SolidRun's new board aims to bring machine learning to devices in the field. | Continue reading
Why couldn't the M1 chip have been an Intel chip? | Continue reading
Cyberattacks on vulnerabilities in connected vehicles could have very real physical consequences if security isn't managed properly. | Continue reading
Attackers can join Webex meetings as ghost users, and even remain inside rooms after getting kicked. | Continue reading
The now-patched Messenger bug could have allowed callers to connect audio calls without the callee's knowledge or approval. | Continue reading
As edge computing grows in importance, Red Hat is tweaking its leading Linux and Kubernetes to make the most of it. | Continue reading
SUSE, the major European Linux company, may soon be spun out in a $6 billion IPO. | Continue reading
Microsoft's server-based Linux protection program is now offering a public preview of improved endpoint detection and response features. | Continue reading
Support for FTP links will be disabled for 50% of Chrome 87 users, with a complete removal scheduled for Chrome 88. | Continue reading
New Chinese APT discovered targeting Southeast Asian governments. | Continue reading
GitHub also establishes a $1 million "developer defense fund" to help open source developers fight against abusive DMCA Section 1201 takedown claims. | Continue reading
The Linux Systems Group at Microsoft has developed a Linux distribution for internal use and made it available on GitHub. | Continue reading
The dream of a purely Linux-powered smartphone lives on in the new PinePhone - KDE Community edition. | Continue reading
OpenEDR, announced in September, is available on GitHub starting this week. | Continue reading
Canonical has ported its Juju DevOps approach to making Kubernetes Operators easier and more manageable. | Continue reading
You can use “Signature Face” to brighten up your look before jumping on the next Zoom work call. | Continue reading
The three state-sponsored hacker groups (APTs) are Russia's Strontium (Fancy Bear) and North Korea's Zinc (Lazarus Group) and Cerium. | Continue reading
A UK startup has released a new tool that could finally give coders a practical way of identifying bias in their datasets. | Continue reading
Microsoft recommends using app-based authenticators and security keys instead. | Continue reading
Mammoth research project using Symantec (now NortonLifeLock) telemetry confirms what everyone suspected. | Continue reading
The end of Microsoft Intel PCs? Nonsense! A closer look at the two companies' underlying business models exposes some crucial differences. | Continue reading
Google has now patched five Chrome zero-days in three weeks. | Continue reading
A new report from the Deutsche Bank argues that WFH should mean paying a bit of extra tax. | Continue reading
Intel has released microcode updates today to prevent attackers from abusing the Intel RAPL mechanism to steal sensitive data from its CPUs. | Continue reading
Who says you need a few million bucks to build a supercomputer? Joshua Kiepert put together a Linux-powered Beowulf cluster with Raspberry Pi computers for less than $2,000. | Continue reading
Malicious code was found hidden inside a JavaScript library named Discord.dll. | Continue reading
The Microsoft November 2020 Patch Tuesday fixes 112 vulnerabilities, 24 of which are remote code execution (RCE) bugs. | Continue reading
When attention is focused elsewhere, a business can make controversial decisions. But when even your own employees speak out, you may have a problem. Especially when it involves technology and safety. | Continue reading
Compal factories build laptops for Apple, Acer, Lenovo, Dell, Toshiba, HP, and Fujitsu. | Continue reading
AWS can now automatically move content in S3 into the cheapest storage system when the content has not been used for 90 or 180 days. | Continue reading
With iOS 14, some of Apple's apps became a little more detailed. It could be that they're a little too detailed. | Continue reading
Up to a third of existing Android smartphones will start getting error messages from websites secured by Let's Encrypt. | Continue reading
software is commoditized by the appearance of open-source software--its low cost serves as a strong challenge to proprietary software companies' business models. | Continue reading
Automatic email forwarding to be discontinued on January 1, 2021. Existing users told to get a Pro account. | Continue reading
Winning hacker team pockets $744,500 at the Tianfu Cup, China's top hacking contest. | Continue reading
FBI blames intrusions on improperly configured SonarQube source code management tools. | Continue reading
It's easy to get distracted by high-speed charging and wireless charging. | Continue reading
This marks the first time a major Windows ransomware strain has been ported to Linux to aid hackers in their targeted intrusions. | Continue reading
Security firm Check Point reports what appears to be a targeted attack against Israeli companies. | Continue reading
Russia's largest mobile network, MTS, will soon be running on a private cloud built on Canonical's OpenStack cloud software. | Continue reading
Each subscriber gets eight or sixteen hours per month of dedicated time with Honeywell scientists to run algorithms on the trapped-ion hardware. | Continue reading
Someone attached a copy of the GitHub Enterprise Server source code to GitHub's DMCA section, but the GitHub CEO said they mistakenly leaked that code months ago. | Continue reading
Another 23 domains were seized by the US government. | Continue reading
Updated: The small trial could herald a wider rollout with participating residents in the future. | Continue reading
Mattel said the ransomware attack had "no material impact to [its] operations or financial condition." | Continue reading
Passwords for GrowDiaries users were stored using the weak MD5 hashing function, putting customer accounts at risk of attacks. | Continue reading
Robocalls have been reported in Florida, Georgia, Iowa, Kansas, Michigan, Nebraska, New York, New Hampshire, and North Carolina. | Continue reading
With Docker restricting how quickly users can pull down images from its Docker Hub for free, Amazon Web Services is finally creating its own repository of public container images. But there's a bigger problem here for all container and cloud users. | Continue reading