Yours,
Peter Coeln
Steineck
Condition: B+
Year: c.1949
Suzuki Optical Co.
Camera-Lite B Gold
Condition: B
Year: 1955
$2,878.21
Lancaster
Watch Camera Men's Model
Condition: B
Year: 1890
$26,383.61
Security researchers (ERNW) have uncovered three vulnerabilities in a Bluetooth chipset present in dozens of devices from multiple manufacturers... three flaws in the Airoha system on a chip (SoC), apparently “widely used” in True Wireless Stereo (TWS) earbuds.
The SoC is allegedly present in 29 devices from different manufacturers, including a couple of high-profile names: Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. Speakers, earbuds, headphones, and wireless microphones all seem to be affected. more
Even the rich and powerful may not be safe from the world of international espionage, as recent reports have alleged that countries are using multimillion-dollar superyachts in spy operations. And at least one country, China, has reportedly been spying on the superyacht manufacturers themselves.
How are superyachts connected with spying?
Most notable is Russia, which is reportedly "using its unrivaled underwater warfare capabilities to map, hack and potentially sabotage critical British infrastructure," said The Sunday Times...
This is noteworthy given that many of these oligarchs' yachts have moon pools, which are openings in the bottom of a ship's hull that can be "used covertly to deploy and retrieve deep-sea reconnaissance and diving equipment," said the Times...
Beyond the yachts themselves, Chinese officials may be spying on superyacht manufacturers, in particular luxury shipbuilder Ferretti SpA, according to a Bloomberg report. more
BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase. BADBOX 2.0, in addition to compromising devices prior to purchase, can also infect devices by requiring the download of malicious apps from unofficial marketplaces. The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity.
The public is urged to evaluate IoT devices in their home for any indications of compromise and consider disconnecting suspicious devices from their networks. more
![]() |
| Vlogger, Jyoti Malhotra |
1. A Most Wanted Man (2014)2. Tinker Tailor Soldier Spy (2011)3. Red Joan (2018)4. The Little Drummer Girl (1984)5. Argo (2012)6. Syriana (2005)7. The Good Shepherd (2006)8. The Hunt for Red October (1990)9. Spy (2015)10. Three Days of the Condor (1975)11. North by Northwest (1959)12. The Spy Who Came In From the Cold (1965)13. The Amateur (1982)14. Ill Met By Moonlight, aka Night Ambush (1957)15. The Third Man (1949)
So get down without your phone,
Comfort knowing you're not alone,
Bow your head with great respect,
And disconnect, disconnect, disconnect!