The First Transcontinental Train


mashable-Marmaray‘A railway that tunnels under the Bosphorous Strait in Istanbul opened Tuesday on the Turkey’s 90th anniversary, making it the first transportation system to connect Europe and Asia.

‘The Marmaray tunnel, named for a combination of the nearby Sea of Marmara and “ray,” the Turkish word for rail, runs 8.5 miles, less than one of which is underwater. The Bosphorous Strait runs through the middle of Istanbul, a city that sits partly in Europe and Asia…’
more

Log in with Facebook Spreading
Users Log in With Facebook Instead of Creating New Accounts Online
I am experiencing this because I create new accounts a lot. It’s ok and easier but not when the website where you’re creating your account is ‘not trustworthy’

‘New data released Tuesday from Gigya, a social-login provider for large enterprises such as Verizon, Pepsi and ABC, found that people are using their Facebook identity more often than those of other social networks to log in to third-party apps and websites. Data collected over Q3 from the company’s more than 700 clients found that those who have social logins use Facebook 51% of time, followed by Google+ (26%) and Yahoo (18%). Twitter was a distant fourth at only 4%…’
more

How a phone call is sometimes more dangerous than malware
From a hacking experiment:
‘…During this information-gathering phase, contestants could attempt to capture as many of the pre-defined flags as possible, but could not contact the company or its employees.

‘Contestants then performed a live call portion of the event during DEF CON 21. In this segment of the competition, social engineers used pretexts established in the information-gathering phase to telephone employees of the company to further elicit information.

‘The flags captured during the Open Source Information (OSI) phase were obtained through information found online without any interaction with individuals at the target companies. Information gathered on the internet allowed contestants to capture more than two times the amount of points gathered in the live call portion of the contest, even though OSI flags were valued at half the points of their live call counterparts…’
more

Chinese Spy Chips in Electrical Imports
Cyber criminals are planting chips in electric irons and kettles to launch spam attacks, reports in Russia suggest.

‘State-owned channel Rossiya 24 even showed footage of a technician opening up an iron included in a batch of Chinese imports to find a “spy chip” with what he called “a little microphone”. Its correspondent said the hidden devices were mostly being used to spread viruses, by connecting to any computer within a 200m (656ft) radius which were using unprotected Wi-Fi networks. Other products found to have rogue components reportedly included mobile phones and car dashboard cameras…’
more

Advertisements

About DigitalPlato

Poch is a Bookrix author and a freelance writer. He is a frequent contributor to TED Conversations.
This entry was posted in computer safety, espionage, hacking, inventions, online safety, social networking, TECHNOLOGY and tagged , , . Bookmark the permalink.

What do you think?

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s