from here (image source) |
XP's got plenty of bugs, but they're not going anywhere so it's no use finding those.
from here (image source) |
XP's got plenty of bugs, but they're not going anywhere so it's no use finding those.
found on eBaum's World |
This is, unfortunately, the real way online companies value our privacy - not as a matter of principle, but as a resource to be extracted and used/sold.
from here and here |
There is certainly a delicious irony in Google getting called out by none other than Google for taking to long to patch their shit. Seemingly the patch has been available for more than the 90 days that Google's Project Zero usually gives vendors. They didn't even need to develop the patch themselves, just apply it to their product, but apparently it's gotten held up in testing.
Kinda makes you wonder, if Google can't even adhere to their own 90 day policy, why is it reasonable to expect it from others?
Product Page |
The typeface for this could have been anything, but the monochrome green on black binary code is a nice touch.
from here and here (image source) |
If ever there was an organization that a privacy tax would be paid to or filed with, Facebook would be the one. Of course, I don't mean a tax paid for the benefit of privacy - rather your privacy itself is the currency this tax is paid with.
Presumably H&R Block, TaxAct, and TaxSlayer were sending your tax data to Meta in addition to sending it to the government, rather than in place of sending it to the government. I'd hate to think they filing with the wrong entity.
found on Acid Cow |
Now, I don't have a phone or a wife, but I do have passwords out the wazoo, so I guess I'm safe.
from here and here (image source) |
I've heard some people like it rough, but I don't think this is what they had in mind.
found on 9gag |
You may not agree but it's hard to argue with results. This bike would have been stolen if not for the actions of that neighbour.
from here and here |
I think most people have long suspected that computer repair technicians snoop on their customers, so it's not that much of a surprise when a study finds it actually happens. It's really a tough problem when you're forced to trust someone you have no good reason to trust - and that's where family tech support comes in, because you generally have a better concept of how trustworthy a family member is.
from here and here |
Even though the security company that discovered the malware vulnerability aren't publishing it, I have high hopes that people less scrupulous than them will use it to take the criminals down. That's not to say that I don't want the criminals in question to face justice, but rather I have my doubts whether most of them will, and in the absence of legal consequences, the increased cost due to business disruptions could conceivably make the operation less financially viable. Also, if the hack forces them to re-infect people or to infect even more people then that probably will increase their exposure with regards to law enforcement and might be the thing that gets them caught.
found on Reddit |
Don't get me wrong, I feel bad for the people who lost their life savings, but cryptocurrency has long been portrayed as easy money and I think we all expected that to backfire at some point.
from here and here |
I imagine there are some tech support personnel out there who actually care about giving customers accurate information, but often times you get the quick answer that nobody really questions anymore.
Product Page |
Go ahead and make someone a key exchange they can't refuse, while drinking from this Godfather-themed Cryptographer mug
from here and here |
It occurs to me that people might do a better job of creating strong passwords if they got more practice. Maybe you could tell him he needs more reps.
found on Izismile |
There's a couple of ways I can think of to have fun with these. Generally the ideal is to try and trigger false alarms. Mischief shouldn't be at someone else's expense, though, so tread lightly.
from here and here |
I understand that they'd probably rather not have to deal with even more support tickets about forgotten passwords, but Netflix's users did already have the tools to deal with freeloaders on their accounts if they really wanted to, without this new feature.
found on Reddit |
Apparently this was the result of a tree rather than a dog, but would-be trespassers don't need to know that.
from here and here |
I can't think of a single legitimate reason for anyone to ask you to spend a large amount of money on redeemable gift cards. If it's a lot of money then it doesn't seem like a gift, and if it's not a gift then you shouldn't be using gift cards.
from here and here |
It freaks my mother out whenever this happens to her. She can't keep all the pop-ups on her system straight so she doesn't know which ones not to click on. It's a real problem for older people, but also modern systems increasingly use the nag feature to convince you to do what the designers think you should do, and the more things there are nagging you, the harder it is for anyone to keep them all straight.
found on Izismile |
I'm sure we've all encountered someone who's done that. It's understandable too. If you know you're likely to lose the keys then you're going to want to put them some place safe, and I don't mean safe from an attacker but rather safe from your bad memory - and this fits the bill. Also, she's only six. I'd be more concerned about the grown-ass people who still lock the padlock keys with the padlock.
from here and here |
With this legal settlement between Google and the States Attorney Generals for 40 states, I'm starting to wonder who really benefits from privacy lawsuits now. I don't see anything to indicate that the money will go towards the people harmed, and even if it did it wouldn't be enough for each one to buy a coffee. It really seems like only the lawyers benefit, and I worry that we've found ourselves in a situation where privacy now just serves some sort of framework of perverse incentives for the legal profession (and maybe states).
Product Page |
I know what music ran through your mind when you first saw it. This is sort of like a visual play on words. You think it's one thing until you look closely and realize it's something completely different. It's a great violation of expectations.
from here and here (image source) |
That clearly looks like someone tried to force the trunk open at some point, and given the lock is on it when the picture was taken it stands to reason there was something or someone in there at the time. What do you do when you see something like that? Call the police?
found on eBaum's World |
What the Oakland Police want is a way to kill people without putting their officers in even the slightest bit of danger. They want the big bucks for their dangerous job, without the danger part. Unfortunately this really doesn't eliminate the danger, it merely transforms it.
You see, there's only 2 ways this armed robot could work - either it's autonomous (sort of like the Terminator in the movie was) and can direct itself and decide who to shoot, or it's remote controlled by a human operator (which would probably be more likely). Either of these options would be dangerous. The autonomous one could decide wrong and shoot it's handlers or innocent bystanders. Meanwhile the remote controlled one could be hacked and used against it's handlers or innocent bystanders.
from here (image source) |
So long as you've got the approved access controls in place, you're all good. Who cares if the controls are effective, that's not what compliance measures. It doesn't matter that anyone who can navigate stairs can also navigate around this obstacle.
found on Izismile |
I wonder how it works. I imagine it's sending some kind of energy but is it frying the drone's electronics or just interfering with the control signal so that the drone operator can no longer tell it where to go?
from here and here |
If you don't want a record of everything you look at and everything you do sent to Apple, then I have some bad news for you. It appears to happen regardless of what you set on the setting that's supposed to control that sort of thing. Almost as if the setting is a decoy meant to lull you into a false sense of security - or perhaps in this case a false sense of privacy.
from here and here |
Look, I know all software needs to be patched on occasion, and I know it's better that it gets patched than if it doesn't, but there are just soooooo many Microsoft patches! I can't be the only person who tires of hearing about them.
found on Acid Cow |
I think we all know that something about this cake is not right. If you found this in the break room fridge, would you steal a slice anyway? I would not. At least, I wouldn't steal the first piece - I'd let someone else test it for me before I chowed down on delicious cake.
from here and here |
So not only can blockchain transactions be traced, but since the blockchain is forever, even things from a decade ago can be tracked down.
from here and here (image source) |
Ctrl-C and Ctrl-V are the purrrfect way for those little paws to interact with the keyboard.
found on Izismile |
If the Sand People in Star Wars had northern cousins, I'm sure this is what they'd wear, and honestly I can't say I'd blame them. It looks like it will protect you from the cold AND from identification.
from here (image source) |
found on Izismile |
I'm sure there's a good argument for this. For example, maybe if you make too many passwords with a particular body part a bias starts to emerge in the data, so if you're making a lot of passwords you have to keep switching up which body part you use, and this was the last one this engineer had left.
from here and here |
Believe it or not, this was a real scam with a victim and everything. I'm not going to judge or blame the victim, but the scammer certainly found a creative way to take advantage of people.
from here and here |
I feel kinda bad for the makers of WinRAR. Since their product is being used by ransomware, they're bound to get negative attention out of it. Maybe if enough of us who never got a license finally did so it will make up for the hassle this will surely cause.
from here and here |
Phishing that targets verified Twitter users seems like important people problems. If you're one of those people then watch out. I think most people aren't, however.
Product Page |
If you think learning remembering a new password is tough, imagine being a dog and finding out your new name is Spot12346.