KarnaSubarna

joined 1 year ago
[–] KarnaSubarna@lemmy.ml -3 points 9 months ago (1 children)
[–] KarnaSubarna@lemmy.ml 8 points 9 months ago* (last edited 9 months ago)

And, here come typical response -

telecom operators have informally shared with the department that the leaked information claimed in the ClouSEK report seems to be a compilation of old data sets of telecom subscribers and it is not due to any vulnerability in their system."

Source: https://telecom.economictimes.indiatimes.com/news/industry/cybersecurity-firm-claims-data-leak-of-750-million-telecom-users-dot-asks-telcos-for-security-audit/107244949

[–] KarnaSubarna@lemmy.ml 5 points 9 months ago* (last edited 9 months ago) (1 children)

Here is my understanding of it -

Currently, TB uses POP3/IMAP protocol to access your Mailbox on Exchange Server.

Ideally, it should be done via MS EWS Web API [1][2] which TB currently doesn't support, but MS Office Outlook does.

Given that MS Exchange is heavily used in corporate/company setup, it[3] will put TB on par with Outlook in that regard.

[1] https://www.techtarget.com/searchwindowsserver/definition/Exchange-Web-Services-EWS

[2] https://www.envisionup.com/blog/pop3-imap-microsoft-exchange-email-platform-use/

[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1847846

[–] KarnaSubarna@lemmy.ml 1 points 9 months ago (2 children)

If you are using Arch, it can be enabled (though it's still experimental) [1]

[1] https://wiki.archlinux.org/title/Variable_refresh_rate#GNOME

[–] KarnaSubarna@lemmy.ml 1 points 9 months ago* (last edited 9 months ago)
[–] KarnaSubarna@lemmy.ml 4 points 9 months ago

The application will stream the selected monitor if the mutter screencast portal is available. If it is unavailable, a fallback to X11 based frame grabbing will happen. As such, it should work fine in almost all setups.

Source: https://gitlab.gnome.org/GNOME/gnome-network-displays

[–] KarnaSubarna@lemmy.ml 14 points 9 months ago* (last edited 9 months ago)

If your use cases (a.k.a. requirements) are met by your current distro, never switch.

If you are satisfied with stability, availability of support, quick availability of security patches, never switch.

This is particularly important when you are using your Linux desktop as your daily driver.

Most you can do is to check what additional features other distros are offering (rolling release, hardened/zen kernel, x86-64-v2/3 support, file system type, user base, availability of packages, package formats, overall documentation etc.), validate if you really need those features.

If you are interested or just curious to test those features, install that distro on a VM (QEMU/KVM) to try it out first safely. Use it on VM for a while, make yourself comfortable with it. Once you are satisfied with it, only then switch.

 

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

 

Location firm Near describes itself as “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Mobilewalla boasts “40+ Countries, 1.9B+ Devices, 50B Mobile Signals Daily, 5+ Years of Data.” X-Mode’s website claims its data covers “25%+ of the Adult U.S. population monthly.”

Fast food restaurants and other businesses have been known to buy location data for advertising purposes down to a person’s steps. For example, in 2018, Burger King ran a promotion in which, if a customer’s phone was within 600 feet of a McDonalds, the Burger King app would let the user buy a Whopper for one cent.

Outlogic (formerly known as X-Mode) offers a license for a location dataset titled “Cyber Security Location data” on Datarade for $240,000 per year. The listing says “Outlogic’s accurate and granular location data is collected directly from a mobile device’s GPS.”

 

Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of 186,892 companies sent data about them to the social network. On average, each participant in the study had their data sent to Facebook by 2,230 companies. That number varied significantly, with some panelists’ data listing over 7,000 companies providing their data.

 

X’s move to make people pay for a basic form of two-factor is problematic. It also created confusion because the company prompted free users to switch away from SMS two-factor, but then seemingly simply turned off the protection altogether for those who didn’t. This likely left a group of users in a situation where they think they have two-factor authentication on, but actually don’t.

 

To exploit the vulnerability, which the researchers call LeftoverLocals, attackers would need to already have established some amount of operating system access on a target’s device. Modern computers and servers are specifically designed to silo data so multiple users can share the same processing resources without being able to access each others’ data. But a LeftoverLocals attack breaks down these walls. Exploiting the vulnerability would allow a hacker to exfiltrate data they shouldn’t be able to access from the local memory of vulnerable GPUs, exposing whatever data happens to be there for the taking, which could include queries and responses generated by LLMs as well as the weights driving the response.

The researchers did not find evidence that Nvidia, Intel, or Arm GPUs contain the LeftoverLocals vulnerability, but Apple, Qualcomm, and AMD all confirmed to WIRED that they are impacted. This means that well-known chips like the AMD Radeon RX 7900 XT and devices like Apple’s iPhone 12 Pro and M2 MacBook Air are vulnerable. The researchers did not find the flaw in the Imagination GPUs they tested, but others may be vulnerable.

 

Update 1/16 - Adblock has informed BleepingComputer that its engineers fixed the problem and released ABP 3.22.1 and AB 5.17.1 on the Opera and Edge extension stores. The same versions are currently in review on the Mozilla and Chrome add-on stores, and should be made available soon.

 

Even if your distro is using Wayland by default, the Xwayland implementation is probably still used for compatibility with X11 apps, so you still need to patch your systems and make sure that the latest version is installed.

 

The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

view more: ‹ prev next ›