IllNess

joined 2 years ago
[–] IllNess 25 points 2 months ago

I also admire these people.

They will get fired. Same thing happened at Google. But I hope that isn't the case.

Microsoft has invested a ton of money in Israel. If in the unlikely event that they are able to be convinced to leave Israel, that would be huge.

[–] IllNess 72 points 2 months ago (1 children)

I wonder what big trial was coming up that involved one of those videos? 🤔

[–] IllNess 3 points 2 months ago

I should really keep up with Windows news even if I don't use it.

Thank you for the info and thank you for posting.

[–] IllNess 3 points 2 months ago (2 children)

That's a good point. Beta users save a lot, I mean a lot, of headaches for stable users. I am not sure if Windows even does beta and alpha versions anymore.

[–] IllNess 23 points 2 months ago

It's scarier. They will track everything you are doing not and not have to guess what device you are using behind a shared IP address.

[–] IllNess 46 points 2 months ago (1 children)

21 states have laws for age verification on porn sites. 4 more states are in the process of passing laws for age verification. That's nearly half the states...

[–] IllNess 3 points 2 months ago (1 children)

This site is getting their feed from these news sources' RSS feed. If you'd like to get the same feed, just follow each individual news source

[–] IllNess 2 points 2 months ago

Google Play too. Maybe this is some kind.

https://apps.apple.com/app/your-app-id

https://play.google.com/store/apps/details?id=your.app.package

Looking at the links, this might be some kind of template and they forgot to hide the links. I don't see their app in the Google Play store.

I think this is just a web app. Please correct me if I am wrong.

[–] IllNess 39 points 2 months ago (5 children)

Apple's base is big enough where if a problem like this happens, it's a big deal. Apple has the benefit of controlling both hardware and software.

With Linux, being open source helps it out since so many people can test and chime in.

[–] IllNess 52 points 2 months ago (22 children)

As a developer, I don't believe in multitasking for this very reason.

[–] IllNess 1 points 2 months ago

Sounds good. I'll try a different browser without extensions. Thanks.

[–] IllNess 3 points 2 months ago

I'll try anything at this point. Worth a shot without much effort. Thanks. I'll give it a try.

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
view more: ‹ prev next ›