-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security and Proprietary Software Issues


Posted by Roy Schestowitz on May 20, 2023


Ubuntu, Apache, PCLinuxOS, and More

Openwashing: 'Linux' Foundation, Facebook, and More (UPDATED)



Responsible Disclosure: arXiv - redirect on login


↺ Responsible Disclosure: arXiv - redirect on login


> The fix is pretty simple. Any redirection logic should ensure that users can only be redirected to an internal page not an external site.



A Quick Survey of .zip Domains: Your highest risk is running into Rick Astley., (Thu, May 18th)


↺ A Quick Survey of .zip Domains: Your highest risk is running into Rick Astley., (Thu, May 18th)


> A week ago, I wrote about Google starting to offer ".zip" domains and the possible risks associated with this. Earlier today, I quickly surveyed registered .zip domains to see what people are doing with them.



‘Infostealer’ malware evolves to become even more lethal


↺ ‘Infostealer’ malware evolves to become even more lethal


> The class of malware called infostealers continues to evolve into a more lethal threat. These threats are software that can steal sensitive data from a victim’s computer, typically login details, browser cookies, saved credit cards and other financial information.



Google's new registered domains include .zip and .mov for a more "exciting" and insecure internet | TechSpot


↺ Google's new registered domains include .zip and .mov for a more "exciting" and insecure internet | TechSpot


> Google Registry has recently introduced 8 new top-level domains for "dads, grads, and techies," adding .dad, .phd, .prof, .esq, .foo, .nexus, .zip, and .mov...



CrowdStrike warns of rise in VMware ESXi hypervisor attacks


↺ CrowdStrike warns of rise in VMware ESXi hypervisor attacks


> As enterprise adoption of virtualization technology increases, CrowdStrike has observed a rise in ransomware attacks on servers running VMware's ESXi bare-metal hypervisors.



Scality pushes anti-ransomware features in Artesca object storage


↺ Scality pushes anti-ransomware features in Artesca object storage


> Object storage specialist announces v2.0 of Artesca, with a heavy focus on functionality that can protect against ransomware such as object locking, sharding, backup to object etc



SBOMs and security: What IT and DevOps need to know


↺ SBOMs and security: What IT and DevOps need to know


> By integrating software bill of materials creation into the software development lifecycle, IT and DevOps teams can build more secure and maintainable applications.



Windows TCO


Apparent cyberattack forces Philadelphia Inquirer office to close ahead of mayoral primary


↺ Apparent cyberattack forces Philadelphia Inquirer office to close ahead of mayoral primary


> An apparent cyberattack forced the Philadelphia Inquirer to close its office through Tuesday, the newspaper’s spokesperson Evan Benn told CNN in an email on Monday.


> That means the Inquirer’s journalists won’t be in the office on Tuesday as they cover a key election: Philadelphia’s Democratic primary for the mayoral race.



The Philadelphia Inquirer’s operations continue to be disrupted by a cyber incident


↺ The Philadelphia Inquirer’s operations continue to be disrupted by a cyber incident


> The Inquirer had been unable to print its regular Sunday newspaper, and it was not clear until late Sunday afternoon that it would be possible to print Monday’s editions of The Inquirer and Daily News newspapers. Online posting and updating of stories to Inquirer.com continued, though sometimes slower than normal.


> It was unclear when systems would be fully restored, and Inquirer publisher Lisa Hughes said in response to emailed questions that “we are currently unable to provide an exact time line.” The incident was the greatest publication disruption to Pennsylvania’s largest news organization since the blizzard of Jan. 7-8, 1996, and it came just days before Tuesday’s mayoral primary election.



Possible Cyberattack Disrupts The Philadelphia Inquirer


↺ Possible Cyberattack Disrupts The Philadelphia Inquirer


> Ms. Mastrull, who was working as an editor over the weekend, said that staff members had noticed on Saturday that they could not log on to the content management system.



Philadelphia Inquirer hit by cyberattack causing newspaper's largest disruption in decades


↺ Philadelphia Inquirer hit by cyberattack causing newspaper's largest disruption in decades


> The cyberattack has caused the largest disruption to publication of Pennsylvania's largest news organization since a massive blizzard in January 1996, the Inquirer reported.


> The cyberattack precedes a mayoral primary election scheduled for Tuesday. Hughes said the operational disruption would not affect news coverage of the election, although journalists would be unable to use the newsroom on election night.


> Hughes said other Inquirer employees will not be allowed to use offices through at least Tuesday, and the company was looking into coworking arrangements for Tuesday, the Inquirer reported.



Attempted cyber attack responsible for 3-week Newport News library computer outage


↺ Attempted cyber attack responsible for 3-week Newport News library computer outage


> A failed cybersecurity attack is responsible for Newport News Public Library branch computers being out of operation the past three weeks.



FIN7 returns with new ransomware attacks


↺ FIN7 returns with new ransomware attacks


> FIN7 has a long history in the cybercrime world. According to the FBI, the group’s operations date to at least 2015, and FIN7 has targeted some 100 U.S. companies with attacks designed to steal payment credentials and other data that can be used or sold for profit. The group is believed to have developed the ransomware strain that was used to attack Colonial Pipeline in 2021, an incident that resulted in fuel deliveries being disrupted along the Eastern Seaboard and drew attention to the widespread problem of ransomware attacks.



Proprietary


Debt Collectors Want To Use AI Chatbots To Hustle People For Money


↺ Debt Collectors Want To Use AI Chatbots To Hustle People For Money


> The collections industry is pushing GPT-4 as a dystopian new way to make borrowers pay up, replicating the debt system’s long history of racial bias.



My Robotic Mower Woes


↺ My Robotic Mower Woes


> I'm no stranger to robotic lawnmowers. When my wife and I moved into our rural home just over five years ago, we picked up the Husqvarna 450X Automower since I was far too lazy to manually mow my property and the cost was equal to that of a standard riding mower. It was a no-brainer.


> Fast-forward five years. Everything is still going great with the Automower. Some minor repairs were needed but that was mostly my fault since I was allowing the mower into places it shouldn't have been (ie. root systems and dirt "craters"). Then lightning struck our backyard at the beginning of April this year. The mower was fine, since we stow it away inside for the winter but the charging station, charging brick and perimeter wire we not so lucky...


> The lightning traveled along the main perimeter wire and went straight to the charging station. Boom. The charging dock was quite literally blown up into a million tiny pieces and scattered across my backyard. Giant trenches were carved up where the perimeter wire had been embedded in the lawn. This surge also followed the path towards the main power adapter and exploded that as well. All of this happened even with the charging station / adapter turned off and unplugged from any outlet. At least my mower was safe...



Twitter accuses Microsoft of misusing its data, foreshadowing a possible fight over AI


↺ Twitter accuses Microsoft of misusing its data, foreshadowing a possible fight over AI


> In other respects, the letter primarily laid out a series of vaguely worded allegations. For instance, it noted that while Microsoft was required to inform Twitter about its intended use of the data, it failed to do so for six of the eight Microsoft apps that drew on information from the Twitter database.


> Similarly, the letter asserted that at least one Microsoft app had supplied Twitter data to a number of virtual locations that “reference a government entity or agency.” That apparently violated Microsoft's agreement with Twitter, the letter stated, which prohibited the company from retrieving Twitter data “on behalf of ‘any government-related entity’” without first notifying Twitter.



On Regulating AI


↺ On Regulating AI


> ChatGPT just turned 6 (months old). So why does Sam Altman want OpenAI to be regulated? A few hypotheses.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 09:20:11 2024