acts as a ledger and enables financial institutions to send and receive information about financial transactions. Some banks rely on service bureaus to effectively access SWIFT’s architecture. Service bureaus in the Middle East commonly host and manage transaction data from regional banks on Oracle databases. These Oracle […]

The post Oracle databases at risk because of a leaked NSA hacking tool, researcher says appeared first on Cyberscoop.

Continue reading Oracle databases at risk because of a leaked NSA hacking tool, researcher says

WikiLeaks publishes MacBook, iPhone hacking toolkit supposedly used by CIA

WikiLeaks published Thursday a new batch of supposed CIA documents that reveal how the spy agency has hacked into Apple computers and smartphones over the last decade. The 12 newly released folders provide insight into some of the CIA’s methods and techniques, which evidently require physical access to compromise a target device in many cases. Cybersecurity researchers tell CyberScoop that the documents, some of which are marked as recent as 2013, generally prove that the CIA boasts a “robust” Mac attack toolkit. The spy agency was “ahead of the curve versus public disclosure” for many of these capabilities, said Apple security researcher Pedro Vilaça. A WikiLeaks press releases reads, “these documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.” UEFI stands for Unified EFI Specification, which defines an interface between the operating […]

The post WikiLeaks publishes MacBook, iPhone hacking toolkit supposedly used by CIA appeared first on Cyberscoop.

Continue reading WikiLeaks publishes MacBook, iPhone hacking toolkit supposedly used by CIA