Guy rips his own head off in broad daylight …. WTF??

0

article-behead2-0901In a particularly gruesome story out of the Bronx, a Hunts Point man apparently decapitated himself in broad daylight today.

According to the New York Daily News, an unidentified 51-year-old man parked his 2005 Honda CRV on the street on Monday around 9:35 am. He reportedly looped a chain around his neck, secured it to a pole, and got back into his car.

Police told the newspaper that the man then stepped on the gas, decapitating himself. According to the Daily News, “The man’s head was left on the street by the pole after his vehicle hit a parked truck on the opposite side of the street.”

How the baby born with the upside-down head has defied doctors

0

Resourceful Claudio Vieira de Oliveira knows more than a thing or two about overcoming adversity.

1409565800591_wps_1_EXCLUSIVE_CONDITION_OF_USMedics told the now-37-year-old’s mother to let him starve to death after he was born with a rare condition of the joints that left him with severely deformed limbs … and an upside-down head.

But despite his physical limitations, Claudio, from Monte Santo, Brazil, has defied doctors’ doubts to become an accountant and inspirational public speaker.

‘Since I was a child I’ve always liked to keep myself busy and work – I don’t like to depend totally on other people,’ he said. ‘I do a bit of accounting, research for clients and consulting.

‘I have learned to turn on the TV, pick up my cell phone, turn on the radio, use the internet, my computer – I do it all by myself.’

Claudio types with a pen held in his mouth, operates phones and a computer mouse with his lips and has specially made shoes that allow him to shuffle around town.

His independence saw him succeeding at school and qualifying as an accountant from the State University of Feira de Santana.

When Claudio was born, doctors told his mother Maria Jose he would not be able to survive.

Maria Jose said: ‘People started saying ‘the baby is going to die’ because he could barely breath when he was born.

‘Some people would say: ‘Don’t feed him, he is already dying’.

‘But there’s only happiness now. Claudio is just like any other person – that’s how he was raised in this house.

‘We never tried to fix him and always wanted him to do the normal things everyone else does.

‘That’s why he is so confident. He is not ashamed of walking around in the street – he sings and he dances.’

At eight years old, Claudio, who had previously been carried everywhere, began to walk on his knees.

WHAT IS ARTHROGRYPOSIS?

Congenital arthrogryposis is a rare condition that causes curved joints in several areas of the body at birth.

Contrary to popular belief, it is not a deformation of the joints themselves, but one of the tissue that surrounds them, thus fusing joints in place.

It is caused by a number of factors, including lack of space in the uterus, muscle abnormalities, nerve abnormalities, blood circulation problems and maternal illness.

The condition is present in about one in every 3,000 babies and is usually detected before birth.

Treatment options include physiotherapy, splinting and surgery.

1409566213763_Image_galleryImage__EXCLUSIVE_CONDITION_OF_UHis family had to change the floor of the house so he could walk around without injuring himself.

Claudio’s bed, plugs and lights had to be made lower so that he could do things for himself without asking for help.

He cannot use a wheelchair because of his unusual shape, making it hard for him to be independent outside the home – but he begged his mother to be allowed to go to school and learn with the other children.

Doctors have recently diagnosed him with a rare condition called congenital arthrogryposis.

They believe he has multiple joint contractions in his legs and arms which mean they cannot extend properly.

Claudio said: ‘Throughout my life I was able to adapt my body to the world. Right now, I don’t see myself as being different. I am a normal person.

‘I don’t see things upside-down. This is one of the things I always talk about in my interventions as a public speaker.

‘Nowadays it’s much easier to deal with the public, I’m not afraid of it anymore and I can say that I am a professional, international public speaker and that I receive invitations from all over the world.’

He is not the only person with the disease who has refuse to let it overcome his life.

In February, MailOnline told the story of Leanne Beetham who became a celebrated photographer and artist whose paintings of wildlife – which she creates by holding a paintbrush in her mouth – have sold for hundreds of pounds.

Miss Beetham, who has a degree in applied animal behaviour, uses paint and graphite to make her images, which can take more than eight hours to complete at a sitting.

In 2006 one of her paintings was sold for £750 at Christies in London in aid of the David Shepherd Wildlife Foundation. Her exhibition last year in Hull raised money for the Withernsea RNLI, helping to replace equipment which had been stolen.

Did a bug in iCloud’s ‘Find My iPhone’ function help 4chan hacker steal nude photos of Jennifer Lawrence and 100 other celebrities?

0

A flaw in the ‘Find My iPhone’ function of Apple’s iCloud service may have helped a hacker to steal nude photos of Jennifer Lawrence and ‘100 other celebrities’, it today emerged.

article-2739215-20F5B99300000578-995_634x887The hacker claims he or she broke into stars’ iCloud accounts, including those of the Hunger Games actress, Kate Upton and Rihanna, before publishing them on 4chan, the image-sharing forum.

A list of the alleged victims of the hack – a staggering 101 in total – has also been posted online; most of whom have not seen any photographs leaked by the hacker.

A spokesman for Oscar winner Lawrence confirmed to MailOnline the photos of her are genuine.

‘This is a flagrant violation of privacy. The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence,’ the emailed statement read.

Following the publication of the images of Sunday night, experts have voiced their concerns over how the hacker managed to access them. Now, reports suggest that a specific flaw in the ‘Find My iPhone’ service may have been to blame.

Despite the story breaking last night, Apple is still yet to confirm or deny whether its software was the target of the hacking. However, in the meantime, it has quietly issued a ‘patch’, or fix, for the bug.

The firm’s iCloud service, which was launched in October 2011 and is used by more than 320million people worldwide, secures data by encrypting it when it is sent over the web, storing it in an encrypted format when kept on server, and using secure tokens for authentication.

This means that data is protected from hackers while it is being sent to devices and stored online.

This suggests the hackers were able to obtain the login credentials of the accounts, and therefore pretend to be the user, in order to bypass this encryption.

HOW COULD A HACKER HAVE ACCESSED PHOTOS VIA ICLOUD?

Apple’s iCloud service allows users to access their music, photos, documents, contacts and email online.

When activated, the service automatically stores users’ photos, emails, documents and other information in a ‘cloud’, allowing them to sync the data across a range of platforms. These include iPhones, iPads and MacBooks.

Users can then access their information from any internet-connected device using a log-in and password.

Reports suggest a specific flaw in the service’s ‘Find My iPhone’ service may have allowed a hacker to access celebrities’ private images.

Code was spotted on software development site Github, that would have allowed malicious users to use ‘brute force’ to gain an account’s password on iCloud.

A message has since appeared saying that Apple has issued a ‘patch’, or fix, for the bug.

It is possible for users to enhance the security of their documents by turning off iCloud through Settings > iCloud on their device when they are not using it.

They can also turn on two-step verification for their iCloud account, meaning if someone tries to log into their account from elsewhere then they will need to supply a four-digit security code.

At present, iCloud has more than 320 million users. Those who wish to change their Apple ID can go to appleid.apple.com and follow the steps to reset their password.

Apple is yet to confirm or deny whether iCloud was involved in the hacking.

Despite the claims, it is possible that the photos were not taken via iCloud, but another platform. Theories include:

Social engineering

The hackers may have also used ‘social engineering’ techniques to obtain Apple IDs and passwords based on other information.

This includes email address, a mother’s maiden name, a date of birth, and more – all of which is easier to find out about celebrities than the everyday user.

If a celebrity uses the same password across accounts, this would be then make it relatively easy for someone to hack if they had the right information.

This theory would account for Mary Elizabeth Winstead’s claims that the leaked photos of her were taken with her husband ‘years ago’.

This amount of time exceeds iCloud’s Photo Stream facility, which keeps images for a maximum of 30 days before they are deleted.

Google Drive hack

In June, Google announced its Drive service had a flaw that meant private information was at risk from hackers.

Google patched the flaw in June, but the large number of victims in the 4chan leak also suggests that the hack may have begun months ago – at the time of this flaw.

Dropbox flaw

Similarly, in May, a flaw was found in Dropbox accounts that could have given unauthorised access to accounts

article-2739215-20F44D3F00000578-54_306x423Earlier today, The Next Web spotted code on software development site Github, that would have allowed malicious users to use ‘brute force’ to gain an account’s password on Apple iCloud, and in particular its Find my iPhone service.

A message has since appeared saying that Apple has issued a fix for the bug. ‘The end of the fun, Apple has just patched,’ read an update on the post.

Brute force, also known as ‘brute force cracking’, is a trial-and-error method used to get plain-text passwords from encrypted data.

Just as a criminal might break into, or ‘crack’ a safe by trying many possible combinations, a brute-force cracking attempt goes through all possible combinations of characters in sequence.

In a six-letter attack, the hacker will start at ‘a’ and end at ‘//////’

Owen Williams from The Next Web, who discovered the bug, said: ‘The Python script found on GitHub appears to have allowed a malicious user to repeatedly guess passwords on Apple’s “Find my iPhone” service without alerting the user or locking out the attacker.

‘Given enough patience and the apparent hole being open long enough, the attacker could use password dictionaries to guess common passwords rapidly. Many users use simple passwords that are the same across services so it’s entirely possible to guess passwords using a tool like this.

‘If the attacker was successful and gets a match by guessing passwords against Find my iPhone, they would be able to, in theory, use this to log into iCloud and sync the iCloud Photo Stream with another Mac or iPhone in a few minutes, again, without the attacked user’s knowledge.

‘We can’t be sure that this is related to the leaked photos, but the timing suggests a possible correlation.’

Rob Cotton, CEO at web security experts NCC Group added: ‘Cyber security is not just a technology problem, humans are very much key to its success. In our day-to-day work we see too many cases of employees divulging sensitive information without first verifying the legitimacy of the request.

‘People often point the finger at technology when they’ve been the victim of a cyber attack, but poor password choices or naivety in the face of a seemingly innocent email is regularly to blame.’

Human error, in a variety of ways, said Mr Cotton, often played a part.

Find My iPhone helps users locate and protect their iPhone, iPad, iPod touch, or Mac – if it’s ever lost or stolen.

Despite the claims, it is possible that the photos were not taken via iCloud, but as a result of ‘social engineering’.

This form of hacking works by studying which online services your target uses, before compiling as much information on them as possible, such as their email address, a mother’s maiden name, a date of birth, and more.

This data can then be used to trick them into handing over their details or guess their password. If a celebrity uses the same password across accounts, this would be then make it relatively easy for someone to hack if they had the right information.

But the sheer number of names on the list makes this unlikely – unless a large number of hackers were taking part, and a large number of celebrities had poor password management.

WHAT IS 4CHAN?

4Chan is an image-based forum where users can post photos and videos anonymously, as well as comment on others’ posts.

Registration is not required, nor possible.

The site is split into various boards, each with their own specific content and guidelines.

These include content on music, photography, gaming, comics, fashion and images of celebrities, such as Jennifer Lawrence.

Its main board, called ‘Random’, features minimal rules on what can be posted. It is often where controversial images and videos are uploaded by users.

When it launched in 2003, the site was used to post photos and discuss Japanese anime.

However, it quickly expanded, and is now linked to various internet subcultures and activism.

It has also been linked to a number of high-profile hacks.

In 2006, users of 4chan and other websites ‘raided’ American white nationalist Hal Turner by launching multiple attacks and prank calling his phone-in radio show.

Meanwhile, in 2008, the Yahoo email account of Sarah Palin was hacked by an anonymous 4chan user, before posting her password and screenshots on Wikileaks.

This followed criticism of Palin supposedly using private email accounts for governmental work.

And in May 2009, members of the site attacked YouTube, posting pornographic videos on the site

Other notable services to allow users to access files remotely include Dropbox and Google Drive, which enable users to keep more of their files close to hand without taking up huge amounts of memory on their devices.

When activated, iCloud automatically stores users’ photos, emails, documents and other information in a ‘cloud’, allowing them to sync the data across a range of platforms. These include iPhones, iPads and MacBooks.

Users can then access their information from any internet-connected device using a log-in and password.

On Sunday, the hacker wrote that he or she is accepting Paypal donations for a video which allegedly shows Lawrence performing a sex act.

The hacker also wrote, ‘I know no one will believe me, but i have a short lawrence video

‘Is way too short, a little over 2 minutes and you only get to see her boobs

‘Anyways, if somebody wants it let me know how i can upload it anonymously (i dont want the FBI over me, and you dont wanna know how I got this video.)’

‘Jennifer Lawrence’ became a Twitter trend on Sunday afternoon.

Meanwhile, Perez Hilton has apologised on Twitter for posting some of the naked photos of Lawrence on his blog, saying he feels ‘awful’.

The celebrity blogger, who has since deleted the photos from the site, told his followers: ‘I acted in haste just to get the post up and didn’t really think things through. I’m sorry.’

He added: ‘Upon further reflection and just sitting with my actions, I don’t feel comfortable even keeping the censored photos up. I am removing them.’

A spokesman for Kate Upton sent MailOnline a statement from her attorney, Lawrence Shire, about the leaked photos. ‘This is obviously an outrageous violation of our client Kate Upton’s privacy,’ the statement said.

iCloud secures data by encrypting it when it is sent over the web, storing it in an encrypted format when kept on server, and using secure tokens for authentication (explained above). This suggests the hackers were able to obtain the login credentials of the accounts, and pretend to be the user, in order to bypass this encryption

‘We intend to pursue anyone disseminating or duplicating these illegally obtained images to the fullest extent possible.’

Actress Mary Elizabeth Winstead, who confirmed she was a hacking victim, wrote on Twitter ‘To those of you looking at photos I took with my husband years ago in the privacy of our home, hope you feel great about yourselves.’

She also expressed sympathy for others, tweeting: ‘Knowing those photos were deleted long ago, I can only imagine the creepy effort that went into this. Feeling for everyone who got hacked.’

Winstead implied she was facing difficulties on Twitter on Sunday, when she tweeted ‘Great day for the block button!’

WHAT IS A BRUTE FORCE ATTACK?

Earlier today The Next Web spotted code on Github that would have allowed malicious users to ‘brute force’ an account’s password on Apple iCloud, and in particular its Find my iPhone service.

Brute force, also known as brute force cracking, is a trial-and-error method used by to get plain-text passwords from encrypted data.

Just as a criminal might break into, or ‘crack’ a safe by trying many possible combinations, a brute-force cracking attempt goes through all possible combinations of characters in sequence.

In a six-letter attack, the hacker will start at ‘a’ and end at ‘//////’.

The hackers may have also used ‘social engineering’ techniques to obtain Apple IDs and passwords based on other information they could find.

This includes email address, a mother’s maiden name, a date of birth, and more – all of which is easier to find out about celebrities than the everyday user.

If a celebrity uses the same password across accounts, this would be relatively easy for someone to hack if they had the right information.

Twitter is shutting down accounts that are disseminating the pictures. In response to a request for comment from MailOnline, a Twitter spokesman said: ‘We do not comment on individual accounts, for privacy and security reasons,’ and referred MailOnline to the company’s content boundaries web page.

Photographs that allegedly show Kaley Cuoco-Sweeting, Lea Michele, Brie Larson, Kirsten Dunst, Becca Tobin, Hope Solo, Teresa Palmer, Krysten Ritter, McKayla Maroney, Jessica Brown-Findlay, Ali Michael, and Yvonne Strahovski appeared online.

Some of the women named as alleged victims – but who have not had any of their supposedly nude photographs leaked – include Aubrey Plaza, Candice Swanepoel, Cara Delevingne, Cat Deeley, Hillary Duff, Kelly Brook, Michelle Keegan, Selena Gomez, Rihanna and Vanessa Hudgens.

A spokesman for Keegan, the former Coronation Street actress, said there was no evidence she had been hacked and nothing had appeared online to suggest so.

A rep for Keke Palmer – who was mentioned on the list but whose allegedly ‘nude’ photographs were not leaked – told MailOnline ‘Obviously there is no truth to this list and no nude photos of Ms. Palmer.’

Model Gabi Grecko – also named on the list but of whom, no photographs have been published – told Daily Mail Australia: ‘I feel like anything I didn’t release myself that was accessed without my permission is shameful.’

‘Some people are very private and maybe hugely affected and feel violated because of this. There have also been many suicides connected to non consented photos being released.’

Not all of the nude photographs that have been published are genuine, however.

A spokesman for Ariana Grande told MailOnline photos that claim to show her are fake. Similarly, Nickelodeon star Victoria Justice wrote on Twitter that her image was faked. She tweeted, ‘These so called nudes of me are FAKE people. Let me nip this in the bud right now. *pun intended.*’

Yesterday, Perez Hilton apologied on Twitter for posting some of the naked photos of Lawrence on his blog. The celebrity blogger, who has since deleted the photos, told his followers: ‘I acted in haste to get the post up’

Seth Rogen criticized the hacker on Twitter, writing ‘Posting pics hacked from a cell phone is really no different than selling stolen merchandise.’

‘I obviously am not comparing women to merchandise. Just legally speaking, it shouldn’t be tolerated to repost stolen pics,’ Rogen also tweeted.

A representative of Brazilian model Lisalla Montenegro said: ‘Regrettably Lisalla Montenegro’s name is on the list of hacked celebrities. Thankfully nothing has surfaced.

‘In precaution, the authorities have been informed and Lisalla’s lawyer will pursue anyone duplicating or distributing these stolen images.’

A spokesman for Kelly Brook refused to comment on the hack.

Try Before You Die – Macabre Festival Lets Japanese Try Out Coffins and Funeral Makeup

0

Trying out a coffin while you’re still alive can be a rather unnerving experience. But the Japanese seem to love it!  They even have a creepy ‘try-before-you-die’ festival where people can lay down in coffins, try out funeral garments and even get a morbid makeover.

Called ‘Shukatsu Festa’, the unique event has become very popular in recent years. In fact the whole ‘shukatsu’ trend, which translates as preparing for one’s end, has become really big in Japan. Apparently, people no longer think it’s bad luck to prepare for their death. Participants can choose their funeral outfit, put it on, slip into the flower-filled casket they like and have a picture taken. That way, they get to know exactly what they’ll look like on the day of their funeral. They can even have funeral make-up applied on their faces for a deathly pallor. They can also choose to be covered with white blankets have have the attendants softly close the lid.

try-before-you-die-550x533

Photo: Miako Ichikawa/Asahi

The Shukatsu Festa is popular with both men and women – this year’s event in Tokyo attracted over 5,000 visitors, with 50 companies competing to win their business. But it isn’t just the festival, the trend to design your own funeral has really caught on in Japan in the past few years and coffin manufacturers are actually printing coffin-manuals for people to browse through.

try-before-you-die2

Come to think of it, the Japanese aren’t the only ones who are ok with laying in a coffin while they still have a pulse. A while back, we reported about a special psychotherapy service in Shenyang, China, where patientsexperienced rebirth, by spending several minutes in closed caskets. The same think happened in the Ukraine, where an enterprising coffin maker invited people to lay down into one of his caskets to experience the afterlife.

Half of young women can’t ‘locate their vaginas’ and 65% find it difficult to say the word

0
imagesjjkk (1)
Half of young women are unable to properly label a vagina on a medical diagram, while 65 per cent have admitted they have a problem simply using the words vagina or vulva.


As Gynaecological cancer awareness month kicks off, research by the Eve Appeal unearths worrying information about young women’s awareness of their own bodies and the potential warning signs of the five cancers that can affect the womb, ovaries, vulva, vagina, and cervix.

Only half of the 1,000 women surveyed between the ages of 26 and 35 were able to label the vagina accurately, whereas women age between 66 and 75 scored far better; eight in 10 were able to able ovaries and nine in 10 could label the womb.

Of the youngest women surveyed, one in five aged between 16 and 26 were unable to name a single correct symptom of any of the five gynaecological cancers, while nearly 40 per cent of this age group said they used codes names to discuss any issues, referring to “lady parts” or “women’s bits” instead of using the term vagina.

0

Three women are accused of stealing two Rolex watches from a pair of male tourists by hiding the timepieces in two of the suspects’ sex organs.

n-TRIGGS-WARREN-KENNARD-largeThe alleged robberies took place Aug. 17 at the Encore Hotel in Las Vegas. Two of the suspects, Charmella Triggs and Bryanna Warren met one of the victims at a hotel bar.

After some conversation, the group returned to a hotel room that the man was sharing with his friend. The group was soon joined by another suspect, Trinity Kennard. The man’s friend arrived a short time later, according to the Las Vegas Sun.

The victims and suspects then started to have sex, according to the police report. Sometime during the sex, the victims were persuaded to remove their Rolex watches, one valued at $12,000 and the other worth around $4,000.

A short time later, the victims realized their watches were missing.

One of the men chased the suspects down the hall, but backed off when Triggs activated a stun gun near the elevator.

According to the police report, surveillance video shows two of the women hiking up their dresses inside the elevator and inserting foreign objects into their vaginal areas.

Meanwhile, the victims notified security and the women were arrested by Las Vegas Police at the taxi pick-up area of the Encore.

While the women were detained at the hotel, officers recovered a stun gun and one of the watches. Kennard later produced a watch from her sex organ during a strip search at Clark County Detention Center, KPTV TV reports.

The three women were booked on counts of burglary, conspiracy to commit grand larceny and conspiracy to commit robbery, according to KMOV.com.

They are due in court Sept. 3.

Trinity Kennard seems surprised to be behind bars, according to a jailhouse interview she gave to KNTV.

“I thought when stuff like this happens it’s just like a personal thing. I didn’t think police would get involved and I could go to jail,” she said.

This is actually the second vagina smuggling case reported in Las Vegas this year.

In January, Las Vegas masseuse Christina Lafave was accused of snatching a customer’s $35,000 Rolex at the Wynn Las Vegas and concealing it in her vagina.

Woman survives camel tow accident

0

camelOn hump day, flip-flops triggered an auto crash in Wisconsin, according to police who reported that one of the vehicles involved was hauling a camel.

The accident Wednesday was caused when Kelly Ellison, a 28-year-old Milwaukee woman wearing flip-flops, somehow got her footwear caught and “was unable to stop at the stop sign.” Her auto was then hit by a pickup truck pulling a trailer containing a camel named Eli.

A press release from the Caledonia Police Department reports that Ellison and her three-year-old child were not injured in the crash. However, the other driver–whose truck went into a ditch–suffered leg and back injuries.

The camel, a resident of Jo Don Farms, survived the accident unscathed and will return to work giving small children rides on its back.