Massive data breach compromises billions of personal records around the world

The lawsuit also alleges that NPD violated fiduciary responsibilities and gained unjust benefits, among other offenses. So far, NPD has not officially confirmed the breach or detailed how it happened. In response to the breach, aclass action lawsuitwas filed in Florida against NPD. Verification efforts have also faced challenges. So for it remains unknown whether the leak contains data for every US citizen. The leak includes email addresses and phone numbers, heightening the risk of targeted attacks....

August 13, 2024 · 1 min · 80 words · Michelle Harris

Scientists uncover large liquid water reservoir deep in Mars' crust

Establishing Martian colonies will have to wait until scientists develop a method to access this crucial resource. This depth makes it challenging to access, even with advanced drilling technology. Igneous rocks, formed from cooled magma, are analogous to the granite found in the Sierra Nevada. The discovery sheds light on Mars' geological history and the fate of its once-abundant surface water. However, after Mars lost its atmosphere, these resources vanished....

August 13, 2024 · 1 min · 109 words · Joseph Brown

Anti-Spam SMTP Proxy Server

The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Features

August 12, 2024 · 1 min · 43 words · Robert Bryant

Browsers are finally addressing 0.0.0.0 Day vulnerability

Interestingly, the bug affects macOS and Linux operating systems but not Windows. However, the 0.0.0.0 Day vulnerability was able to bypass both measures. “The impact of 0.0.0.0 Day is far-reaching, affecting individuals and organizations alike,” the researchers stated. They also discovered active exploitation campaigns, such as the ShadowRay attack against AI workloads. Apple has also updated WebKit’s code to block access to 0.0.0.0. For now, Mozilla has updated the Fetch specification to block access to 0....

August 12, 2024 · 1 min · 79 words · Ricky Washington

Free Radmin VPN

This version has many new features, a smarter interface, faster speed and even tighter security.

August 12, 2024 · 1 min · 15 words · Shannon Stephens

HideMyAss! VPN

Make fast connections with the largest VPN service on Earth. Any VPN can do that, but HMA does it best. 20 Gbps server speeds Each server in our core data centers can stream 4K videos 800 times in parallel. No Log VPN We’ve made it simple to understand exactly what we collect and why. Over 6 billion webpages. Unblock them all Geo-locks. With so many places to choose from, you’re never far from a fast, stable connection....

August 12, 2024 · 1 min · 96 words · Joshua Jones

NASA seeks companies to take over its canceled $450 million moon rover project

Sources say that at least a dozen responses from interested parties were received before the August 1 deadline. The agencyissueda Request for Information (RFI) on Friday to seek interest from said organizations. NASA said it would save at least $84 million by ending work on Viper. Featured on TechSpot

August 12, 2024 · 1 min · 49 words · Logan Sanford

Ubuntu will use the latest version of the Linux kernel for new releases moving forward

Canonical recently announced a significant policy change regarding Linux adoption in theUbuntu operating system. As the British companyexplains, Ubuntu follows a strict, time-based release schedule. A stable release cadence is crucial for maintaining a reliable operating system, explains Canonical’s Brett Grandbois. Featured on TechSpot

August 12, 2024 · 1 min · 44 words · Terri Bishop

VyprVPN

Chameleon VyprDNS VyprVPN Cloud Public Wi-Fi Protection Kill Switch More Features

August 12, 2024 · 1 min · 11 words · Matthew Hopkins

Microsoft's free Windows video editor Clipchamp gains a couple of powerful AI tricks

It turns a complicated editing process into something users can fix with a toggle. Of course, users can leave it off if they prefer to preserve ambient sounds. The other feature is background removal for video clips. It’s similar to the background replacement tools in apps like Zoom. Microsoft suggests users could create fun stickers or graphics by removing the background from footage with a foreground subject. Of course, both tools are powered by AI because what isn’t these days....

August 11, 2024 · 1 min · 150 words · Margaret Richardson

Researchers uncover critical vulnerabilities in Qualcomm's Adreno GPU

These drivers' inherent complexity and deep integration with operating systems further increase their susceptibility to security flaws. Qualcomm has alreadypatchedthe holes Google found, but users should not become complacent. The discovery of these vulnerabilities underscores a growing need to focus on the security of mobile GPUs. Much of the attention has historically been on high-end PC and server processors. Featured on TechSpot

August 11, 2024 · 1 min · 62 words · Jamie Thompson

Susan Wojcicki, former YouTube CEO and driving force in Google's growth story, dies at 56

Wojcicki passed away at the age of 56 after a two-year battle with lung cancer. Wojcicki wore many hats at Google over the years. Of course, her most significant legacy is likely YouTube itself. Wojcicki pushed hard for Google to buy the video site when it was still a small operation. Under her leadership, YouTube’s advertising revenue swelled into the billions. Unbelievably saddened by the loss of my dear friend@SusanWojcickiafter two years of living with cancer....

August 11, 2024 · 1 min · 137 words · Michael Cabrera

Ecovacs robot vacuums can be hijacked remotely to spy on you

They can then grant themselves an intimate front-row view into your home. Once they’ve got control, they can connect over the internet for complete remote access. The researchers will present their findings during this year’s Def Con hacking conference. “Their security was really, really, really, really bad,” Giese told TechCrunch. Giese elaborates that hackers can send a quick payload that instantly connects back to their computer. This command-and-control server grants the attacker remote control capabilities over the hijacked robot....

August 10, 2024 · 1 min · 167 words · Emily Patterson