The scourge of software supply chain attacks—an increasingly common hacking technique that hides malicious code in a widely used legitimate program—can take many forms. Hackers can penetrate an update server to seed out their malware, or even break into the network where the software was developed to corrupt it at …
Read More »Warning: Attempt to read property "display_name" on bool in /www/wwwroot/seductrice.net/wp-content/themes/sahifa/framework/functions/breadcrumbs.php on line 136
International Space Station Trash May Have Hit This Florida House
A few weeks ago, something from the heavens came crashing through the roof of Alejandro Otero’s home, and NASA is on the case. In all likelihood, this nearly 2-pound object came from the International Space Station. Otero said it tore through the roof and both floors of his two-story house …
Read More »The XZ Backdoor: Everything You Need to Know
On Friday, a lone Microsoft developer rocked the world when he revealed a backdoor had been intentionally planted in XZ Utils, an open source data compression utility available on almost all installations of Linux and other Unix-like operating systems. The person or people behind this project likely spent years on …
Read More »The Incognito Mode Myth Has Fully Unraveled
If you still hold any notion that Google Chrome’s “Incognito mode” is a good way to protect your privacy online, now’s a good time to stop. Google has agreed to delete “billions of data records” the company collected while users browsed the web using Incognito mode, according to documents filed …
Read More »You Should Update Apple iOS and Google Chrome ASAP
It’s time to check your software updates. March has seen the release of important patches for Apple’s iOS, Google’s Chrome, and its privacy-conscious competitor Firefox. Bugs have also been squashed by enterprise software giants including Cisco, VMware, and SAP. Here’s what you need to know about the security updates issued …
Read More »Yogurt Heist Reveals a Rampant Form of Online Fraud
The saga of WikiLeaks founder Julian Assange continued this week after the UK’s high court ordered a delay in his extradition to the United States. Assange faces 18 charges in the US, including 17 alleged violations of the Espionage Act—charges that have alarmed journalism watchdogs. The two judges who issued …
Read More »OpenAI Can Re-Create Human Voices—but Won’t Release the Tech Yet
Voice synthesis has come a long way since 1978’s Speak & Spell toy, which once wowed people with its state-of-the-art ability to read words aloud using an electronic voice. Now, using deep-learning AI models, software can create not only realistic-sounding voices but can also convincingly imitate existing voices using small …
Read More »Oregon's Breakthrough Right-to-Repair Bill Is Now Law
Oregon governor Tina Kotek yesterday signed the state's Right to Repair Act, which will push manufacturers to provide more repair options for their products than any other state so far. The law, like those passed in New York, California, and Minnesota, will require many manufacturers to provide the same parts, …
Read More »My Favorite Things an Amazon Echo Show Can Do
There are a ton of tricks that smart displays can do. But not all of them are created equal or are worth doing on this style of advice. The basics are easy—just about anyone knows how handy it is to ask any smart speaker or smart display to tell you …
Read More »Jeffrey Epstein’s Island Visitors Exposed by Data Broker
Nearly 200 mobile devices of people who visited Jeffrey Epstein’s notorious “pedophile island” in the years prior to his death left an invisible trail of data pointing back to their own homes and offices. Maps of these visitations generated by a troubled international data broker with defense industry ties, discovered …
Read More »