Samsung Galaxy Source Code Stolen in Data Breach, might show they slow down specific apps

Samsung confirmed on Monday that a cybersecurity attack exposed sensitive internal data including source code for Galaxy smartphones. The group claiming responsibility for the attack, Lapsus$, is the same hacking outfit that breached Nvidia last week and leaked employee credentials and proprietary information onto the internet. In the Samsung hack, the group purportedly posted a Read more about Samsung Galaxy Source Code Stolen in Data Breach, might show they slow down specific apps[…]

Ice Cream Machine Repairers Sue McDonald’s for $900 Million

For years, the tiny startup Kytch worked to invent and sell a device designed to fix McDonald’s notoriously broken ice cream machines, only to watch the fast food Goliath crush their business like the hopes of so many would-be McFlurry customers. Now Kytch is instead seeking to serve out cold revenge—nearly a billion dollars worth Read more about Ice Cream Machine Repairers Sue McDonald’s for $900 Million[…]

Ukraine state media leaks details of 120,000 Russians soldier on website

Ukrainian news website Ukrainska Pravda says the nation’s Centre for Defence Strategies think tank has obtained the personal details of 120,000 Russian servicemen fighting in Ukraine. The publication has now shared this data freely on its website. The Register and others have been unable to fully verify the accuracy of the data from the leak. Read more about Ukraine state media leaks details of 120,000 Russians soldier on website[…]

Hackers hacked by Nvidia Demand NVIDIA Open Source Their Drivers Or They Leak More Data

Hackers that infiltrated NVIDIA systems are now threatening to release more confidential information unless the company commits to open sourcing their drivers. It is unclear what the stolen data contains, but the group confirmed that there are 250GB of hardware related data in their possession. Furthermore, the group confirmed they have evaluated NVIDIA position, which Read more about Hackers hacked by Nvidia Demand NVIDIA Open Source Their Drivers Or They Leak More Data[…]

These Two Mictic Bluetooth Bracelets Put an Entire Orchestra of Virtual Instruments in Your Hands (IOS only :'( )

[…] the Mictic One are two Bkuetooth bracelets equipped with movement sensors. The bracelets connect to a mobile device (only iOS at the moment, but the Android version is under development). From the Mictic application, we can select different musical instruments and control the sound they produce by moving our hands and arms. Think of Read more about These Two Mictic Bluetooth Bracelets Put an Entire Orchestra of Virtual Instruments in Your Hands (IOS only :'( )[…]

NSA report: This is how you should be securing your network

The National Security Agency (NSA) has released a new report that gives all organizations the most current advice on how to protect their IT network infrastructures from cyberattacks. NSA’s report ‘Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance‘ is available freely for all network admins and CIOs to bolster their networks from state-sponsored and criminal Read more about NSA report: This is how you should be securing your network[…]