Forwarded from Hacker News
NICT - National Institute of Information and Communications Technology
World Record Achieved in Transmission Capacity and Distance: With 19-core Optical Fiber with Standard Cladding Diameter 1,808 km…
An international research team led by the Photonic Network Laboratory at the National Institute of Information and Communications Technology (NICT, President: TOKUDA Hideyuki Ph.D.), and including Sumitomo Electric Industries, Ltd. (Sumitomo Electric, President:…
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡ Finding Service After Ditching Big Carriers
One of our community members asked where to go for service after switching to an Above Phone—and I shared why we created the Above DataSIM. It’s a seamless way to stay connected without compromising on privacy, and it works great with your new setup.
📺 This clip comes from our webinar *What’s Your Privacy Score?* — watch the full webinar here.
—
🫶 @takebackourtech
🎥 VIDEOS| 📩 NEWSLETTER | XMPP | SUBSTACK
One of our community members asked where to go for service after switching to an Above Phone—and I shared why we created the Above DataSIM. It’s a seamless way to stay connected without compromising on privacy, and it works great with your new setup.
📺 This clip comes from our webinar *What’s Your Privacy Score?* — watch the full webinar here.
—
🫶 @takebackourtech
🎥 VIDEOS| 📩 NEWSLETTER | XMPP | SUBSTACK
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Tomato
Tomato is a minimalist Pomodoro timer for Android based on Material 3 Expressive.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Nishant Mishra
🫂 Special thanks to @prem12321kumar for recommending!
🏷️ Tags: #Android #Productivity
Tomato is a minimalist Pomodoro timer for Android based on Material 3 Expressive.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Nishant Mishra
🫂 Special thanks to @prem12321kumar for recommending!
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷️ Tags: #Android #Productivity
Forwarded from GSMArena (IFTTT)
The Google Pixel Watch 4 will reportedly use the same old chipset, but will have a bigger battery
https://ift.tt/KSnrvIe
https://ift.tt/KSnrvIe
GSMArena.com
The Google Pixel Watch 4 will reportedly use the same old chipset, but will have a bigger battery
Google is working on new Tensor chips for the Pixel phone and Pixel Watch series, but the phone chip will arrive first. Google has abandoned Samsung and is...
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️How at-risk are you for a SIM swap?
Here’s a quick test:
Search your texts for 6-digit codes. Every login code you find is a service tied to your phone number. That’s your risk score.
Most people have 8+ accounts relying on text-based 2FA—making them easy targets.
Your info might already be out there. But you can lower your risk and lock things down.
Watch the webinar now: SIM Swap Survival Guide
Want real protection? Learn more and shop privacy-first tech.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Here’s a quick test:
Search your texts for 6-digit codes. Every login code you find is a service tied to your phone number. That’s your risk score.
Most people have 8+ accounts relying on text-based 2FA—making them easy targets.
Your info might already be out there. But you can lower your risk and lock things down.
Watch the webinar now: SIM Swap Survival Guide
Want real protection? Learn more and shop privacy-first tech.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from Gizchina.com
Pixel 10 Pro Fold Becomes First Foldable with Full IP68 Protection
https://www.gizchina.com/2025/07/16/pixel-10-pro-fold-becomes-first-foldable-with-full-ip68-protection/
https://www.gizchina.com/2025/07/16/pixel-10-pro-fold-becomes-first-foldable-with-full-ip68-protection/
Forwarded from The Hacker News
🛑 Google’s AI just stopped a cyberattack before it even began.
An LLM agent named Big Sleep discovered a critical SQLite flaw (CVE-2025-6965) that threat actors were likely about to exploit—making it the first known case of an AI foiling a live exploit attempt.
Details on how it worked → https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html
An LLM agent named Big Sleep discovered a critical SQLite flaw (CVE-2025-6965) that threat actors were likely about to exploit—making it the first known case of an AI foiling a live exploit attempt.
Details on how it worked → https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html
Forwarded from The Hacker News
⚠️ WARNING - Google Chrome Zero-Day Alert!
A new exploit is hitting users right now — CVE-2025-6558 lets attackers break out of the browser sandbox.
Update Chrome ASAP → https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html
(Edge, Brave, Opera users: you're not safe either.)
A new exploit is hitting users right now — CVE-2025-6558 lets attackers break out of the browser sandbox.
Update Chrome ASAP → https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html
(Edge, Brave, Opera users: you're not safe either.)
Forwarded from The Hacker News
🚨 Two Android threats just collided — and it’s getting wild.
Hackers are using evil twin apps with the same package name as legit Play Store apps to deliver Konfety malware — now upgraded with fake encryption, APK crashes, dynamic payloads, and hidden installs.
At the same time, TapTrap lets apps hijack your screen taps to grant malware dangerous permissions — no user awareness needed.
This isn’t theoretical. Android 16 is still vulnerable.
Details here → https://thehackernews.com/2025/07/new-konfety-malware-variant-evades.html
Hackers are using evil twin apps with the same package name as legit Play Store apps to deliver Konfety malware — now upgraded with fake encryption, APK crashes, dynamic payloads, and hidden installs.
At the same time, TapTrap lets apps hijack your screen taps to grant malware dangerous permissions — no user awareness needed.
This isn’t theoretical. Android 16 is still vulnerable.
Details here → https://thehackernews.com/2025/07/new-konfety-malware-variant-evades.html
Forwarded from The Hacker News
🚨 M&A chaos isn't just financial—it’s identity chaos too.
Mergers can spawn 25+ siloed systems, untracked privileged accounts, and dangerous role creep. One wrong move? Audit failures or full-blown breaches.
Here’s how to restore order before risk takes over ↓ https://thehackernews.com/expert-insights/2025/07/identity-challenges-in-mergers-and.html
Mergers can spawn 25+ siloed systems, untracked privileged accounts, and dangerous role creep. One wrong move? Audit failures or full-blown breaches.
Here’s how to restore order before risk takes over ↓ https://thehackernews.com/expert-insights/2025/07/identity-challenges-in-mergers-and.html
Forwarded from The Hacker News
⚡ Deepfake CEOs. Fake job offers. Cloned websites.
AI-powered scams are fooling even trained teams—because they look real. These aren’t phishing emails. They’re full-scale impersonation attacks.
See how to stop them in real time.
Watch the webinar → https://thehackernews.com/2025/07/deepfakes-fake-recruiters-cloned-cfos.html
AI-powered scams are fooling even trained teams—because they look real. These aren’t phishing emails. They’re full-scale impersonation attacks.
See how to stop them in real time.
Watch the webinar → https://thehackernews.com/2025/07/deepfakes-fake-recruiters-cloned-cfos.html
Forwarded from The Hacker News
🚨 One flaw. Total takeover.
A critical bug in Windows Server 2025 lets attackers generate any dMSA/gMSA password—across the forest.
It bypasses Credential Guard and can persist for years.
Details here → https://thehackernews.com/2025/07/critical-golden-dmsa-attack-in-windows.html
A critical bug in Windows Server 2025 lets attackers generate any dMSA/gMSA password—across the forest.
It bypasses Credential Guard and can persist for years.
Details here → https://thehackernews.com/2025/07/critical-golden-dmsa-attack-in-windows.html
Forwarded from The Hacker News
🚨 Your AI agent isn’t just helping—it has full access to code, payroll, email, and more.
If one device gets hacked, it can leak everything—fast.
The real risk? It’s not the AI. It’s who (or what) can talk to it.
Learn how to lock it down → https://thehackernews.com/2025/07/ai-agents-act-like-employees-with-root.html
If one device gets hacked, it can leak everything—fast.
The real risk? It’s not the AI. It’s who (or what) can talk to it.
Learn how to lock it down → https://thehackernews.com/2025/07/ai-agents-act-like-employees-with-root.html
Forwarded from The Hacker News
ISPs are high-value DDoS targets—and need tailored defenses.
We tested the DDoS resilience of a leading mobile operator by simulating six attacks that bypassed their CDN and hit the origin server directly.
While network-layer attacks were blocked, two app-layer attacks—a GET Flood and POST Flood—slipped through.
Read the full case study and our hardening recommendations → https://thn.news/african-telecom-ddos
We tested the DDoS resilience of a leading mobile operator by simulating six attacks that bypassed their CDN and hit the origin server directly.
While network-layer attacks were blocked, two app-layer attacks—a GET Flood and POST Flood—slipped through.
Read the full case study and our hardening recommendations → https://thn.news/african-telecom-ddos
Forwarded from The Hacker News
🚨 Hackers are exploiting fully patched SonicWall SMA 100 firewalls using stolen OTP seeds and a stealth backdoor.
Google says the malware, OVERSTEP, rewrites boot scripts, hides logs, and steals credentials—persisting even after reboots.
Full story → https://thehackernews.com/2025/07/unc6148-backdoors-fully-patched.html
Google says the malware, OVERSTEP, rewrites boot scripts, hides logs, and steals credentials—persisting even after reboots.
Full story → https://thehackernews.com/2025/07/unc6148-backdoors-fully-patched.html