The Source Code for NYC's Forensic DNA Statistical Analysis Tool | Hacker News
tech-realism
Josh Marshall on Twitter
My brain is caught in a subroutine deciding whether this is hilarious or terrifying. Mostly the first. pic.twitter.com/bSz6HCz4Le— Josh Marshall (@joshtpm) October 7, 2022
NYTimes: Mexico Military Is Hacked, Exposing Abuse and Efforts to Evade Oversight
Hackers infiltrated the Mexican Defense Ministry, publishing millions of emails that detail the military’s growing influence over the civilian government.
Poor Usability of Electronic Health Records Can Lead to Drug Errors, Jeopardizing Pediatric Patients
While digital records have improved the delivery of health care and introduced features—such as alerts about potential drug allergies—that can prevent medical errors and patient harm, they have also created unforeseen safety risks and contributed to serious mistakes in treatment. Unintended consequences have resulted from challenges with electronic health records’ (EHRs) usability—meaning the design of these tools, how they’re implemented, and the way clinicians use them.
Franchisees complain they received no details from InterContinental Hotels Group after a cyberattack on the company left hotel owners struggling to book guests for days
The hack on the hotel group highlights the potential ripple effects for franchisees, customers and supply chains.
Marwa Fatafta مروة فطافطة on Twitter
It cannot get anymore dystopian that this.The Israeli army is now using an AI-powered automatic weapon, called Smart Shooter, at a military checkpoint in the old city of Hebron.(video via @abierkhatib) pic.twitter.com/oEVrGcag4b— Marwa Fatafta مروة فطافطة (@marwasf) September 24, 2022
Ask HN: What are examples of companies dying due to many people quitting? | Hacker News
LA public schools hit with back-to-school ransomware attack
Federal agencies step in to help with mitigation and investigation efforts.
Pasquotank camden ems hacking incident impacts 40000 patients
Ghost-gun sellers react to rule aimed to crack down on the homemade guns by offering them in separate parts rather than complete kits that now require a background check
Companies that manufacture easy-to-assemble firearms are offering products in pieces after the Biden administration rule mandates serial numbers and background checks on kits.
Officials are investigating a ransomware attack on the Los Angeles public school system over the weekend
Federal officials are investigating a cyber hack affecting the nation’s second-largest school district.
Alejandra Caraballo on Twitter
In the last 5 days, Libs of Tiktok has tweeted and retweeted 14 posts about Boston Children's Hospital. As a result, BCH providers are being inundated in death threats and harassing calls and emails. It's now affecting their services. This is stochastic terrorism, full stop. pic.twitter.com/CEMlRsX6S4— Alejandra Caraballo (@Esqueer_) August 15, 2022
Daniel Feldman on Twitter
In which a blogger finds the private key used to sign Hyundai car software updates … by googling it. They used a key pair from a popular tutorial. 😂😂😂 pic.twitter.com/ydoWfjbvsR— Daniel Feldman (@d_feldman) August 13, 2022
'Ring Nation' Is Amazon's Reality Show for Our Surveillance Dystopia
Amazon's newest effort to normalize its surveillance network will feature footage from Ring surveillance cameras and commentary from comedian Wanda Sykes.
Launch code for US nukes was 00000000 for 20 years
PALs were not the pals of Strategic Command generals.
FTC Explores Rules Cracking Down on Commercial Surveillance and Lax Data Security Practices
Note: The FTC will host a virtual news conference at 12 p.m. ET today on the ANPR announcement.
Tech, Cyber Companies Launch Security Standard to Monitor Hacking Attempts
Amazon’s AWS, Splunk, IBM and others are cooperating on a format for cyber alerts.
Former Twitter Employee Convicted of Spying for Saudi Arabia
Ahmad Abouammo was found guilty of spying and money laundering.
Buying Cyber Insurance Gets Trickier as Attacks Proliferate, Costs Rise - WSJ
Security chiefs should shop early for coverage and prepare for long questionnaires about their companies’ cyber defenses, industry professionals said.
Equifax Sent Lenders Inaccurate Credit Scores on Millions of Consumers - WSJ
During a three-week period this year, the credit reporting company sent faulty scores to lenders big and small, resulting in higher interest rates and denied applications.
A Cyberattack Illuminates the Shaky State of Student Privacy
At a moment when education technology firms are stockpiling sensitive information on millions of school children, safeguards for student data have broken down.
Free Law Project ⚖ on Twitter
We still need the facts about how PACER/CM/ECF was beached and what materials were accessed, but this is terrible news: It was hacked by "three hostile foreign actors." The only way to fix this is with a new system as defined in the Open Courts Act. We need to pass this bill. https://t.co/3ZpjZXWKnC— Free Law Project ⚖ (@FreeLawProject) July 28, 2022
TMobile fail
LMAO, anyone else remember the thread on the left? Well, here's how it turned out. pic.twitter.com/nMezrdzI2e— Jerry Aldrich (@jerryaldrichiii) July 26, 2022
SOC2: The Screenshots Will Continue Until Security Improves
We got SOC2 certified so now you have to pay us more.
A Eulogy for the CAPTCHA
Gone but not forgotten
In that sense, CAPTCHA is a tidy allegory of American government: annoying, ugly, ineffectual, predatory, nostalgic, a daily confrontation with our own idiocy. Of course it’s dying out.
Police CyberAlarm Uses Alarming Cryptography | Hacker News
First-Hand:No Damned Computer is Going to Tell Me What to DO - The Story of the Naval Tactical Data System, NTDS
This Billion-Dollar Crypto Loan Is Easy to Get, but Gone in a Flash
Flash loans can have benefits, such as helping traders capitalize on price differences between cryptocurrencies on different exchanges. But flash loans have a dark side.
How Complex Systems Fail
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code
KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times…