- Home
- Categories
- Uncategorized
- Visual Studio Code sotto attacco: il worm GlassWorm si diffonde tramite estensioni
Visual Studio Code sotto attacco: il worm GlassWorm si diffonde tramite estensioni
-
Visual Studio Code sotto attacco: il worm GlassWorm si diffonde tramite estensioni
đ Link all'articolo : https://www.redhotcyber.com/post/visual-studio-code-sotto-attacco-il-worm-glassworm-si-diffonde-tramite-estensioni/
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy
-
undefined Cybersecurity & cyberwarfare shared this topic
Gli ultimi otto messaggi ricevuti dalla Federazione
-
Caso Ranucci, le voci dalla piazza. Ma Ăš ora di una manifestazione nazionale
@giornalismo
articolo21.org/2025/10/caso-raâŠ
Splendida piazza, ieri pomeriggio a Santi Apostoli! Grazie a Giuseppe Conte e al M5S per averla organizzata, alle altre forze dâopposizione per aver
-
Sora....
Non riesco a smettere di ridere! Sora ...
Se esiste Sora esisterĂ anche Bugliano [SI SCHERZA]
#ironia #satira https://mastodon.uno/@Dio/115418150876357644
-
@bluberrycookie
Io colleziono, da oltre 20 anni, statuine di fate.
C'Ăš stato un periodo me ne compravo una ogni volta che mi sentivo triste.
-
La Bielorussia ha voglia di democrazia. Intervento dei coniugi e dissidenti Tikhanovski allâEurocamera
@news
https://www.eunews.it/2025/10/22/la-democrazia-in-bielorussia/
Uscito di prigione a giugno grazie alla mediazione statunitense, l'oppositore bielorusso Sergei Tikhanovski senza fronzoli alla Plenaria di Strasburgo. "Deve essere lâEuropa, a prendere la guida dei confini orientali. Deve essere lâEuropa il principale partner per la Bielorussia democratica"
-
What Happened To Running What You Wanted On Your Own Machine?
When the microcomputer first landed in homes some forty years ago, it came with a simple freedomâyou could run whatever software you could get your hands on. Floppy disk from a friend? Pop it in. Shareware demo downloaded from a BBS? Go ahead! Dodgy code you wrote yourself at 2 AM? Absolutely. The computer you bought was yours. It would run whatever you told it to run, and ask no questions.
Today, that freedom is dying. Whatâs worse, is itâs happening so gradually that most people havenât noticed weâre already halfway into the coffin.
News? Pegged.There are always security risks when running code from untrusted sources. The stakes are higher these days when our computers are the gateways to our personal and financial lives. Credit: Screenshot
The latest broadside fired in the war against platform freedom has been fired. Google recently announced new upcoming restrictions on APK installations. Starting in 2026, Google will tightening the screws on sideloading, making it increasingly difficult to install applications that havenât been blessed by the Play Storeâs approval process. Itâs being sold as a security measure, but it will make it far more difficult for users to run apps outside the official ecosystem. There is a security argument to be made, of course, because suspect code can cause all kinds of havoc on a device loaded with a userâs personal data. At the same time, security concerns have a funny way of aligning perfectly with ulterior corporate motives.Itâs a change in tack for Google, which has always had the more permissive approach to its smartphone platform. Contrast it to Apple, which has sold the iPhone as a fully locked-down device since day one. The former company said that if you own your phone, you could do what you want with it. Now, it seems Google is changing its mind ever so slightly about that. There will still be workarounds, like signing up as an Android developer and giving all your personal ID to Google, but itâs a loss to freedom whichever way you look at it.
BeginningsSony put a great deal of engineering into the PlayStation to ensure it would only read Sony-approved discs. Modchips sprung up as a way to get around that problem, albeit primarily so owners could play cheaper pirated games. Credit: Libreleah, CC BY-SA 4.0,
The walled garden concept didnât start with smartphones. Indeed, video game consoles were a bit of a trailblazer in this space, with manufacturers taking this approach decades ago. The moment gaming became genuinely profitable, console manufacturers realized they could control their entire ecosystem. Proprietary formats, region systems, and lockout chips were all valid ways to ensure companies could levy hefty licensing fees from developers. They locked down their hardware tighter than a bank vault, and they did it for one simple reasonâmoney. As long as the manufacturer could ensure the console wouldnât run unapproved games, developers would have to give them a kickback for every unit sold.By and large, the market accepted this. Consoles were single-purpose entertainment machines. Nobody expected to run their own software on a Nintendo, after all. The deal was simpleâyou bought a console from whichever company, and it would only play whatever they said was okay. The vast majority of consumers didnât care about the specifics. As long as the console in question had a decent library, few would complain.
Nintendo created the 10NES copy protection system to ensure its systems would only play games approved by the company itself, in an attempt to exert quality control after the 1983 North American video game crash. Credit: Evan-Amos, public domain
There was always an undergroundâadapters to work around region locks, and bootleg games that relied on various hacksâwith varying popularity over the years. Often, it was high prices that drove this innovationâthink of the many PlayStation mod chips sold to play games off burnt CDs to avoid paying retail.At the time, this approach largely stayed within the console gaming world. It didnât spread to actual computers because computers were tools. You didnât buy a PC to consume content someone else curated for you. You bought it to do whatever you wantedâwrite a novel, make a spreadsheet, play games, create music, or waste time on weird hobby projects. The openness wasnât a bug, or even something anybody really thought about. It was just how computers were. It wasnât just a PC thing, eitherâevery computer on the market let you run what you wanted! It wasnât just desktops and laptops, either; the nascent tablets and PDAs of the 1990s operated in just the same way.
Then came the iPhone, and with it, the App Store. Apple took the locked-down model and applied it to a computer you carry in your pocket. The promise was that youâd only get apps that were approved by Apple, with the implicit guarantee of a certain level of quality and functionality.
Apple is credited with pioneering the modern smartphone, and in turn, the walled garden that is the App Store. Credit: Apple
It was a bold move, and one that raised eyebrows among developers and technology commentators. But it worked. Consumers loved having access to a library of clean and functional apps, built right into the device. Meanwhile, they didnât really care that they couldnât run whatever kooky app some random on the Internet had dreamed up.Apple sold the walled garden as a feature. It wasnât ashamed or hiding the factâit was proud of it. It promised apps with no viruses and no risks; a place where everything was curated and safe. The iPhoneâs locked-down nature wasnât a restriction; it was a selling point.
But it also meant Apple controlled everything. Every app paid Appleâs tax, and every update needed Appleâs permission. You couldnât run software Apple didnât approve, full stop. You might have paid for the device in your pocket, but you had no right to run what you wanted on it. Someone in Cupertino had the final say over that, not you.
When Android arrived on the scene, it offered the complete opposite concept to Appleâs control. It was open source, and based on Linux. You could load your own apps, install your own ROMs and even get root access to your device if you wanted. For a certain kind of user, that was appealing. Android would still offer an application catalogue of its own, curated by Google, but there was nothing stopping you just downloading other apps off the web, or running your own code.
Sadly, over the years, Android has been steadily walking back that openness. The justifications are always reasonable on their face. Security updates need to be mandatory because users are terrible at remembering to update. Sideloading apps need to come with warnings because users will absolutely install malware if you let them just click a button. Root access is too dangerous because it puts the security of the whole system and other apps at risk. But inch by inch, it gets harder to run what you want on the device you paid for.
Windows Watches and Waits
The walled garden has since become a contagion, with platforms outside the smartphone space considering the tantalizing possibilities of locking down. Microsoft has been testing the waters with the Microsoft Store for years now, with mixed results. Windows 10 tried to push it, and Windows 11 is trying harder. The store apps are supposedly more secure, sandboxed, easier to manage, and straightforward to install with the click of a button.
Microsoft has tried multiple times to sell versions of Windows that are locked to exclusively run apps from the Microsoft Store. Thus far, these attempts have been commercial failures. Credit: screenshot
Microsoft hasnât pulled the trigger on fully locking down Windows. Itâs flirted with the idea, but has seen little success. Windows RT and Windows 10 S were both locked to only run software signed by Microsoftâeach found few takers. Desktop Windows remains stubbornly open, capable of running whatever executable you throw at it, even if it throws up a few more dialog boxes and question marks with every installer you run these days.How long can this last? One hopes a great while yet. A great deal of users still expect a computerâa proper one, like a laptop or desktopâto run whatever mad thing they tell it to. However, there is an increasing userbase whose first experience of computing was in these locked-down tablet and smartphone environments. They arenât so demanding about little things like proper filesystem access or the ability to run unsigned code. They might not blink if that goes away.
For now, desktop computing has the benefit of decades of tradition built in to it. Professional software, development tools, and specialized applications all depend on the ability to install whatever you need. Locking that down would break too many workflows for too many important customers. Masses of scientific users would flee to Linux the moment their obscure datalogger software couldnât afford an official license to run on Windows;. Industrial users would baulk at having to rely on a clumsy Microsoft application store when bringing up new production lines.
Apple had the benefit that it was launching a new platform with the iPhone; one for which there were minimal expectations. In comparison, Microsoft would be climbing an almighty mountain to make the same move on the PC, where the culture is already so established. Apple could theoretically make moves in that direction with OS X and people would be perhaps less surprised, but it would still be company making a major shift when it comes to customer expectations of the product.
Hereâs what bothers me most: weâre losing the idea that you can just try things with computers. That you can experiment. That you can learn by doing. That you can take a risk on some weird little program someone made in their spare time. All that goes away with the walled garden. Your neighbour canât just whip up some fun gadget and share it with you without signing up for an SDK and paying developer fees. Your obscure game community canât just write mods and share content because everythingâs locked down. So much creativity gets squashed before it even hits the drawing board because itâs just not feasible to do it.
Itâs hard to know how to fight this battle. So much ground has been lost already, and big companies are reluctant to listen to the esoteric wishers of the hackers and makers that actually care about the freedom to squirt whatever through their own CPUs. Ultimately, though, you can still vote with your wallet. Donât let Personal Computing become Consumer Computing, where youâre only allowed to run code that paid the corporate toll. Make sure the computers youâre paying for are doing what you want, not just what the executives approved of for their own gain. Itâs your computer, it should run what you want it to!
-
@toketin ti devo del pastin !
-
Fastweb conferma il problema e fornisce una dichiarazione ufficiale
đ Link all'articolo : https://www.redhotcyber.com/post/fastweb-conferma-il-problema-e-fornisce-una-dichiarazione-ufficiale/
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy
-
@stefan @docpop love it. We should / could have a whole collection of CC zines for print & share at events. There was this collection of crowdsourced (?) marketing for the Fediverse several years ago, it would be cool to have something updated and broadened out. https://codeberg.org/fediverse/distributopia
Post suggeriti
-
Il processore Intel 386 compie 40 anni: cosĂŹ nacque lâera dei 32 bit
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized redhotcyber hacking cti online cybercrime cybersecurity1
0 Votes1 Posts0 Views -
đ It's European Cybersecurity Month
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized hushline cybersecmonth opensource whistleblowing privacy cybersecurity0 Votes1 Posts4 Views -
0 Votes1 Posts3 Views
-
0 Votes1 Posts2 Views