Feed aggregator
Change Healthcare Ransomware Attack Impacts 100M People
Article URL: https://www.securityweek.com/change-healthcare-ransomware-attack-impacts-100-million-people/
Comments URL: https://news.ycombinator.com/item?id=41972219
Points: 1
# Comments: 0
Russia Targeting Ukrainian Military Recruits with Android Windows Malware
Article URL: https://www.securityweek.com/google-russia-targeting-ukrainian-military-recruits-with-android-windows-malware/
Comments URL: https://news.ycombinator.com/item?id=41972211
Points: 2
# Comments: 0
Show HN: A Developer Portfolio as a 2D Game
10 months ago, I made a developer portfolio that you can navigate as a top-down 2D walking sim game. You can check it here : https://jslegenddev.github.io/portfolio/
After posting about it on HN, I received comments saying that the portfolio was nice and original but ultimately recruiters don't have time to play a game.
This time, I tried to build one that tries to maintain the idea of it being a walking sim game but tries to give you all the relevant info as fast as possible.
This is the result of my work : https://jslegenddev.github.io/new-2d-portfolio/ (Link is in the title as well)
I made with with JavaScript, the Kaplay game library and React.
Comments URL: https://news.ycombinator.com/item?id=41972208
Points: 1
# Comments: 0
Cracking the Big Tech Interview–We Built a Tool for That
Article URL: https://datalynn.com
Comments URL: https://news.ycombinator.com/item?id=41972185
Points: 1
# Comments: 1
Intel's FFmpeg Cartwheel 2024Q3 Brings Lunar Lake and Arrow Lake Support
Article URL: https://www.phoronix.com/news/Intel-FFmpeg-Cartwheel-2024Q3
Comments URL: https://news.ycombinator.com/item?id=41972181
Points: 1
# Comments: 0
As the U.S. election nears, Russia, Iran and China step up influence efforts
Lectron System, the Arduino Precursor
Article URL: https://lectron.info/
Comments URL: https://news.ycombinator.com/item?id=41972173
Points: 2
# Comments: 0
The sins of the 90s: Questioning a puzzling claim about mass surveillance
Article URL: https://blog.cr.yp.to/20241028-surveillance.html
Comments URL: https://news.ycombinator.com/item?id=41972172
Points: 1
# Comments: 0
Firefox 132 Ready with Certificate Compression Accelerated SVG Filter Primitives
Article URL: https://www.phoronix.com/news/Mozilla-Firefox-132
Comments URL: https://news.ycombinator.com/item?id=41972171
Points: 2
# Comments: 0
Experts say a proposed revamp to the recycling symbol is still deceptive
Article URL: https://grist.org/accountability/proposed-new-recycling-label-how2recycle-greenblue-california/
Comments URL: https://news.ycombinator.com/item?id=41972143
Points: 2
# Comments: 0
Visualize Your SHA-256
Best Keto Meal Delivery Services of 2024: Get a Healthy Meal Delivered to Your Door
The Obvious-Once-You-Think-About-It Reason Why Education Cuts Fertility
Article URL: https://www.betonit.ai/p/the-obvious-once-you-think-about
Comments URL: https://news.ycombinator.com/item?id=41972037
Points: 2
# Comments: 0
Grunty – Self-hosted desktop app to have AI control your computer
Article URL: https://github.com/suitedaces/computer-agent
Comments URL: https://news.ycombinator.com/item?id=41971993
Points: 3
# Comments: 0
Encoding HAProxy Logs in JSON or CBOR
Article URL: https://www.haproxy.com/blog/encoding-haproxy-logs-in-machine-readable-json-or-cbor
Comments URL: https://news.ycombinator.com/item?id=41971988
Points: 2
# Comments: 0
Clib – Plain C Package Manager
Article URL: https://github.com/clibs/clib
Comments URL: https://news.ycombinator.com/item?id=41971987
Points: 4
# Comments: 0
Europol warns about counterfeit goods and the criminals behind them
With the holidays around the bend, many are looking for gifts for their family and friends. And since we somehow decided we want to give more each time, we’re also looking for good deals.
But European law enforcement agency Europol issued a warning about buying fake goods. Sure, they are cheaper, but they do come with a dark side.
According to Europol’s report titled “Uncovering the ecosystem of intellectual property crime, ”approximately 86 million fake items were seized in the European Union (EU) in 2022 alone, with an estimated total value exceeding EUR 2 billion (US$ 2.1 billion).
Not only does this ecosystem provide buyers with substandard goods, it also enables crimes like intellectual property (IP) crime, cybercrime, money laundering, and environmental crime.
Intellectual property is what drives innovation. Criminals don’t come up with new inventions, they just create cheap copies of popular items without regards for safety of the product, working conditions, or environmental regulations. The only thing counterfeiters are innovating are ways to exploit consumer demand for counterfeit and pirated goods.
The report states:
“The rise of social media, influencers and online commerce have changed consumers’ behavior, increasing their appetite for IP infringing goods or content, while having a low awareness of risks.”
Criminals fully abuse the social media platform algorithms that reach potential buyers using customized ads that speak to their personal interests and preferences. These are often removed after automated reviews.
So, there is another critical role in advertising counterfeit goods, which are influencers. Through their channels, influencers may direct customers to product listings on online stores that evade security protocols about counterfeit adverts.
By buying counterfeit goods you are also unwittingly enabling cybercriminals that are engaged in fraud, corruption, labor exploitation, environmental crime, money laundering, and cybercrime.
On the other hand, the risks of getting caught and the relatively low penalties make IP crime a low-risk, high-benefit criminal activity.
Consumers, however, are not always aware of the fact they are buying counterfeit goods. As sophisticated technologies are used to replicate holograms, logos, and packaging, unaware consumers are more likely than ever to be deceived, and recognizing counterfeit items has become a task that requires specific knowledge and an expert eye.
How to avoid counterfeit goodsNonetheless, there are a few pointers to be given on how to avoid buying counterfeit goods.
- Where possible, buy from the brand’s own store. When that’s not an option look for authorized retailers. Many brands publish lists of authorized sellers on their websites. And some of the larger webstores use “Authenticity Guarantee” badges on their listings.
- When it comes to pricing, follow the old saying: “If it’s too good to be true, it probably is.”
- A legitimate webstore should have contact information, look professional, and specify consumer rights.
- Review advertisements on social media, influencer channels, and chat platforms with a little bit of extra caution.
- Look for consumer reviews. Interestingly, it could be a red flag if the reviews of the product and company are universally bad—or if there are no bad reviews at all.
If you’re not completely sure about the product or the website, at least make sure to use a secured payment page and preferably use your credit card, in case you need to recover your money.
If you have bought a counterfeit product:
- Stop and think before you use it, to consider whether it is safe to use. The materials used for production are likely to be sub-standard and could pose a risk to your health.
- Report it to the platform where you made the purchase and to the legitimate brand.
- Report it to the proper authorities.
Use Malwarebytes Browser Guard to block advertisements, scams, and trackers. It’s a free browser extension for Chrome, Firefox, Edge, and Safari.
Redline, Meta infostealer malware operations seized by police
Article URL: https://www.bleepingcomputer.com/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/
Comments URL: https://news.ycombinator.com/item?id=41971970
Points: 3
# Comments: 1