| Microsoft Security Blog: |
Microsoft identifies a destructive malware operation targeting multiple Ukrainian orgs; the malware looks like ransomware but lacks a ransom recovery mechanism — - Microsoft Threat Intelligence Center (MSTIC) — Microsoft Digital Security Unit (DSU) — Microsoft 365 Defender Threat Intelligence Team| José Adorno / 9to5Mac: |
Gurman: Apple's headset will likely cost $2,000+ and have two CPUs, one on par with the M1 Pro, two 8K displays, and an interchangeable prescription lens option — A Friday report indicated that Apple was having trouble with its rumored AR/VR headset due to overheating, camera … | Mark Gurman / Bloomberg: |
Sources: Apple will expand CarKey availability beyond BMW by this summer, starting with Hyundai's Genesis line; a look at potential Apple headset names — As Apple Inc.'s first mixed-reality headset runs behind schedule, here's a look at what the company could name the product.| Emma Roth / The Verge: |
A flaw in Safari 15's IndexedDB API can leak browser activity and user identifiers, like Google ID, to other sites; Apple was alerted of the flaw on November 28 — check| James Ball / Rolling Stone: |
The UK government hires ad agency M&C Saatchi to run a publicity campaign criticizing Meta's plans to make Messenger end-to-end encrypted by default — The Home Office has hired a high-end ad agency to mobilize public opinion against encrypted communications — with plans that include some shockingly manipulative tactics| Toby Sterling / Reuters: |
Apple will let dating app developers in the Netherlands offer alternative payment options, complying with an order to do so by January 15 or face fines — Apple said on Saturday it would allow developers of dating apps in the Netherlands to offer non-Apple payment options to their users … | Charles McDermid / New York Times: |
A look at Cambodia's embrace of China's authoritarian internet surveillance model, as the country is set to launch a National Internet Gateway on February 16 — Under a new decree, all web traffic will be routed through a government portal. Rights groups say a crackdown on digital expression is about to get worse.| Filipe Espósito / 9to5Mac: |
Sources: Apple is uncertain about using a glass back for the 2022 iPad Pro, and is testing a larger glass Apple logo on the iPad Pro's back for MagSafe charging — Apple is expected to introduce new iPad Pro models this year - previous rumors suggested that the company had been experimenting … | Fais Khan / startups and econ: |
Analysis: Coinbase influences cryptocurrency returns, most coins underperform BTC and ETH over time, and VC-backed coins give the worst returns of all — Note: This is not investment advice and my investment disclosures are below. — Special thanks to my Ali Khan for running the scripts to grab and analyze pricing data.| Becky Sullivan / NPR: |
A month-old ransomware attack on Kronos' workforce management software has disrupted ~8M US employees' payroll; Kronos is aiming for a fix by the end of January — A month-old ransomware attack is still causing administrative chaos for millions of people, including 20,000 public transit workers … | Dan Goodin / Ars Technica: |
Researchers detail SysJoker, backdoor malware targeting Windows, macOS, and Linux, that remained undetected by virtually all malware scanning engines — Never-before-seen, cross-platform SysJoker came from an “advanced threat actor.” — Researchers have uncovered a never … | Christopher Mims / Wall Street Journal: |
Report: Alphabet, Amazon, Meta, and Microsoft laying undersea fiber-optic cables helped increase data transmission capacity by 41% in 2020 while reducing costs — The four tech giants increasingly dominate the internet's critical cable infrastructure — To say that Big Tech controls the internet might seem like an exaggeration.
Try Gemini 3 Pro — Google's newest and most intelligent AI model that helps you bring any idea to life
Transform ML Experimentation with Tangle — Save months of compute time with Tangle, built by Shopify. Try this open-source platform to simplify ML workflows, ensure reproducibility, and seamlessly share with collaborators.
Contract Signed. Project Ready. Tasks Created. — Every project begins with a promise; a contract that outlines the deliverables, the timelines, and the terms. But for most businesses …
Protecting your Cloud Applications Data — Backing up Office 365, Google Workspace, Dropbox & Box data is critical to preventing data loss or corruption, complying with laws and avoiding critical downtime in case of a disaster.
This is a Techmeme archive page. It shows how the site appeared at 4:35 PM ET, January 16, 2022.
The most current version of the site as always is available at our home page. To view an earlier snapshot click here and then modify the date indicated.
| Kyle Chayka / New Yorker: |
| Lisa Richwine / Reuters: |