IllNess

joined 2 years ago
[–] [email protected] 5 points 1 hour ago

In a statement to CNN, Telegram said the company “has a zero-tolerance policy for illegal pornography” and uses “a combination of human moderation, AI and machine learning tools and reports from users and trusted organizations to combat illegal pornography and other abuses of the platform.”

They have machine learning algorithms for identifying nudity in pictures for decades now. Tech companies also have the best facial recognition software ever.

The company could combine both technologies to instantly stop uploads of content with the faces of previous victims.

[–] [email protected] 5 points 1 day ago

Patria can be translated to motherland, fatherland, or native land but the word for father in Latin is pater. So looking at the word, fatherland is not incorrect.

Land in Latin is usually feminine unless it has to do with ownership.

[–] [email protected] 4 points 1 day ago

They need a law that open sources the code if a device is no longer supported.

Before releasing a product, an audit must show they are prepared to open anything at anytime, without the need for prep.

Better for the environment, better for the consumers. And thr company that released the product doesn't really lose anything.

[–] [email protected] 12 points 2 days ago (1 children)

Weird how Uber can steal files from Alphabet less than 8 years ago and now they are working together with related tech.

[–] [email protected] 2 points 4 days ago (1 children)

I was afraid they were going to kill work profiles for Android.

Fuck Chrome.

[–] [email protected] 104 points 6 days ago (1 children)

Just in case the only thing you're looking for is the price, I'll save you a click.

Beelink hasn’t announced how much the ME mini will cost or when it will be available for purcahse yet.

[–] [email protected] 3 points 1 week ago

Should we look at the history of all illegal immigrants in the US, keep them from owning property, a job, and residence?

We follow Trumps lead and start with the departments of the executive branch first.

[–] [email protected] 29 points 1 week ago

Trump declared moral bankruptcy decades ago.

[–] [email protected] 1 points 1 week ago

As a person that plays Mario Kart, makes sense to me.

[–] [email protected] 21 points 1 week ago (1 children)

I trust your info based solely on your user name.

[–] [email protected] 10 points 1 week ago

They want everyone to parent their kids except themselves.

[–] [email protected] 15 points 1 week ago (5 children)

Not an enthusiast or an export but I have played a lot of Mario Kart.

Doesn't drifting lower the odometer compared to distance since you have to cover distance while your wheels stopped turning?

 

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

Victims are lured into downloading malicious software by interacting with what they are tricked into believing are legitimate job opportunities or project collaborations.

On Windows, HijackLoader is used for delivering Stealc, a general-purpose lightweight info-stealer designed to collect data from browsers and crypto wallet apps, or Rhadamanthys, a more specialized stealer that targets a broad range of applications and data types.

When the target uses macOS, Marko Polo deploys Atomic ('AMOS'). This stealer launched in mid-2023, rented to cybercriminals for $1,000/month, allowing them to snatch various data stored in web browsers.

 

Transport for London, the city's public transportation agency, revealed today that its staff has limited access to systems and email due to measures implemented in response to a Sunday cyberattack.

 

"After an initial chat conversation, the attacker sent a ZIP file that contained COVERTCATCH malware disguised as a Python coding challenge," researchers Robert Wallace, Blas Kojusner, and Joseph Dobson said.

The malware functions as a launchpad to compromise the target's macOS system by downloading a second-stage payload that establishes persistence via Launch Agents and Launch Daemons.

 

American car rental giant Avis disclosed a data breach after attackers breached one of its business applications last month and stole customer personal information.

 

Tracked as CVE-2024-45195 and discovered by Rapid7 security researchers, this remote code execution flaw is caused by a forced browsing weakness that exposes restricted paths to unauthenticated direct request attacks.

view more: next ›