RSS 생중계
China Clamps Down on High-Speed Traders, Removing Servers
Read more of this story at Slashdot.
Hard Drive Prices Have Surged By an Average of 46% Since September
Read more of this story at Slashdot.
Security updates for Friday
Code.org: Use AI In an Interview Without Our OK and You're Dead To Us
Read more of this story at Slashdot.
Amazon Is Buying America's First New Copper Output In More Than a Decade
Read more of this story at Slashdot.
'Star Wars' Boss Kathleen Kennedy Steps Down From Lucasfilm
Read more of this story at Slashdot.
US Carbon Pollution Rose In 2025, a Reversal From Prior Years
Read more of this story at Slashdot.
Study Finds Weak Evidence Linking Social Media Use to Teen Mental Health Problems
Read more of this story at Slashdot.
Amazon Is Making a Fallout Shelter Competition Reality TV Show
Read more of this story at Slashdot.
New York Introduces Legislation To Crack Down On 3D Printers That Make Ghost Guns
Read more of this story at Slashdot.
Iran's Internet Shutdown Is Now One of the Longest Ever
Read more of this story at Slashdot.
A 0-click exploit chain for the Pixel 9 (Project Zero)
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click attack surface, as efficient analysis often requires message media to be decoded before the message is opened by the user. One such feature is audio transcription. Incoming SMS and RCS audio attachments received by Google Messages are now automatically decoded with no user interaction. As a result, audio decoders are now in the 0-click attack surface of most Android phones.
The blog entry does not question the wisdom of directly exposing audio decoders to external attackers, but it does provide a lot of detail showing how it can go wrong. The first part looks at compromising the codec; part two extends the exploit to the kernel, and part three looks at the implications:
It is alarming that it took 139 days for a vulnerability exploitable in a 0-click context to get patched on any Android device, and it took Pixel 54 days longer. The vulnerability was public for 82 days before it was patched by Pixel.
Astronauts Splash Down To Earth After Medical Evacuation From ISS
Read more of this story at Slashdot.
ASUS Stops Producing Nvidia RTX 5070 Ti and 5060 Ti 16GB
Read more of this story at Slashdot.
Italy's Privacy Watchdog, Scourge of US Big Tech, Hit By Corruption Probe
Read more of this story at Slashdot.
Oracle Trying To Lure Workers To Nashville For New 'Global' HQ
Read more of this story at Slashdot.
Boeing Knew About Flaws in UPS Plane That Crashed in Louisville, NTSB Says
Read more of this story at Slashdot.
Raspberry Pi's New Add-on Board Has 8GB of RAM For Running Gen AI Models
Read more of this story at Slashdot.
Why Go is Going Nowhere
Read more of this story at Slashdot.
Students Increasingly Choosing Community College or Certificates Over Four-Year Degrees
Read more of this story at Slashdot.
