Coinbase empies bank accounts without consent

Digital currency exchange Coinbase said it inadvertently charged punters for transactions they never made, effectively draining money from their bank accounts. It has promised to refund the money taken. For the last few days, netizens have been complaining that funds had vanished from bank accounts linked to Coinbase without reason. Some people report multiple charges Read more about Coinbase empies bank accounts without consent[…]

Electronics-recycling innovator faces prison for trying to extend computers’ lives

Eric Lundgren is obsessed with recycling electronics. He built an electric car out of recycled parts that far outdistanced a Tesla in a test. He launched what he thinks is the first “electronic hybrid recycling” facility in the United States, which turns discarded cellphones and other electronics into functional devices, slowing the stream of harmful Read more about Electronics-recycling innovator faces prison for trying to extend computers’ lives[…]

Russians behind bars in US after nicking $300m+ in credit-card hacks

Two Russian criminals have been sent down in America after pleading guilty to helping run the largest credit-card hacking scam in US history.Muscovites Vladimir Drinkman, 37, and Dmitriy Smilianets, 34, ran a massive criminal ring that spent months hacking companies to get hold of credit and debit card information. They then sold it online to Read more about Russians behind bars in US after nicking $300m+ in credit-card hacks[…]

Cleaning products as large a source of urban air pollution as cars

Household cleaners, paints and perfumes have become substantial sources of urban air pollution as strict controls on vehicles have reduced road traffic emissions, scientists say. Researchers in the US looked at levels of synthetic “volatile organic compounds”, or VOCs, in roadside air in Los Angeles and found that as much came from industrial and household Read more about Cleaning products as large a source of urban air pollution as cars[…]

IBM Watson to generate sales solutions

“We’ve trained Watson on our standard solutions and offerings, plus all the prior solutions IBM has designed for large enterprises,” the corporate files state. “This means we can review a client’s RFP [request for proposal] and come up with a new proposed architecture and technical solution design for a state of the art system that Read more about IBM Watson to generate sales solutions[…]

Apple Is Rushing to Fix the Telugu Bug as Assholes Use It to ‘Bomb’ People’s iPhones and Macs

While many bugs are relatively benign, often getting patched before the user knows anything is wrong, the latest plague to hit Apple devices is already wreaking havoc on internet. The issue, which has become known as the Telugu bug, gives people the ability to crash a wide range of iPhone, Mac, and iPad apps just Read more about Apple Is Rushing to Fix the Telugu Bug as Assholes Use It to ‘Bomb’ People’s iPhones and Macs[…]

A Hacker Has Wiped a Spyware Company’s Servers—Again

Last year, a vigilante hacker broke into the servers of a company that sells spyware to everyday consumers and wiped their servers, deleting photos captured from monitored devices. A year later, the hacker has done it again. Thursday, the hacker said he started wiping some cloud servers that belong to Retina-X Studios, a Florida-based company Read more about A Hacker Has Wiped a Spyware Company’s Servers—Again[…]

macOS may lose data on APFS-formatted disk images

This week we reported to Apple a serious flaw in macOS that can lead to data loss when using an APFS-formatted disk image. Until Apple issues a macOS update that resolves this problem, we’re dropping support for APFS-formatted disk images. Note: What I describe below applies to APFS sparse disk images only — ordinary APFS Read more about macOS may lose data on APFS-formatted disk images[…]

Missing data hinder replication of artificial intelligence studies

Last year, computer scientists at the University of Montreal (U of M) in Canada were eager to show off a new speech recognition algorithm, and they wanted to compare it to a benchmark, an algorithm from a well-known scientist. The only problem: The benchmark’s source code wasn’t published. The researchers had to recreate it from Read more about Missing data hinder replication of artificial intelligence studies[…]

A phishing attack scored credentials for more than 50,000 Snapchat users

In late July, Snap’s director of engineering emailed the company’s team in response to an unfolding privacy threat. A government official from Dorset in the United Kingdom had provided Snap with information about a recent attack on the company’s users: a publicly available list, embedded in a phishing website named klkviral.org, that listed 55,851 Snapchat Read more about A phishing attack scored credentials for more than 50,000 Snapchat users[…]

Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated

Video games pirates have reason to celebrate today after scene cracking group CODEX defeated Microsoft’s Universal Windows Platform system on Zoo Tycoon Ultimate Animal Collection. While the game it was protecting isn’t exactly a fan favorite, it was reportedly protected by five layers of DRM within the UWP package, including the Denuvo-like Arxan anti-tamper technology Read more about Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated[…]

New scanning technique reveals secrets behind great paintings

Researchers in the US have used a new scanning technique to discover a painting underneath one of Pablo Picasso’s great works of art, the Crouching Woman (La Misereuse Accroupie). Underneath the oil painting is a landscape of Barcelona which, it turns out, Picasso used as the basis of his masterpiece. The new x-ray fluorescence system Read more about New scanning technique reveals secrets behind great paintings[…]

Posted in Art

Facebook admits SMS notifications sent using two-factor number was caused by bug

The issue, which may have persisted for months or perhaps even longer, was flagged by Bay Area software engineer Gabriel Lewi, who tweeted about it earlier this week. Prominent technology critic and sociologist Zeynep Tufekci then used the situation as a springboard to criticize Facebook’s alleged unethical behavior, thinking the 2FA notifications may have been Read more about Facebook admits SMS notifications sent using two-factor number was caused by bug[…]

New AI model fills in blank spots in photos

The technology was developed by a team led by Hiroshi Ishikawa, a professor at Japan’s Waseda University. It uses convolutional neural networks, a type of deep learning, to predict missing parts of images. The technology could be used in photo-editing apps. It can also be used to generate 3-D images from real 2-D images. The Read more about New AI model fills in blank spots in photos[…]

0 A.D. | A free, open-source game of ancient warfare

0 A.D. (pronounced “zero-ey-dee”) is a free, open-source, historical Real Time Strategy (RTS) game currently under development by Wildfire Games, a global group of volunteer game developers. As the leader of an ancient civilization, you must gather the resources you need to raise a military force and dominate your enemies. […] We intend to portray Read more about 0 A.D. | A free, open-source game of ancient warfare[…]