Search results

  1. CarderPlanet

    New Looney Tunables vulnerability in Linux: what it is, how it works, and how to fix it

    The vulnerability in glibc puts most Linux systems at risk. The Qualys Threat Research Unit (TRU) has discovered a new vulnerability in Linux systems that can give an attacker full control over the affected systems. The error is called "Looney Tunables" and is related to the handling of the...
  2. CarderPlanet

    Cybermir Institute will provide free protection of NGOs from cyber attacks

    Hundreds of ethical hackers-volunteers will protect the company's systems and create a common threat base. The CyberPeace Institute has announced the creation of a portal in collaboration with the Cyber Response Coalition to help non-governmental organizations (NGOs) in the Netherlands protect...
  3. CarderPlanet

    Google blurs the edges of the future with Personal AI assistant Bard

    The new AI assistant will sort information and even create a post on the social network. At the Made by Google conference, the company announced the launch of its new AI assistant , Assistant with Bard, based on generative artificial intelligence and Bard technology. The new AI assistant is...
  4. CarderPlanet

    Turkey's approach to modern warfare: Ground-based autonomous drones on the front line

    Turkish innovations are changing the game in the world of drones. The Turkish defense industry is looking to replicate the success of its unmanned aerial vehicles, such as the TB-2, in the ground-based systems sector. Several local companies are developing unmanned ground vehicles, hoping that...
  5. CarderPlanet

    Sunset of Apple's freedom: developers must now get a license from the Chinese authorities

    China dictates the conditions for the continued operation of applications in the country. Since September 29, Apple has started requiring app developers to provide proof of licensing by the Chinese government before their apps become available on the Chinese App Store. With this move, Apple...
  6. CarderPlanet

    Meta encountered problems due to its AI stickers

    Meta and their AI stickers... Innovation or just hype? Meta's experiments with introducing new AI features to users have caused a number of problems. In September, after introducing new AI capabilities on its platforms, the company's sticker creation tool began generating controversial phrases...
  7. CarderPlanet

    Another defeat of NATO: strategic documents of the Alliance leaked to the network

    A new data leak caused concern for the level of protection of the agency. NATO says it is actively addressing the impact of an incident affecting Alliance websites after the SiegedSec hacking group claimed to have stolen numerous strategic planning and research documents from NATO. It is noted...
  8. CarderPlanet

    Prada on the Moon: Historic partnership with NASA Changes the future of Space Travel

    Fashion and space? Yes, it is possible! Italian fashion house Prada is partnering with Texas startup Axiom Space to develop an innovative space suit for NASA astronauts who will go to the moon. This became known on Wednesday. Planned for December 2025, the Artemis III mission also includes...
  9. CarderPlanet

    GRUB2 NTFS driver vulnerability that allows executing code and bypassing UEFI Secure Boot

    A vulnerability CVE-2023-4692) has been identified in the driver that provides work with the NTFS file system in the GRUB2 loader, which allows you to organize the execution of your code at the loader level when accessing a specially designed file system image. The vulnerability can be used to...
  10. CarderPlanet

    Thousands of residents of Himachal Pradesh lost more than $25 million in a cryptocurrency pyramid scheme

    Scammers who created a pyramid scheme and operated in the Indian state of Himachal Pradesh, starting in 2018, offered investors pseudo-crypto assets called KRO or DGT. According to Indian law enforcement agencies, the criminals managed to involve thousands of investors in the Ponzi scheme and...
  11. CarderPlanet

    Firefox and Cloudflare have enabled ECH support for hiding a domain in HTTPS traffic

    Mozilla has announced the inclusion of support for the ECH (Encrypted Client Hello) mechanism for users of the stable Firefox branch, which continues the development of ESNI (Encrypted Server Name Indication) technology and is designed to encrypt information about TLS session parameters, such as...
  12. CarderPlanet

    In the npm repository, an open source rootkit was first found in the package

    NPM found an interesting package that hides an open source rootkit-r77. Interestingly, this is the first such object in the repository that delivers a rootkit. The malicious package passes under the name node-hide-console-windows and disguises itself as a legitimate node — hide-console-window...
  13. CarderPlanet

    Founder of Bitcoin pyramid AirBit Club sentenced to 12 years in prison

    The Court of the Southern District of New York sentenced employees of the international cryptocurrency pyramid AirBit Club Scott Hughes, Cecilia Millan and Karina Chayres to prison terms. "Such pyramids would not be possible without such helpers. Today's verdicts remind us that any accomplice...
  14. CarderPlanet

    The coordinator of a group of online fraudsters is awaiting trial in St. Petersburg

    The investigator of the Main Directorate of the Ministry of Internal Affairs of Russia for the city of St. Petersburg and the Leningrad region completed the investigation of a criminal case on charges of a 29-year-old man in committing 8 episodes of fraud totaling almost 11 million rubles...
  15. CarderPlanet

    Police detained suspects in embezzlement of money from sellers on popular Internet sites

    Employees of the Department for Organizing the fight against the illegal use of information and Communication Technologies of the Main Directorate of the Ministry of Internal Affairs of Russia for the city of St. Petersburg and the Leningrad region detained two suspects in fraud. "It is...
  16. CarderPlanet

    Chinese brothers exchanged 10 thousand fake iPhones for real ones. They were given 3.5 years in prison

    This amazing story began back in 2011, and ends only now. Three brothers-Zhimin, Zhiqing, and Zhiwei Liao-led a criminal group of 14 people. All of them were engaged in bringing fake iPhones from China, and then went to Apple stores and" under warranty " exchanged them for real iPhones. Thus...
  17. CarderPlanet

    A court in Minsk has sentenced five phone fraudsters to terms ranging from 6 to 9 years in a penal colony

    The Moskovsky District court of Minsk has sentenced five telephone fraudsters to terms ranging from 6 to 9 years in a penal colony, BelTA learned from the Minsk city Prosecutor's Office. All the defendants were found guilty of fraud and theft of property by modifying computer information, and...
  18. CarderPlanet

    Minchanka and her son tried to make money on the crypto exchange and lost more than Br260 thousand

    The Moscow (Minsk) District Department of the Investigative Committee is investigating a criminal case of fraud committed on a particularly large scale. This was reported by the Investigative Committee. It follows from the case file that a 56-year-old Minsk resident was a member of one of the...
  19. CarderPlanet

    In Transcarpathia detained cohabitants who deceived citizens on the sale of non-existent goods

    In Transcarpathia, police investigators, together with the criminal police of the Main Directorate and cyber police, stopped the illegal activities of a couple of cohabitants who lured money from citizens. During the investigation, it was established that the attackers created accounts on the...
  20. CarderPlanet

    Glibc vulnerability ld.so, which allows you to get root rights in the system

    Qualys has identified a dangerous vulnerability (CVE-2023-4911) in the linker ld.so, supplied as part of the Glibc system C library (GNU libc). The vulnerability, codenamed "Looney Tunables", allows a local user to raise their privileges in the system by specifying specially designed data in the...
Top