Forwarded from Hacker News
Cloud Island
Rob Isaac (@rmi@cloudisland.nz)
Today Google bricked my Chromebook by force-installing a hidden extension that trains a machine vision model on the contents of my screen without my consent, making the whole machine too hot to touch, and I am once again begging someone, anyone, to remove…
Forwarded from Hacker News
WIRED
How Scammers Actually Work—And How To Avoid Them
Scammers operate everywhere—job recruitment sites, across social media, on dating apps and in your text messages. Arguably the most hurtful and damaging of these scams is romance scams, where the perpetrator spends weeks or months seducing a victim and earning…
Forwarded from Gizchina.com
Hackers Steal Data and Blackmail U.S. Hospitals in Oracle Breach
https://www.gizchina.com/2025/03/29/hackers-steal-data-and-blackmail-u-s-hospitals-in-oracle-breach/
https://www.gizchina.com/2025/03/29/hackers-steal-data-and-blackmail-u-s-hospitals-in-oracle-breach/
Forwarded from Gizchina.com
Samsung Patent Reveals 360-Degree Foldable Phone
https://www.gizchina.com/2025/03/29/samsung-patent-reveals-360-degree-foldable-phone/
https://www.gizchina.com/2025/03/29/samsung-patent-reveals-360-degree-foldable-phone/
Forwarded from Gizchina.com
Gorilla Glass Ceramic Unveiled: Maximum Durability
https://www.gizchina.com/2025/03/29/gorilla-glass-ceramic-unveiled-maximum-durability/
https://www.gizchina.com/2025/03/29/gorilla-glass-ceramic-unveiled-maximum-durability/
Forwarded from Gizchina.com
Intel Ends High-End Graphics Card Project
https://www.gizchina.com/2025/03/29/intel-ends-high-end-graphics-card-project/
https://www.gizchina.com/2025/03/29/intel-ends-high-end-graphics-card-project/
Forwarded from Bones' Tech Garage
Microsoft is pushing hard to make sure they control you and your data.
https://www.makeuseof.com/microsoft-removing-windows-11-install-loophole/
https://www.makeuseof.com/microsoft-removing-windows-11-install-loophole/
MUO
Microsoft Is Removing the Windows 11 Installation Loophole That Lets You Skip Creating an Account
However, if you act fast, there is another workaround you can still use.
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Karui ToDo
An open source Google Tasks alternative to quickly jot down things to do.
Inspired by the system-24 theme and the Windows Mobile design system, this app's design is set to evolve into something even more eye-catching.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: ronynn ʕ •ᴥ•ʔ
❤️ Special thanks to @maxxrew for recommending!
🏷️ Tags: #Android #Notes #Productivity
An open source Google Tasks alternative to quickly jot down things to do.
Inspired by the system-24 theme and the Windows Mobile design system, this app's design is set to evolve into something even more eye-catching.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: ronynn ʕ •ᴥ•ʔ
❤️ Special thanks to @maxxrew for recommending!
🏷️ Tags: #Android #Notes #Productivity
Forwarded from vx-underground
Today Microsoft announced Windows 11 will require a Microsoft account to create a local profile on the computer. They will be removing the bypass option available in the installation command prompt.
There will still be workarounds, but they're making it harder
There will still be workarounds, but they're making it harder
Forwarded from The Hacker News
🚨 New Malware: RESURGE
China-linked hackers are exploiting Ivanti VPNs via CVE-2025-0282.
🛠️ RESURGE = rootkit + bootkit + web shell
🎯 Hits critical infrastructure
🔍 Linked to UNC5337 & Silk Typhoon
Patch now | Ivanti <22.7R2.5 is vulnerable
Full CISA alert: https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
China-linked hackers are exploiting Ivanti VPNs via CVE-2025-0282.
🛠️ RESURGE = rootkit + bootkit + web shell
🎯 Hits critical infrastructure
🔍 Linked to UNC5337 & Silk Typhoon
Patch now | Ivanti <22.7R2.5 is vulnerable
Full CISA alert: https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
Forwarded from cKure
■■■□□ Chrome Zero-Day Flaw Also Affects Firefox.
The finding is surprising since Firefox uses a different browser engine. But it looks like the flaw relates more to how browsers communicate with the Windows OS.
https://me.pcmag.com/en/browsers/29074/chrome-zero-day-flaw-also-affects-firefox
The finding is surprising since Firefox uses a different browser engine. But it looks like the flaw relates more to how browsers communicate with the Windows OS.
https://me.pcmag.com/en/browsers/29074/chrome-zero-day-flaw-also-affects-firefox
PCMag Middle East
Chrome Zero-Day Flaw Also Affects Firefox
The finding is surprising since Firefox uses a different browser engine. But it looks like the flaw relates more to how browsers communicate with the Windows OS.
Forwarded from cKure
■■■■□ HackCat V3 | A cheap Flipper Zero at half the price.
The HackCat V3 is a comprehensive, multi-functional penetration testing device that integrates a wide array of wireless security tools into.
https://www.hackster.io/hacker_nowful/hackcat-v3-india-s-first-multi-pentesting-device-a1a3bc
The HackCat V3 is a comprehensive, multi-functional penetration testing device that integrates a wide array of wireless security tools into.
https://www.hackster.io/hacker_nowful/hackcat-v3-india-s-first-multi-pentesting-device-a1a3bc
Hackster.io
HackCat V3 | India's First Multi Pentesting Device
The HackCat V3 is a comprehensive, multi-functional penetration testing device that integrates a wide array of wireless security tools into
Forwarded from cKure
■■■□□ Again and again, NSO Group’s customers keep getting their spyware operations caught.
https://techcrunch.com/2025/03/28/again-and-again-nso-groups-customers-keep-getting-their-spyware-operations-caught/
https://techcrunch.com/2025/03/28/again-and-again-nso-groups-customers-keep-getting-their-spyware-operations-caught/
TechCrunch
Again and again, NSO Group’s customers keep getting their spyware operations caught | TechCrunch
Despite the stealthy nature of spyware, security researchers keep detecting Pegasus spyware attacks in part because of sloppy 'operational security.'
Forwarded from Pegasus NSO & other spyware
How Roaming Agreements Enable 5G MitM Attacks | media.ccc.de
Licensed to the public under http://creativecommons.org/licenses/by/4.0
#Cellular #5g #Roaming
End-users in cellular networks are at risk of connecting to fake base stations, and we show that mitigations pushed in 5G are insufficient.
Machine-in-the-Middle (MitM) attackers aim to overhear and manipulate network traffic. The MitM position can also be used as an entry point for baseband exploitation. Proceeding from there, attackers can gain full control of a user’s phone. Standardization bodies pushed many mitigations against MitM into the specification of cellular networks. However, roaming agreements still enable powerful attackers to perform seamless attacks – even in 5G!
In this talk, you’ll learn about the complex nature of cellular roaming and how roaming is implemented in recent smartphones. The specification puts a lot of trust in network operators. This impedes security in real-world deployments. We show that the capabilities of network operators exceed the intended capabilities of lawful interception. If those are abused, end-users have no possibility of noticing the attacks.
Attacks on roaming are challenging to prevent or even detect in practice. The specification needs a major update to make cellular roaming secure. Users at risk should be aware of the current state of the system. We discuss multiple mitigations, including solutions for end-user devices.
Licensed to the public under http://creativecommons.org/licenses/by/4.0
#Cellular #5g #Roaming
media.ccc.de
How Roaming Agreements Enable 5G MitM Attacks
End-users in cellular networks are at risk of connecting to fake base stations, and we show that mitigations pushed in 5G are insufficien...