China Tutors Uber for Pennies

Teaser medium

Web tutorials bake in vulnerabilities, coins suck, China space, Iris scan to pay Galaxy, Uber – lots of Uber, they are worse then coins, use a different search engine, Brave browser, BrickerBot, and Facebook cleaning thoughts.

Top-ranked programming Web tutorials introduce vulnerabilities into software

Researchers from several German universities have checked the PHP codebases of over 64,000 projects on GitHub, and found 117 vulnerabilities that they believe have been introduced through the use of code from popular but insufficiently reviewed tutorials.

South Korea begins coinless society trial - BBC News

Starting on Thursday, instead of accepting small change from purchases, customers at selected stores can instead opt to deposit it onto prepaid cards such as transportation cards, the Yonhap news agency reports. This means that customers won’t have to carry change in their pockets after making cash payments, the Bank of Korea (BOK) says.

China launches 1st cargo spacecraft destined for its space station

China on Thursday launched its first unmanned cargo spacecraft on a mission to dock with the country’s space station, marking further progress in the ambitious Chinese space program.

Galaxy S8's iris scanner to be used on financial transactions

South Korea’s credit card companies are seeking to apply the iris scanner adopted by Samsung Electronics Co.‘s Galaxy S8 smartphones on mobile transactions, industry sources said Friday, lauding the feature’s security compared with fingerprints and passwords.

Uber’s C.E.O. Plays With Fire

Travis Kalanick’s drive to win in life has led to a pattern of risk-taking that has at times put his ride-hailing company on the brink of implosion.

Uber reportedly tracked Lyft drivers using a secret software program named ‘Hell’

The Information reports that Uber secretly tracked Lyft drivers using an internal software program it dubbed Hell.
Hell not only let Uber see how many Lyft drivers were available for rides and what their prices were, but also figure out which ones were double-dipping by driving for Uber, too.

Daring Fireball: On Uber’s ‘Identifying and Tagging’ of iPhones

What APIs and device info was Uber using to identify iPhones? Are these API loopholes now closed in iOS? If we don’t learn exactly what Uber was using to identify devices, we cannot know that the technique no longer works. iOS users should be able to feel confident that when they delete an app, all connections between their device and the developer of the app are disconnected, and that when they wipe a device, everything personally identifying has been removed from it.

Uber responds to report that it tracked devices after its app was deleted

Uber is pushing back on the allegations, saying that the tracking is a common industry practice used to prevent fraud and account compromise.


Miles uses this as his browser.

BrickerBot Author Claims He Bricked Two Million Devices

If you’re unfamiliar, BrickerBot is a new malware family that was first identified at the start of the month by Radware researchers. The malware made headlines because it was the first threat of its kind that intentionally bricked IoT and networking devices, by rewriting the flash storage space of affected devices with random data.

Facebook Cleanliness