[-] IllNess@infosec.pub 28 points 2 weeks ago

Nintendo picks and chooses who they sue using their copyrighted images. It's bullshit.

A tech YouTuber got a strike for using a intro screen to a Nintendo game. He did this before. The difference was he was talking about the Mig Switch.

Makes me wonder if they will ever go nuts and just copyright strike every Youtuber that helped them advertise their games for free for decades.

[-] IllNess@infosec.pub 29 points 1 month ago

Looks like they used to understand that piracy lead to sales.

If people don't buy the content, they might buy merchandise.

Or if they have a favorite they sampled, they can buy the physical copy for their collection.

[-] IllNess@infosec.pub 28 points 3 months ago

I'm going to guess she ran it over backing up and then when the car was over the pole, she drove forward and the pole went straight up and went through the trunk flooring.

Anyone have any thoughts?

[-] IllNess@infosec.pub 26 points 3 months ago

I'm gonna guess this is going to be a major pain to debug.

[-] IllNess@infosec.pub 26 points 4 months ago

All color blind people are guilty of copyright infringement for every website they view.

[-] IllNess@infosec.pub 27 points 4 months ago

Even if the writer signed off on this, this should be illegal.

Actually make every AI generated poop have to list their sources. Corps wanted strong copyright laws, here it is.

[-] IllNess@infosec.pub 29 points 5 months ago

When is this shit pulled by Samsung and now Google considered stealing?

[-] IllNess@infosec.pub 28 points 8 months ago

We should leave the parenting to parents.

3
[-] IllNess@infosec.pub 25 points 8 months ago

I love Dragon Ball but besides that Chrono Trigger is my favorite turn based RPG of all time.

15

One of the vulnerabilities (identified as CVE-2024-27198) has a near-maximum severity CVSS rating of 9.8 out of 10 and is an authentication bypass issue in TeamCity's Web component. Researchers from Rapid7 who discovered the vulnerability and reported it to JetBrains have described it as enabling a remote unauthenticated attacker to execute arbitrary code to take complete control of affected instances.

16

One of the vulnerabilities (identified as CVE-2024-27198) has a near-maximum severity CVSS rating of 9.8 out of 10 and is an authentication bypass issue in TeamCity's Web component. Researchers from Rapid7 who discovered the vulnerability and reported it to JetBrains have described it as enabling a remote unauthenticated attacker to execute arbitrary code to take complete control of affected instances.

[-] IllNess@infosec.pub 28 points 8 months ago

They also have one of the most sophisticated communications technology. They had spies everywhere. 2,900 people attacked and they didn't have one spy to tell them a date...

According to The New York Times, Israeli officials had obtained detailed attack plans more than a year before the attack. The document described operational plans and targets, including the size and location of Israeli forces, and raised questions in Israel about how Hamas learned these details.

The Times reported, "Hamas followed the blueprint with shocking precision."

In July 2023, a member of the Israeli signals intelligence unit alerted her superiors that Hamas was conducting preparations for the assault, saying, "I utterly refute that the scenario is imaginary". An Israeli colonel ignored her concerns.

Source: Wikipedia

They allowed this to happen. They wanted a reason to attack and take what's left of Palestine.

29
18
13
20
8
9
[-] IllNess@infosec.pub 25 points 9 months ago

Great article. Thank you for sharing.

As deaths mounted, anti-car activists sought to slow them down. In 1920, Illustrated World wrote, "Every car should be equipped with a device that would hold the speed down to whatever number of miles stipulated for the city in which its owner lived."

We have GPS maps with speed limits built in. They should definitely bring this back.

36
19
11

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

[-] IllNess@infosec.pub 28 points 1 year ago

This does use OpenStreetMap. It adds other public data from other sources.

Out of the four layers Overture Maps provides, th ey use OpenStreetMap for the Transportation and Building layers.

view more: ‹ prev next ›

IllNess

joined 2 years ago