Tag: code

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • Hacker News: Superior Internet Privacy with Whonix

    Source URL: https://www.whonix.org/wiki/Homepage Source: Hacker News Title: Superior Internet Privacy with Whonix Feedly Summary: Comments AI Summary and Description: Yes Summary: Whonix is a privacy-focused operating system that offers robust anonymity and security features, primarily by routing internet traffic through the Tor network. Its architecture and numerous security measures provide advanced protection against various online…

  • Hacker News: The Canva outage: another tale of saturation and resilience

    Source URL: https://surfingcomplexity.blog/2024/12/21/the-canva-outage-another-tale-of-saturation-and-resilience/ Source: Hacker News Title: The Canva outage: another tale of saturation and resilience Feedly Summary: Comments AI Summary and Description: Yes Summary: The incident at Canva, detailed by Brendan Humphries, highlights a series of interconnected failures that led to a significant service outage. Notably, a CDN misconfiguration and an API gateway performance…

  • Hacker News: My AI/LLM predictions for the next 1, 3 and 6 years

    Source URL: https://simonwillison.net/2025/Jan/10/ai-predictions/ Source: Hacker News Title: My AI/LLM predictions for the next 1, 3 and 6 years Feedly Summary: Comments AI Summary and Description: Yes Summary: The text presents predictions regarding AI and Large Language Models (LLMs) over the next one, three, and six years, with insights into their potential applications, limitations, and societal…

  • The Register: Free-software warriors celebrate landmark case that enforced GNU LGPL

    Source URL: https://www.theregister.com/2025/01/10/german_router_maker_avm_lgpl/ Source: The Register Title: Free-software warriors celebrate landmark case that enforced GNU LGPL Feedly Summary: On the Fritz: German router maker AVM declines to appeal in device rights case after coughing up source code Sebastian Steck, a software developer based in Germany, has obtained the source code and library installation scripts for…

  • Slashdot: See the Thousands of Apps Hijacked To Spy On Your Location

    Source URL: https://yro.slashdot.org/story/25/01/10/0056202/see-the-thousands-of-apps-hijacked-to-spy-on-your-location?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: See the Thousands of Apps Hijacked To Spy On Your Location Feedly Summary: AI Summary and Description: Yes Summary: The report highlights a significant privacy concern involving popular apps that are being exploited to harvest sensitive location data through the advertising ecosystem. This data, which is aggregated by rogue…

  • Simon Willison’s Weblog: My AI/LLM predictions for the next 1, 3 and 6 years, for Oxide and Friends

    Source URL: https://simonwillison.net/2025/Jan/10/ai-predictions/#atom-everything Source: Simon Willison’s Weblog Title: My AI/LLM predictions for the next 1, 3 and 6 years, for Oxide and Friends Feedly Summary: The Oxide and Friends podcast has an annual tradition of asking guests to share their predictions for the next 1, 3 and 6 years. Here’s 2022, 2023 and 2024. This…

  • Hacker News: See the Thousands of Apps Hijacked to Spy on Your Location

    Source URL: https://www.404media.co/candy-crush-tinder-myfitnesspal-see-the-thousands-of-apps-hijacked-to-spy-on-your-location/ Source: Hacker News Title: See the Thousands of Apps Hijacked to Spy on Your Location Feedly Summary: Comments AI Summary and Description: Yes Summary: The article discusses the alarming exploitation of popular mobile apps by rogue advertisers who harvest sensitive location data without user or developer consent. It highlights how this data…

  • The Register: Look for the label: White House rolls out ‘Cyber Trust Mark’ for smart devices

    Source URL: https://www.theregister.com/2025/01/09/white_house_smart_device_security_label/ Source: The Register Title: Look for the label: White House rolls out ‘Cyber Trust Mark’ for smart devices Feedly Summary: Beware the IoT that doesn’t get a security tag The White House this week introduced a voluntary cybersecurity labeling program for technology products so that consumers can have some assurance their smart…