Possible Security Deviation
"I've got a phone number for you to call after landing. Advise when ready to copy."
540 publicly visible posts • joined 9 Nov 2007
... it was nice to know you. (NOT.) I like the "... immediately halt charges" part best. That will destroy quite a few deceptive business models.
"Subscribe here for $5/month. Cancel anytime*."
* Your cancellation will become effective after completing the mandatory first five years. Cancellation fee $250. To cancel, send a letter by diplomatic courier to our customer service department in Kabul.
And about that "[T]his rule will have major harmful repercussions for the marketplace", yes, that's the point. Especially for that dystopian Mad Max arena you call "autorenewal marketing".
Things were so much simpler in The Good Old TimesTM...
My parents gave me a very cheap, three-digit combination lock with my very first (also very cheap) bike. One day when I came back from a friend's house, it was stolen. Not the bike. The lock. The bike was still there.
I'm still not sure whether that says more about the quality fo the lock, or the bike...
... or would depend on the country, the configuration of the PBX system, and - as someone noted - the century.
In my place, whatever you dial, if you're not dialling the trunk prefix (typically 0), you'll reach either an internal number, or nobody at all. And everybody in the (/ any) company is familiar with that.
I'm the first one to bash MS any day. But going after Microsoft with the reason that the faulty software affected only Windows machines seems like a bit of a stretch to me.
That's like suing Apple if I buy a shoddy iPhone charger on Amazon from the well-known HZRYGWUL brand store and the charger catches on fire. "After all, my Android phone wasn't affected."
...more about the "protection mode" that was triggered. So a network device was installed that triggered some kind of watchdog system and, instead of just isolating the faulty new component, it somehow brought the whole network down.
I have no clue about how mobile networks are being run. I do understand that many layers of safeguards are necessary to protect the network from faulty/compromised/wrongly configured components. But surely the protective response can't be "let's shut the whole network down". So why did it happen? Was that protection system behaving as designed? Was it built to protect against a different scenario, and made the whole problem worse? Or was it designed to do exactly that to protect against some even more undesirable consequence by disconnecting all devices?
"You gave us your money, and we promised to keep it safe. Except we didn't. But we really thought that rolling our own wallet security would actually work, an so we couldn't really expect that it didn't. So, Force Majeure. But fret not – we are looking into who stole your funds. And in the unlikely case we can pin it somebody more concrete that 'it was the norks', we will share their phone number with you, so you can try to recover your funds. Thanks for your business, and come again (in case you still have some money left)!"
"Still, $25 million is apparently nothing to the industry-wide damages that this incident caused."
Keeping in mind that these $25M are being used to finance the crooks and their operations, allowing the to hire even more talented hackers, and also being a huge advertising for cybercrime, with its "crime pays" message, I think the total bang-for-the-buck ratio of these $25M is several magnitudes higher.
And that's the problem: by paying $25M, the company saved a few million in costs to other scenarios, but caused a damage that is ten to hundred times higher to future victims. And I think they should be liable for this. I'd like to see a class-action lawsuit from future cyber-attack victims against companies that are willing to finance criminals just to keep the cost and consequences of failing to secure their own systems lower. And I'd like to see a smart AG to open a case showing how paying ransoms like this constitutes "material support" of criminal organisations.
All in all it should be more expensive for corporations to pay the ransom than not to. That's the only way to stop this.
I'll keep dreaming.
I know, right? After all, we all know they can't go to space (wouldn't get past the dome), and also, why a heat shield? Everybody knows the higher you go, the colder it gets. And now the reptilian leaders want to sell us using an inflatable rubber dingy to use as a heat shield. It's obviously a scam to hide the secret colonies on the backside of the moon. They should rather spend that money in making free energy available to everybody.
(Just to be sure: /s.)
"The incidents include collisions with objects like gates, chains, parked vehicles, as well as showing an apparent disregard for general traffic safety. [...] including its vehicles entering construction zones or heading toward oncoming traffic, [...]"
To me that sound like typical taxi driver behaviour. Are you sure they were talking about automated cars?
/s
... as long as you don't ask Google "How many fingers|legs|arms does the average human have?"
I wonder how well the AI will deal with Google already messing up your native search results. Ask for the nearest restaurant, and Google will ask back whether you have considered buying a new kitchen instead. If that is the input to the AI search assistant, then the result will be worse than Midjourney attaching a few extra arms to everybody on your faked Christmas family photo.
"[...] that our system had been used in an attempt to access member's data [...]"
1. It is not an "anomaly" if it has been designed that way.
2. Passive voice – "our system had been used to..." – in an attempt to deflect blame (it was the system, not us)
3. "... in an attempt to ..." – forgot to mention it was a successful "attempt"
Such a blunder means that there wasn't an "anomaly", it is a complete fail of incorporating security into the design of the system. Makes you wonder how many more "anomalies" are there, maybe just not as obvious to find as this one.
"Secure by design? Yes, we've read about that somewhere, but we didn't understand it."
When a dishonest company like Roku has "no plans right now" to implement something as bad as this, they're reminding me of the Berlin Wall and Walter Ulbricht's famous "Niemand hat die Absicht, eine Mauer zu errichten!".
That's what happens when you destroy your brand by f%$§ing over your users repeatedly and being dishonest.
"... the desire from people in the business to drill down on things in circumstances where they don't appear that they are correct."
What a nice way to describe a business where asking too many questions will get you nowhere (if some stories are to be believed, said "nowhere" is somewhere out in the desert...)
As usual, Facebook wants to gaslight not only its users, but also regulators, into thinking that "advertising" equals "tracking". Newsflash: It does not.
The model of "subscribe or see ads" is nothing new, and a valid way to earn money.
But "subscribe or we'll track you all over the internet and across all your devices" is, obviously, not. That is asking the user for a ransom to comply with the law. But according to Meta, that is somehow different from the local branch of the Legitimate Businessmen ClubTM showing up at you door asking for a donation so they don't do anything illegal...
"It should be said, however, there's no evidence to suggest this was actually exploited in the real world."
Sure, maybe "no evidence", but still "highly likely", because such things are being found out invariably – either by accident or by trying – and once found out, these tricks will be making the rounds. To pranksters, creeps, criminals, and sleuths.
The usual playing down of these flaws. I'm surprised by the missing "Ibis Hotels takes the safety and security of our guests very seriously."
$sql = sprintf("select * from BOOKINGS where BOOKINGCODE like '%s'", str_replace("-", "%", $entered_code));
I came here to post pretty much the same.
What is wrong with the brains of those people who try to sell the concept that "advertising" and "tracking" are the same thing? "Sorry, dear reader of my blog, I need to track your behaviour and interests and clicks and everything, because without advertising I have no income"... I am fine with advertising. I do not tolerate tracking and surveillance. And if you try to conflate these two concepts, you're (a) dishonest and (b) insulting your users by assuming they're stupid.
And just to make this clear: I don't care who is doing the surveillance – your site, your ad network, my browser, the company that made my browser – the answer is No. Please write that down. "No". Not "No, but if..."; just plain "No."
Thanks for listening to my rant.
"We believe this is the orientation of the lander on the Moon..."
I wonder why it's so difficult to actually know the exact orientation of the lander? Didn't they put accelerometers in to measure the exact orientation? Or ist that not possible due to the reduced gravity?
It sounds like they are guesstimating the orientation from the light received by the different solar panels...?
"[...] only 1,504 users actually looked at the feeds of others, willfully or not. This represented around 0.25 percent of all users."
"Also, we left our complete customer database in a publicly-accessible AWS storage. But it was only like 15 persons downloading it, which is only 0.00047% of all users."
... an alien race captures Voyager 1 and in their quest to find out what it is and why it doesn't appear to work right any more, they connect a serial terminal to a connector that sits next to something that looks like an UART interface to them. After a few experiments with baud rates and stop bit settings, their screen flickers, and character by character, the following message appears:
No keyboard detected.... press F1 to continue.
As a (very) small-time sysadmin, I have trouble understanding why so many very large organisations are so hard-hit by ransomware attacks. Sure, the exfiltrated data is gone, nothing you can do about that. But what about service restoration? Is it really that hard to rebuild a server infrastructure and recover/restore data at least to a certain point?
I know, there's always the odd backup that didn't actually back up anything since the last twelve months, but that should be the exception. Am I the only one who believes in "If you haven't tested restoring, then you do not have a backup"? What's with multi-level, offline or write-once backups? Do they not have incident response and disaster recovery plans?
I would really love to learn more about the detailed problems they're battling. I can't just put all of this down to incompetence or negligence. Are modern infrastructures simply built in a way that makes recovery so hard? Are they all saving so hard that someone has to get the ten-year-old DR plans from the proverbial filing cabinet in a locked bathroom stall in the basement?
Amazing, I always thought that I was some kind of freak because I have a similar kind of memory. I tend to describe it as anti-photographic memory. It's almost like my brain does the opposite of what the main point of that study found: storing (visual) memories in a descriptive form. Kind of like SVG vs JPEG. Withe side effect of sometimes not being able to remember an obvious detail from a scene I witnessed just a minute earlier, just because it wasn't on the list of things to remember.
Needless to say, this leads to interesting situations when I'm refereeing in football... sometimes I have to literally "replay" or "render" a scene in my mind in real-time just to find out what color jersey a certain player had when a foul occurred. So far I've not found anybody who understood this kind of problem...
These days, all the advertising that I get is for dubious crypto currencies, a few Chinese drop-shipping "retailers", and fake advertising for inferior mobile games. Oh, and of course a lot of likes and follows from Kayla8462453, joined two months ago, zero posts, and a link to their OnlyFans page in the bio.
Makes me totally look forward to the privilege of paying for supplying my content to that dumpster fire of a social platform in the future. Maybe that will get them enough money to hire back a few developers to fix this year-old stupid UI bug in their iOS app.
You can abuse the BCC field - by simply using it. This report, and many more cases in the past (probably in the thousands), shows that trying to send bulk email using the BCC method is not safe, because it practically invites the user to mess up. By either not understanding the difference, of by clicking in the wrong field, or because they can't remember which is which.
If you have to send an email to many people, use a bulk email that was build for that purpose. BCC is a crutch that should have been deprecated a long time ago.
Typically, in "BCC blunders", it is the failure of using BCC, and using the CC field instead, to copy-and-paste a bunch of email addresses into.
Using BCC is unsafe because it is very easy to click into the wrong field to paste the addresses into, and thereby facilitates human error.
A bulk email system typically does not even give you the chance to make such a mistake. That's why using BCC for mass emails is considered bad practice – for a long time actually.
Hm, by definition RJ11 is 6P2C, so only the two central contacts should be used. But many "RJ11" cables are actually RJ14, which is 6P4C, so 4 wires are connected. But still not the outer ones. Not sure what the UK did there, but that's not part of the RJ11 standard, AFAIK.
As other have stated, at that time USB wasn't a thing yet. And still, many years later, USB ports on Windows were not completely interchangeable. I remember relocating a PC (probably Win 98) completely with all its peripherals, including a label printer. When setting it up at the new place, I made big mistake: I plugged the printer into a different USB port (there were 4, all on the main board). After powering up, the PC congratulated me on the new printer and happily offered to install the drivers for it, with the caveat that it didn't actually have any software for it.
I powered it down, tried another USB port, same issue, repeat from 1. I bet you can guess how many tries it took me until I got the right port... of course, it was the last one I tried.
I briefly hesitated before putting a sticker on the back explaining which port to use for the Zebra, because I thought it too absurd. But I did it anyway.
... and so does everybody who has ever read (or watched) The Shining.
All work and no play makes Jack adull boy.
All work and no play makes Jackkk a dull boy.
All work and no play MUST KILL ALL HUMANS I'M SORRY DAVE I'M AFRAID I CAN'T DO THAT all your base are belong to us...