Squire1039

joined 11 months ago
[–] [email protected] 7 points 4 months ago (3 children)

Spoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.

In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?

[–] [email protected] 4 points 4 months ago (1 children)

I am somewhat reluctant to say it, but if you get into a top-branded school, it will absolutely help you as it will open doors that otherwise would be closed. People will look at you differently, expect from your differently, and you'll expect from yourself differently.

OTH, look at Bill Gate, Steve Job, Michael Dell, etc.; extraordinary people will be extraordinary given the right circumstances, ideas, and perseverance.

[–] [email protected] 6 points 4 months ago

Apparently a common experience with no apparent satisfactory solutions to everybody involved.

[–] [email protected] 7 points 4 months ago

I can't wait until they start delivering packages with humanoid robots... They could spike up Halloween.

[–] [email protected] 3 points 4 months ago (1 children)

The MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.

 

The Green Alley Award is celebrating its 10th anniversary. It's a European award that recognizes and supports startups focused on the circular economy, aiming to reduce waste and resource consumption.

The article highlights the award's achievements over the past decade. It showcases examples of past winners who developed innovative solutions like reusable packaging and bioplastics. This year, the award offers a €25,000 prize and the chance for finalists to network with potential investors and collaborators.

The article emphasizes the growing importance of circular economy solutions as we face resource limitations and climate change. Research suggests that transitioning to a circular economy could significantly reduce our reliance on raw materials. The Green Alley Award plays a role in fostering innovation and progress in this crucial area.

[–] [email protected] 14 points 4 months ago

A speculation, https://www.phoronix.com/news/HDMI-2.1-OSS-Rejected, about HDCP, i.e. not exposing technical details as to prevent video copying, was offered.

[–] [email protected] 4 points 4 months ago

The prof is running in a loop.

 

Summary:

  • US courts have received over 130 requests from law enforcement to access push notification data from phones, reported the Washington Post.
  • This data can reveal a user's location, device details, IP address, and more, even if they use encrypted messaging apps.
  • This raises concerns about privacy, as prosecutors and foreign governments could potentially access this data for various reasons.
  • While Apple and Google are promising more transparency regarding data requests, security experts highlight the potential for abuse by governments and marketing organizations.

Key Points:

  • Push notification metadata includes information like the app receiving the notification, timestamp, and network details.
  • This data is not encrypted and can be used to track user movements and activity.
  • Law enforcement can use this data for investigations, but it also raises concerns about potential misuse by other parties.
  • Experts recommend increased awareness about the information users share through push notifications and the potential privacy risks involved.
 

A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have "sealed the vulnerability."
  • The company wouldn't confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven't commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak's duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
 

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site.

Other links on the story:

 

Scammers hacked the late actor Matthew Perry's Twitter account and posted a fake plea for cryptocurrency donations in the name of his foundation. The foundation confirmed the post was a scam and urged people not to donate.

The article details several possibilities for how the account may have been compromised, highlighting the importance of strong passwords and multi-factor authentication for securing social media accounts, especially for celebrities with large followings.

[–] [email protected] 2 points 4 months ago

both

Town-square when they lure you in, they own everything when they sell you ass off.

[–] [email protected] 3 points 4 months ago

Yeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.

905
My Sister (64.media.tumblr.com)
submitted 4 months ago by [email protected] to c/aww
[–] [email protected] 11 points 4 months ago

I agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from "file/photo" access to capturing your data. The recent Anatsa malware's details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach

 

This article warns users about Android banking trojans, a type of malware that steals online banking credentials and drains accounts.

Key points:

  • Prevalence: These trojans are disguised as legitimate apps and pose a serious threat to Android users, with Malwarebytes detecting over 88,500 in 2023 alone.
  • Deception: They often masquerade as everyday apps like fitness trackers or QR readers or productivity or photography tools, making them difficult to identify.
  • Permissions Requests: Once installed, they request permissions like accessing photos or files, but use them to steal login details.
  • Sneaky Tactics: Some even hide their app icon on the home screen and download additional malware later, bypassing Google Play's security measures.
  • End Goal: Their ultimate aim is to steal your banking information and use it to make unauthorized money transfers.

The article emphasizes that vigilance is crucial, as these trojans are becoming increasingly sophisticated. It also references a recent Anatsa Trojan: https://www.techradar.com/pro/security/this-nasty-new-android-malware-can-easily-bypass-google-play-security-and-its-already-been-downloaded-thousands-of-times

 

Four common habits that "destroy our memory as we age"

  • Multitasking: It strains the prefrontal cortex, crucial for focus and memory formation. Instead, focus on single tasks with breaks for relaxation.
  • Poor sleep: Sleep allows the brain to consolidate memories and remove waste. Prioritize good sleep hygiene by avoiding screens and stimulants before bed.
  • Monotonous activities: Memories are tied to context. Varied experiences provide richer contexts, strengthening memories. Break routine and try new things.
  • Overconfidence in memory: We often overestimate our ability to remember. Embrace the likelihood of forgetting and use active recall techniques like spaced repetition to solidify memories.

By avoiding these habits and adopting healthier practices, the article suggests we can improve memory and potentially prevent "senior moments."

 

This article describes a new study using AI to identify sex differences in the brain with over 90% accuracy.

Key findings:

  • An AI model successfully distinguished between male and female brains based on scans, suggesting inherent sex-based brain variations.
  • The model focused on specific brain networks like the default mode, striatum, and limbic networks, potentially linked to cognitive functions and behaviors.
  • These findings could lead to personalized medicine approaches by considering sex differences in developing treatments for brain disorders.

Additional points:

  • The study may help settle a long-standing debate about the existence of reliable sex differences in the brain.
  • Previous research failed to find consistent brain indicators of sex.
  • Researchers emphasize that the study doesn't explain the cause of these differences.
  • The research team plans to make the AI model publicly available for further research on brain-behavior connections.

Overall, the study highlights the potential of AI in uncovering previously undetectable brain differences with potential implications for personalized medicine.

[–] [email protected] 3 points 4 months ago (2 children)
 

Researchers at Guardio Labs discovered a vast campaign hijacking thousands of subdomains belonging to well-known brands (MSN, VMware, McAfee, The Economist, Cornell University, CBS, Marvel, eBay, etc.).

The attackers use these compromised subdomains to send millions of spammy and malicious emails daily, bypassing security measures by leveraging the trust associated with the hijacked brands.

Here's how it works:

  • Attackers hijack subdomains of established brands through various methods like complex DNS manipulation and exploiting abandoned domains.
  • They manipulate the hijacked subdomains' SPF records to make emails appear as if they originated from the legitimate brands.
  • These emails often contain deceptive content like fake cloud storage warnings, phishing attempts, or misleading advertisements.

The campaign is alarming for several reasons:

  • The scale: Over 8,000 domains have been compromised, and the number is growing.
  • The potential harm: Millions of spam and malicious emails are being sent daily.
[–] [email protected] 5 points 4 months ago

From the project's page:

The wearable system captures peripheral neural signals when internal speech articulators are volitionally and neurologically activated, during a user's internal articulation of words.

It doesn't capture the central signal, but peripheral, most likely from the nerves running around your face and your neck used to produce speech.

 

Key Points

  • A driverless goods train in India traveled over 40 miles (70 km) reaching nearly 62 mph (100 km/h) before being stopped safely.
  • The incident occurred on Sunday morning when the train, carrying chip stones, stopped to change crew and was left without the handbrake applied.
  • Officials used wooden blocks on the tracks to slow down and eventually stop the train, preventing a potential accident.
  • No injuries were reported.
  • The cause of the incident is under investigation, and railway crossings were closed as a precaution.
  • In June, more than 280 people died in a train crash in the Balasore district of Odisha, near the Bay of Bengal.
 

Key Points

  • Arnav Kapur developed AlterEgo, a headset that allows users to search the internet using thought
  • The device picks up brain signals associated with words and uses them to query the internet
  • It can answer questions, solve math problems, and access information discreetly and silently.
  • Beyond personal use, it aims to help people with speech disorders like ALS (amyotrophic lateral sclerosis) and MS (multiple sclerosis).

Media Lab Links

view more: ‹ prev next ›