| Microsoft Security Blog: |
Microsoft identifies a destructive malware operation targeting multiple Ukrainian orgs; the malware looks like ransomware but lacks a ransom recovery mechanism — - Microsoft Threat Intelligence Center (MSTIC) — Microsoft Digital Security Unit (DSU) — Microsoft 365 Defender Threat Intelligence Team| José Adorno / 9to5Mac: |
Gurman: Apple's headset will likely cost $2,000+ and have two CPUs, one on par with the M1 Pro, two 8K displays, and an interchangeable prescription lens option — A Friday report indicated that Apple was having trouble with its rumored AR/VR headset due to overheating, camera … | Mark Gurman / Bloomberg: |
Sources: Apple will expand CarKey availability beyond BMW by this summer, starting with Hyundai's Genesis line; a look at potential Apple headset names — As Apple Inc.'s first mixed-reality headset runs behind schedule, here's a look at what the company could name the product.| James Ball / Rolling Stone: |
The UK government hires ad agency M&C Saatchi to run a publicity campaign criticizing Meta's plans to make Messenger end-to-end encrypted by default — The Home Office has hired a high-end ad agency to mobilize public opinion against encrypted communications — with plans that include some shockingly manipulative tactics| FingerprintJS Blog: |
A flaw in Safari 15's IndexedDB API can leak browser activity and user identifiers, like Google ID, to other sites; Apple was alerted of the flaw on November 28 — DISCLAIMER: FingerprintJS does not use this vulnerability in our products and does not provide cross-site tracking services.| Lauren Thomas / CNBC: |
Recent filings from Walmart, including seven US trademark applications, indicate a possible plan to develop and offer virtual goods, NFTs, and a cryptocurrency — - Walmart appears to be venturing into the metaverse with plans to create its own cryptocurrency and collection of NFTs.| Ofir Dor / Globes Online: |
Israeli cybersecurity firm Pentera, formerly Pcysys, raises a $150M Series C led by K1 Investment Management at a $1B valuation, bringing total funding to $190M — The Israeli company's platform tests IT infrastructures, reveals risk and creates a surgical remediation plan … | Toby Sterling / Reuters: |
Apple will let dating app developers in the Netherlands offer alternative payment options, complying with an order to do so by January 15 or face fines — Apple said on Saturday it would allow developers of dating apps in the Netherlands to offer non-Apple payment options to their users … | Charles McDermid / New York Times: |
A look at Cambodia's embrace of China's authoritarian internet surveillance model, as the country is set to launch a National Internet Gateway on February 16 — Under a new decree, all web traffic will be routed through a government portal. Rights groups say a crackdown on digital expression is about to get worse.| Mihai Maganu / CrowdStrike Blog: |
Analysis: malware targeting Linux operating systems, commonly deployed in IoT devices, rose 35% in 2021 YoY; three malware families made up 22%+ of the total — - Malware targeting Linux systems increased by 35% in 2021 compared to 2020 — XorDDoS, Mirai and Mozi malware families accounted … | Filipe Espósito / 9to5Mac: |
Sources: Apple is uncertain about using a glass back for the 2022 iPad Pro, and is testing a larger glass Apple logo on the iPad Pro's back for MagSafe charging — Apple is expected to introduce new iPad Pro models this year - previous rumors suggested that the company had been experimenting … | Becky Sullivan / NPR: |
A month-old ransomware attack on Kronos' workforce management software has disrupted ~8M US employees' payroll; Kronos is aiming for a fix by the end of January — A month-old ransomware attack is still causing administrative chaos for millions of people, including 20,000 public transit workers …
Try Gemini 3 Pro — Google's newest and most intelligent AI model that helps you bring any idea to life
Transform ML Experimentation with Tangle — Save months of compute time with Tangle, built by Shopify. Try this open-source platform to simplify ML workflows, ensure reproducibility, and seamlessly share with collaborators.
Contract Signed. Project Ready. Tasks Created. — Every project begins with a promise; a contract that outlines the deliverables, the timelines, and the terms. But for most businesses …
Protecting your Cloud Applications Data — Backing up Office 365, Google Workspace, Dropbox & Box data is critical to preventing data loss or corruption, complying with laws and avoiding critical downtime in case of a disaster.
This is a Techmeme archive page. It shows how the site appeared at 12:35 AM ET, January 17, 2022.
The most current version of the site as always is available at our home page. To view an earlier snapshot click here and then modify the date indicated.
| Dan Goodin / Ars Technica: |
| Charlotte Schubert / GeekWire: |
| Christopher Mims / Wall Street Journal: |
| Fais Khan / startups and econ: |
| Lisa Richwine / Reuters: |