"special register groups" invaded computer dictionaries for decades (2019)
Get new posts by email: Subscribe
Stay updated with the latest in technology, AI, cybersecurity, and more
Get new posts by email: Subscribe
Get new posts by email: Subscribe
It’s a well-worn trope in science fiction. We see it in Stanley Kubrick’s 1968 movie 2001: A Space Odyssey. It’s the premise of the Terminator series, in which Skynet triggers a nuclear holocaust to stop scientists from shutting it down. Those sci-fi roots go deep. AI doomerism, the idea that this technology—specifically its hypothetical upgrades, artificial general intelligence and super-intelligence—will crash civilizations, even kill us all, is now riding another wave. The weird thing is th
Hi HN, we’re Neha and Akash from April ( https://tryapril.com ). We are building an AI executive assistant to help you get through emails and manage your schedule, hands-free while you drive to work, or whenever else you prefer voice interaction. Here's a demo: https://www.youtube.com/watch?v=ISKwEyuQQEo#t=50 ...and here's a second one showing more complex use cases: https://www.youtube.com/watch?v=P8APprJ3-eY. While driving 40 mins daily from SF to Berkeley, my inbox would flood to 30+ email
Posts from this author will be added to your daily email digest and your homepage feed. Noise-canceling earbuds are great productivity tools, blocking out noisy roommates and busy coffee shops so you can focus on studying or work. While there are a number of great options these days, few are as eye-catching like the translucent Beats Studio Buds Plus. And right now, you can buy the stylish wireless earbuds for just $84.99 from Woot — a 50 percent discount and the best price we’ve seen outside o
Thunderbird Pro August 2025 Update In April of this year we announced Thunderbird Pro, additional subscription services from Thunderbird meant to help you get more done with the app you already use and love. These services include a first ever email service from Thunderbird, called Thundermail. They also include Appointment, for scheduling meetings and appointments and Send, an end-to-end encrypted filesharing tool. Each of these services are open source, repositories are linked down below. Th
Security leaders today are rethinking email security, not because traditional methods have failed outright, but because the threat landscape and business needs have evolved beyond what legacy approaches can handle. A surprising but apt analogy keeps surfacing: email security is stuck where antivirus (AV) was a decade ago, and it’s time it evolved like AV did, into an element of EDR. The comparison might not be obvious at first. After all, email and endpoints seem like apples and oranges. But
The Federal Emergency Management Agency (FEMA) will now require disaster survivors to register for federal aid using an email address—a departure from previous policy where email addresses were optional. The move, FEMA employees tell WIRED, puts people across the US with little to no access to internet services at risk of losing out on crucial federal financial assistance after disasters. In an internal operational update document seen by WIRED, the agency states that the new requirements are “
The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets. PyPI is the official repository for open-source Python packages. It is used by software developers, product maintainers, and companies working with Python libraries, tools, and frameworks. Accounts of project maintainers publishing software on PyPI are linked to email addresses. In the case of some projects, the email address is tied to a do
As legal cannabis has expanded around the United States for both recreational and medical use, companies have amassed troves of data about customers and their transactions. People who have applied for medical marijuana cards have had to share particularly personal health data to qualify. For some patients in Ohio who use medical weed, a recent data exposure could impact their sensitive information. Security researcher Jeremiah Fowler found a publicly accessible database in mid-July that appeare
As legal cannabis has expanded around the United States for both recreational and medical use, companies have amassed troves of data about customers and their transactions. People who have applied for medical marijuana cards have had to share particularly personal health data to qualify. For some patients in Ohio who use medical weed, a recent data exposure could impact their sensitive information. Security researcher Jeremiah Fowler found a publicly accessible database in mid-July that appeare
is a senior reviewer focused on smart home and connected tech, with over twenty years of experience. She has written previously for Wirecutter, Wired, Dwell, BBC, and US News. Posts from this author will be added to your daily email digest and your homepage feed. Robots are coming, but are we ready for them? All the big consumer tech companies are working on robotic companions for our homes. There’s Amazon’s Astro, Samsung’s Ballie, LG’s AI Agent, and whatever it is that Apple is dreaming up i
Preventing Domain Resurrection Attacks Summary PyPI now checks for expired domains to prevent domain resurrection attacks, a type of supply-chain attack where someone buys an expired domain and uses it to take over PyPI accounts through password resets. These changes improve PyPI's overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts. Since early June 2025, PyPI has unverified over 1,800 email addresses when
Apple announced at its Worldwide Developers Conference in June that it will release iOS 26 this fall. That update will bring a new Liquid Glass design, call screening and more to your iPhone. But when Apple released iOS 18.2 in December, it introduced a new feature in your Mail app that sorts your incoming emails into different categories for you that's called Categories. "The Mail app automatically sorts your email messages into categories to help you find and manage messages quicker," Apple w
A state-sponsored espionage campaign is targeting foreign embassies in South Korea to deploy XenoRAT malware from malicious GitHub repositories. According to Trellix researchers, the campaign has been running since March and is ongoing, having launched at least 19 spearphishing attacks against high-value targets. Although infrastructure and techniques match the pllaybook of North Korean actor Kimsuky (APT43), there are signs that better match China-based operatives, the researchers say. Multi
Get new posts by email: Subscribe
Spoiler: I have data from the story in the title of this post, it's mostly what I expected it to be, I've just added it to HIBP where I've called it "Data Troll", and I'm going to give everyone a lot more context below. Here goes: Headlines one-upping each other on the number of passwords exposed in a data breach have become somewhat of a sport in recent years. Each new story wants to present a number that surpasses the previous story, and the clickbait cycle continues. You can see it coming a
JMAP MCP Server A Model Context Protocol (MCP) server that provides tools for interacting with JMAP (JSON Meta Application Protocol) email servers. Built with Deno and using the @htunnicliff/jmap-jam client library. Features Email Management Tools Search Emails : Search emails with text queries, sender/recipient filters, date ranges, and keywords : Search emails with text queries, sender/recipient filters, date ranges, and keywords Get Emails : Retrieve specific emails by ID with full detai
We want to ensure your safety and protect you from potential scams. Recently, there have been fraudulent recruitment initiatives online that impersonate our company. These scams aim to deceive unsuspecting applicants by offering nonexistent positions and requesting personal information or upfront fees. Remember that our company does not endorse any job postings outside our official channels. If you encounter a suspicious offer, report it through the job platform on which you found it or report
Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new campaign distributing malware. The attack makes use of the Japanese hiragana character, ん, which can, on some systems, appear as a forward slash and make a phishing URL appear realistic to a person at a casual glance. BleepingComputer has further come across an Intuit phishing campaign using a lookalike domain using the letter L instead of 'i' in Intuit. Booking.com phishi
is a senior reporter who’s been covering and reviewing the latest gadgets and tech since 2006, but has loved all things electronic since he was a kid. Posts from this author will be added to your daily email digest and your homepage feed. Teenage Engineering – best known for its electronic instruments and slick audio gear – has announced a new computer case, a follow-up to its $149 Computer-1 released back in 2021, that it’s claiming is the “cheapest computer case in the world” because the com
is a senior reviewer focused on smart home and connected tech, with over twenty years of experience. She has written previously for Wirecutter, Wired, Dwell, BBC, and US News. Posts from this author will be added to your daily email digest and your homepage feed. The smart home can be scary. It seems like every other month, we hear about another smart home company going out of business, leaving you scrambling for a new way to turn on your lights. Why is it so hard for smart home manufacturers
A new personal productivity app called Ocean is launching to help you triage your overloaded inbox, take action on your emails by turning them into tasks, and share your availability for meetings with others, all in one app. Today, Gmail so heavily dominates the email market that few challengers emerge. Understanding this, Ocean made the decision to work with Gmail, not compete against it. As a third-party client, gaining a footing in the market can be difficult, but successful email apps have
A new personal productivity app called Ocean is launching to help you triage your overloaded inbox, take action on your emails by turning them into tasks, and share your availability for meetings with others, all in one app. Today, Gmail so heavily dominates the email market that few challengers emerge. Understanding this, Ocean made the decision to work with Gmail, not compete against it. As a third-party client, gaining a footing in the market can be difficult, but successful email apps have
The U.S. Department of Justice charged four Ghanaian nationals for their roles in a massive fraud ring linked to the theft of over $100 million in romance scams and business email compromise attacks. The defendants were allegedly high-ranking members of a major international fraud ring based in Ghana that targeted companies and individuals across the United States between 2016 and May 2023. Isaac Oduro Boateng (also known as "Kofi Boat"), Inusah Ahmed ("Pascal"), Derrick Van Yeboah ("Van"), an
It can be frustrating to scroll through your iPhone's Recent calls tab to find the right voicemail or to remember when you talked to someone last. But when Apple introduced iOS 18 in 2024, it included a trick that let you find calls faster in your recent call history. That update brought a lot of new features, like customizable home screens and RCS messaging, as well as a search bar in your iPhone's Phone app. This lets you easily search your call history and voicemails. Before iOS 18, your Pho
In the pirate case there’s no real damage done... but the risks of real damage from prompt injection are constantly increasing as we build more powerful and sensitive systems on top of LLMs. I think this is why we still haven’t seen a successful “digital assistant for your email”, despite enormous demand for this. If we’re going to unleash LLM tools on our email, we need to be very confident that this kind of attack won’t work. My hypothetical digital assistant is called Marvin. What happens i
Get new posts by email: Subscribe
In the pirate case there’s no real damage done... but the risks of real damage from prompt injection are constantly increasing as we build more powerful and sensitive systems on top of LLMs. I think this is why we still haven’t seen a successful “digital assistant for your email”, despite enormous demand for this. If we’re going to unleash LLM tools on our email, we need to be very confident that this kind of attack won’t work. My hypothetical digital assistant is called Marvin. What happens i
I Don't Read Your Email Threads 08 Aug, 2025 Email threads have got to be one of the worst possible forms of communication. You've been here before. A perfectly respectable morning is passing by. You're working through your items at a chipper pace maybe humming a song you heard on Spotify that morning. Then, the dreaded email thread comes through. Innocently, you click into the top email. The only text is "[Your Name] see below." I hate this and I bet you do too. Suddenly, you're transporte