Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: address Clear Filter

Company that owns Gucci, Balenciaga, other brands confirms hack

In Brief Kering confirmed a data breach affecting customers of its luxury brands Gucci, Balenciaga, Alexander McQueen, Yves Saint Lauren, and others, on Monday. Hackers stole sensitive customer data such as names, email addresses, phone numbers, home addresses, and the total amount of money they spent in stores all over the world. The BBC first reported the breach. Kering said the hackers did not steal credit card numbers and that it has contacted the customers whose data is part of the breac

Weird CPU architectures, the MOV only CPU (2020)

I like CPU architectures, especially weird, interesting and unusual ones. For example, the Intel iAPX 432 is still something I would love to play around with. Recently, I realized that a working CPU can be made with just a simple Move instruction. For this to work, everything needs to be memory mapped. The ALU, program counter, everything. Of course, this idea is nothing new and this idea is called the Transport Triggered Architecture. I decided to have a look into this, how it works and make a

Topics: address alu cpu mov t2

Scammers Will Try to Trick You Into Filling Out Google Forms. Don’t Fall for It

One of the lesser-known apps in the Google Drive online suite is Google Forms. It's an easy, intuitive way to create a web form for other people to enter information into. You can use it for employee surveys, for organizing social gatherings, for giving people a way to contact you, and much more. But Google Forms can also be used for malicious purposes. These forms can be created in minutes, with clean and clear formatting, official-looking images and video, and—most importantly of all—a genuin

Probability of typing a wrong Bitcoin address

I heard someone say that Bitcoin is dangerous because you could easily make a typo when entering an address, sending money to the wrong person, and have no recourse. There are dangers associated with Bitcoin, such as losing a private key, but address typos are not a major concern. Checksums There are several kinds of Bitcoin addresses. Each is at least 20 bytes (160 bits) long, with at least 4 bytes (32 bits) of checksum. The chances of a typo resulting in a valid checksum are about 1 in 232.

Surge in coordinated scans targets Microsoft RDP auth servers

Internet intelligence firm GreyNoise reports that it has recorded a significant spike in scanning activity consisting of nearly 1,971 IP addresses probing Microsoft Remote Desktop Web Access and RDP Web Client authentication portals in unison, suggesting a coordinated reconnaissance campaign. The researchers say that this is a massive change in activity, with the company usually only seeing 3–5 IP addresses a day performing this type of scanning. GreyNoise says that the wave in scans is testin

PyPI now blocks domain resurrection attacks used for hijacking accounts

The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets. PyPI is the official repository for open-source Python packages. It is used by software developers, product maintainers, and companies working with Python libraries, tools, and frameworks. Accounts of project maintainers publishing software on PyPI are linked to email addresses. In the case of some projects, the email address is tied to a do

That 16 Billion Password Story (AKA "Data Troll")

Spoiler: I have data from the story in the title of this post, it's mostly what I expected it to be, I've just added it to HIBP where I've called it "Data Troll", and I'm going to give everyone a lot more context below. Here goes: Headlines one-upping each other on the number of passwords exposed in a data breach have become somewhat of a sport in recent years. Each new story wants to present a number that surpasses the previous story, and the clickbait cycle continues. You can see it coming a

In-depth analysis on Valorant's Guarded Regions

This post is not meant to be an attack towards Riot Games’ Vanguard or Microsoft’s Windows, they have done an excellent job with their products and will continue to do so for the coming years, the content of this post is gathered solely by me, and I am not tied to any game hack publisher or entities. I have no intention of harming any company’s product, and everything here is constructed for educational purposes. In the cutthroat world of online gaming, there is no greater threat to the sanctit

How to move your Google Chrome's address bar on an Android phone (and why you should)

Elyse Betters Picaro / ZDNET Nearly a month ago, Google announced a small but highly anticipated addition to Chrome on Android -- the ability to relocate the browser's address bar to the bottom of the screen. "Depending on the size of your hand and your device," Google explained, "one address bar position may feel more comfortable than the other." This update gives you the flexibility to choose your preferred location. Also: You can ask Gemini AI anything directly in Google Chrome - here's how

Lovense was told its sex toy app leaked users’ emails and didn’t fix it

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Lovense, the maker of internet-connected sex toys, left user emails exposed for months — even after it became aware of the vulnerability. In a blog post spotted by TechCrunch and Bleeping Computer, security researcher BobDaHacker found that they could “turn any username into their email address,” which they could then use to take over someone’s acco

What is X-Forwarded-For and when can you trust it? (2024)

The X-Forwarded-For (XFF) HTTP header provides crucial insight into the origin of web requests. The header works as a mechanism for conveying the original source IP addresses of clients, and not just across one hop, but through chains of multiple intermediaries. This list of IPv4 and IPv6 addresses is helpful to understand where requests have really come from in scenarios where they traverse several servers, proxies, or load balancers. A typical HTTP request goes on a bit of a journey, traversi

Should you use iCloud Private Relay? Here’s how it works

9to5Mac is brought to you by Incogni: Protect your personal info from prying eyes. With Incogni, you can scrub your deeply sensitive information from data brokers across the web, including people search sites. Incogni limits your phone number, address, email, SSN, and more from circulating. Fight back against unwanted data brokers with a 30-day money back guarantee. If you’ve never heard about iCloud Private Relay, it is basically a privacy feature that Apple released in 2021 as part of the iCl

Phishing Email Alert

We are aware of recent phishing emails impersonating Hironori Washizaki from a Gmail address. These messages are fraudulent and were not sent by the IEEE Computer Society. No internal systems have been breached. If you receive such an email, please delete it and do not respond. For questions or to report similar messages, contact [email protected]. Thank you for your attention in this matter.

Phishers Target Aviation Execs to Scam Customers

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending a large payment to scammers. An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime ring that is actively targeting established companies in the transportation and aviation industries. A reader who works in the transportation industry sent a tip about a recent successful phishing campaign that tricked an e

More than you wanted to know about how Game Boy cartridges work

More than you wanted to know about how Game Boy cartridges work By Allison Parrish I set out a while ago to make a Game Boy cartridge from scratch. This is not a novel goal; bootleg Game Boy cartridges have existed almost as long as the Game Boy itself has, and there are many third-party cartridges now available for purchase, or that have copyleft designs. But I wanted to know how Game Boy cartridges work. I was also excited to use the PIO functionality of the RP2040 microcontroller. Now, aft

Occasionally USPS sends me pictures of other people's mail

I’ve been using Informed Delivery from USPS for over 5 years now, and am generally a big fan. However, I’ve noticed that every once in a while I’ll catch a scan of a piece of mail that is not addressed to me. Here is an example of the most recent. Notice, the image contains 2 pieces of mail. The one in back is addressed to me, and I assume I’ll receive it later today. The one in front is addressed to some unknown neighbor in my zip code. As a security conscious software developer, this kind of

Trigon: Exploiting coprocessors for fun and for profit (part 2)

A few months ago, I released a kernel exploit called Trigon. It was significant in that it was deterministic - that is, it cannot fail. However, at the time of release, only A10 devices on iOS 13 - 15 were supported. Since then, support has been implemented for A9(X) and A11 devices. In this blog post, I am going to dive into what it took to support these new devices - I made use of some pretty interesting techniques, which I believe are worthy of a second part to the original writeup. If you h

You can finally move Chrome's address bar on Android - here's how

Elyse Betters Picaro / ZDNET Nearly a month ago, Google announced a small but highly anticipated addition to Chrome on Android -- the ability to relocate the browser's address bar to the bottom of the screen. "Depending on the size of your hand and your device," Google explained, "one address bar position may feel more comfortable than the other." This update gives you the flexibility to choose your preferred location. Also: You can ask Gemini AI anything directly in Google Chrome - here's how

Xbox Hacks: The A20 (2021)

In November of this year (2021) we will hit 20 years since the release of the original Xbox. This console was full of vulnerabilities (or misconfiguration) from the software to the hardware and with such a low price point two decades ago for a computer - it was highly popular. For this post we are going to go into a lot of details regarding one mistake Microsoft made which was the A20. All the discoveries and research belongs to The Xbox Linux Project and Michael Steil. Research was obtained be

Original Xbox Hacks: The A20 CPU Gate (2021)

In November of this year (2021) we will hit 20 years since the release of the original Xbox. This console was full of vulnerabilities (or misconfiguration) from the software to the hardware and with such a low price point two decades ago for a computer - it was highly popular. For this post we are going to go into a lot of details regarding one mistake Microsoft made which was the A20. All the discoveries and research belongs to The Xbox Linux Project and Michael Steil. Research was obtained be

Chrome for Android users can now choose which end of the screen the address bar is on

Andy Walker / Android Authority TL;DR Chrome for Android’s bottom address bar is rolling out widely. Users now have the option to keep the bar at the top of the screen or lower it to the bottom. Google is giving Android Chrome users another way to customize their mobile browsing experience. Announced last month, the Android browser is finally getting a bottom address bar to make navigation a little more mobile-friendly. That update is now rolling out widely. If you’ve been waiting for Chrome

Let's Learn x86-64 Assembly (2020)

Let's Learn x86-64 Assembly! Part 0 - Setup and First Steps published on Apr 18 2020 The way I was taught x86 assembly at the university had been completely outdated for many years by the time I had my first class. It was around 2008 or 2009, and 64-bit processors had already started becoming a thing even in my neck of the woods. Meanwhile, we were doing DOS, real-mode, memory segmentation and all the other stuff from the bad old days. Nevertheless, I picked up enough of it during the classes

Let's Learn x86-64 Assembly Part 0 – Setup and First Steps

Let's Learn x86-64 Assembly! Part 0 - Setup and First Steps published on Apr 18 2020 The way I was taught x86 assembly at the university had been completely outdated for many years by the time I had my first class. It was around 2008 or 2009, and 64-bit processors had already started becoming a thing even in my neck of the woods. Meanwhile, we were doing DOS, real-mode, memory segmentation and all the other stuff from the bad old days. Nevertheless, I picked up enough of it during the classes

Libpostal: C library for parsing/normalizing street addresses around the world

libpostal: international street address NLP libpostal is a C library for parsing/normalizing street addresses around the world using statistical NLP and open data. The goal of this project is to understand location-based strings in every language, everywhere. For a more comprehensive overview of the research behind libpostal, be sure to check out the (lengthy) introductory blog posts: 🇧🇷 🇫🇮 🇳🇬 🇯🇵 🇽🇰 🇧🇩 🇵🇱 🇻🇳 🇧🇪 🇲🇦 🇺🇦 🇯🇲 🇷🇺 🇮🇳 🇱🇻 🇧🇴 🇩🇪 🇸🇳 🇦🇲 🇰🇷 🇳🇴 🇲🇽 🇨🇿 🇹🇷 🇪🇸 🇸🇸 🇪🇪 🇧🇭 🇳🇱 🇨🇳 🇵🇹 🇵🇷 🇬🇧 🇵🇸 Address

Ask HN: Worth leaving position over push to adopt vibe coding?

My company is increasingly pushing prompt engineering as the single way we "should" be coding. The CEO & CTO are both obsessed with it and promote things like "delete entire unit test file & have claude generate a new one" rather than manually address test failures. I'm a 'senior engineer' with ~5 years of industry experience and am considering moving on from this company because I don't want 1. Be pushed into a workflow that will cause my technical growth to stall or degrade 2. Be overseeing

I tried Google Chrome’s new bottom URL bar on Android, and it’s a mess

Andy Walker / Android Authority Google Chrome on Android has finally caught up with the rest of civilization by bashing two rocks together to introduce a bottom URL bar. Users who have sought out the feature and found it on Firefox, Samsung Internet, and Microsoft Edge can now choose which address bar position they prefer on Google’s browser: the traditional top of the screen or the more convenient bottom-edge placement. Don’t get me wrong — while I am annoyed that Google took this long to imp

Alleged Verizon data breach sees 61M customer records offered for sale

An alleged Verizon data breach has seen hackers offering for sale a database of 61 million customer records, which includes personal information useful for both phishing attempts and identity theft. The sample data supplied includes name, full postal address, date of birth, email address, phone number(s), tax identification code, and other ID codes … Security researchers at SafetyDetectives said that the data was being offered for sale, but the samples posted were too small to confirm the vera