Advertising

Vietnam Bans Unskippable Ads (phunuonline.com.vn) 50

Vietnam will begin enforcing new online advertising rules in February 2026 that ban forced video ads longer than five seconds and must allow users to close ads with just one tap. "Furthermore, platforms must provide clear icons and instructions for users to report advertisements that violate the law, and allow them to opt out, turn off, or stop viewing inappropriate ads," reports a local news outlet (translated to English). "These reports must be received and processed promptly, and the results communicated to users as required." From the report: In cases where the entity posting the infringing advertisement cannot be identified or where specialized laws do not have specific regulations, the Ministry of Culture, Sports and Tourism is the focal agency to receive notifications and send requests to block or remove the advertisement to organizations and businesses providing online advertising services in Vietnam.

Advertisers, advertising service providers, and advertising transmission and distribution units are responsible for blocking and removing infringing advertisements within 24 hours of receiving a request from the competent authority. For advertisements that infringe on national security, the blocking and removal must be carried out immediately, no later than 24 hours.

In case of non-compliance, the Ministry of Culture, Sports and Tourism, in coordination with the Ministry of Public Security, will apply technical measures to block infringing advertisements and services and handle the matter according to the law. Telecommunications companies and Internet service providers must also implement technical measures to block access to infringing advertisements within 24 hours of receiving a request.

IT

VSCode IDE Forks Expose Users To 'Recommended Extension' Attacks (bleepingcomputer.com) 6

An anonymous reader shares a report: Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat actors to claim the namespace and upload malicious extensions.

These AI-assisted IDEs are forked from Microsoft VSCode, but cannot use the extensions in the official store due to licensing restrictions. Instead, they are supported by OpenVSX, an open-source marketplace alternative for VSCode-compatible extensions. As a result of forking, the IDEs inherit the list of officially recommended extensions, hardcoded in the configuration files, which point to Microsoft's Visual Studio Marketplace.

United States

As US Communities Start Fighting Back, Many Datacenters are Blocked (apnews.com) 65

America's tech companies and data center developers "are increasingly losing fights in communities where people don't want to live next to them, or even near them," reports the Associated Press: Communities across the United States are reading about — and learning from — each other's battles against data center proposals that are fast multiplying in number and size to meet steep demand as developers branch out in search of faster connections to power sources... [A]s more people hear about a data center coming to their community, once-sleepy municipal board meetings in farming towns and growing suburbs now feature crowded rooms of angry residents pressuring local officials to reject the requests...

A growing number of proposals are going down in defeat, sounding alarms across the data center constellation of Big Tech firms, real estate developers, electric utilities, labor unions and more. Andy Cvengros, who helps lead the data center practice at commercial real estate giant JLL, counted seven or eight deals he'd worked on in recent months that saw opponents going door-to-door, handing out shirts or putting signs in people's yards. "It's becoming a huge problem," Cvengros said. Data Center Watch, a project of 10a Labs, an AI security consultancy, said it is seeing a sharp escalation in community, political and regulatory disruptions to data center development. Between April and June alone, its latest reporting period, it counted 20 proposals valued at $98 billion in 11 states that were blocked or delayed amid local opposition and state-level pushback. That amounts to two-thirds of the projects it was tracking...

For some people angry over steep increases in electric bills, their patience is thin for data centers that could bring still-higher increases. Losing open space, farmland, forest or rural character is a big concern. So is the damage to quality of life, property values or health by on-site diesel generators kicking on or the constant hum of servers. Others worry that wells and aquifers could run dry...

Privacy

39 Million Californians Can Now Legally Demand Data Brokers Delete Their Personal Data (techcrunch.com) 43

While California's residents have had the right to demand companies stop collecting/selling their data since 2020, doing so used to require a laborious opting out with each individual company," reports TechCrunch. But now Californians can make "a single request that more than 500 registered data brokers delete their information" — using the Delete Requests and Opt-Out Platform (or DROP): Once DROP users verify that they are California residents, they can submit a deletion request that will go to all current and future data brokers registered with the state...

Brokers are supposed to start processing requests in August 2026, then they have 90 days to actually process requests and report back. If they don't delete your data, you'll have the option to submit additional information that may help them locate your records. Companies will also be able to keep first-party data that they've collected from users. It's only brokers who seek to buy or sell that data — which can include your social security number, browsing history, email address, phone number, and more — who will be required to delete it...

The California Privacy Protection Agency says that in addition to giving residents more control over their data, the tool could result in fewer "unwanted texts, calls, or emails" and also decrease the "risk of identity theft, fraud, AI impersonations, or that your data is leaked or hacked."

Government

North Dakota Law Included Fake Critical Minerals Using Lawyers' Last Names (northdakotamonitor.com) 53

North Dakota passed a law last May to promote development of rare earth minerals in the state. But the law's language apparently also includes two fake mineral names, according to the Bismarck Tribune, "that appear to be inspired by coal company lawyers who worked on the bill." The inclusion of fictional substances is being called an embarrassment by one state official, a possible practical joke by coal industry leaders and mystifying by the lawmakers who worked on the bill, the North Dakota Monitor reported.

The fake minerals are friezium and stralium, apparent references to Christopher Friez and David Straley, attorneys for North American Coal who were closely involved in drafting the bill and its amendments. Straley said they were not responsible for adding the fake names. "I assume it was put in to embarrass us, or to make light of it, or have a practical joke," Straley said, adding it could have been a clerical error.

Agriculture Commissioner Doug Goehring questioned the two substances listed in state law during a recent meeting of the North Dakota Industrial Commission, which is poised to adopt rules based on the legislation... Friezium and stralium first appeared in the bill on the last afternoon of the legislative session as lawmakers hurried to pass several final bills... The amended bill is labeled as prepared by Legislative Council for Rep. Dick Anderson, R-Willow City, the prime sponsor and chair of the conference committee. Anderson said the amendments were prepared by a group of attorneys and legislators, including representatives from the coal industry...

Jonathan Fortner, president of the Lignite Energy Council that represents the coal industry, said it's unfortunate this happened in such an important bill. "From the president on down, everyone's interested in developing domestic critical minerals for national security reasons," Fortner said. "While this may have been a legislative joke between some people that somehow got through, the bigger picture is one that is important and is a very serious matter."

AI

Microsoft's Risky Bet That Windows Can Become The Platform for AI Agents (geekwire.com) 57

"Microsoft is hoping that Windows can once again serve as the platform where it all takes off," reports GeekWire: A new framework called Agent Launchers, introduced in December as a preview in the latest Windows Insider build, lets developers register agents directly with the operating system. They can describe an agent through what's known as a manifest, which then lets the agent show up in the Windows taskbar, inside Microsoft Copilot, and across other apps... "We are now entering a phase where we build rich scaffolds that orchestrate multiple models and agents; account for memory and entitlements; enable rich and safe tools use," Microsoft CEO Satya Nadella wrote in a blog post this week looking ahead to 2026. "This is the engineering sophistication we must continue to build to get value out of AI in the real world...." [The article notes Google's Gemini and Anthropic's Claude will also offer desktop-style agentsthrough browsers and native apps, while Amazon is developing "frontier agents" for automating business processes in the cloud.]

But Microsoft's Windows team is betting that agents tightly linked to the operating system will win out over ones that merely run on top of it, just as a new class of Windows apps replaced a patchwork of DOS programs in the early days of the graphical operating system. Microsoft 365 Copilot is using the Agent Launchers framework for first-party agents like Analyst, which helps users dig into data, and Researcher, which builds detailed reports. Software developers will be able to register their own agents when an app is installed, or on the fly based on things like whether a user is signed in or paying for a subscription...

Agents are meant to maintain this context across apps, ask follow-up questions, and take actions on a user's behalf. That requires a different level of trust than Windows has ever had to manage, which is already raising difficult questions for the company. Microsoft acknowledges that agents introduce unique security risks. In a support document, the company warned that malicious content embedded in files or interface elements could override an agent's instructions — potentially leading to stolen data or malware installation. To address this, Microsoft says it has built a security framework that runs agents in their own contained workspace, with a dedicated user account that has limited access to user folders. The idea is to create a boundary between the agent and what the rest of the system can access. The agentic features are off by default, and Microsoft is advising users to "understand the security implications of enabling an agent on your computer" before turning them on...

There is a business reality driving all of this. In Microsoft's most recent fiscal year, Windows and Devices generated $17.3 billion in revenue — essentially flat for the past three years. That's less than Gaming ($23.5 billion) and LinkedIn ($17.8 billion), and a fraction of the $98 billion in revenue from Azure and cloud services or the nearly $88 billion from Microsoft 365 commercial.

The Military

Airlines Cancel Hundreds of Flights After U.S. Attack on Venezuela (cnbc.com) 180

CNBC reports that U.S. airlines have "canceled hundreds of flights to airports in Puerto Rico and Aruba, according to flight tallies from FlightAware and carriers' sites."

JetBlue, Southwest, and American Airlines were among the multiple airlines showing cancelled flights, which "included close to 300 flights to and from San Juan, Puerto Rico's Luis Muñoz Marín International Airport, more than 40% of the day's schedule, according to FlightAware." Airlines canceled flights throughout the Caribbean on Saturday following U.S. strikes on Venezuela after the Federal Aviation Administration ordered commercial aircraft to avoid airspace in parts of the region.... It wasn't immediately clear how long the disruptions would last, though such broad restrictions are often temporary. Airlines said they would waive change fees and fare differences for customers affected by the airspace closures who could fly later in the month.
CNN cites a U.S. official who says more than 150 U.S. aircraft (including helicopters) launched from 20 different bases "on land and sea" during Friday's attack.

The U.S. has said the lights were out in Caracas during the attack, presumably because of a targeted strike on their power grid. "Videos filmed by Caracas residents showed parts of the city in the dark," reports the Miami Herald.

United Nations secretary-general António Guterres issued a statement via his spokesman saying he was "deeply concerned that the rules of international law have not been respected," (according to a Reuters report cited by the Guardian). The Guardian adds that "a number of nations have called for an emergency meeting of the UN Security Council, in New York, today, as a result of the U.S.'s unilateral action."
Transportation

Interference With America's GPS System 'Has Grown Dramatically' (yahoo.com) 31

86 aircraft were affected by an incident in Denver ,and 256 more in Dallas-Fort Worth, America's Federal Aviation Admistrationtold the Washington Post: The pilots flying into Denver International Airport could tell something was wrong. In urgent calls to air traffic controllers, they reported that the Global Positioning System was going haywire, forcing them to rely on backup navigation systems for more than a day. The Federal Aviation Administration issued a warning to air traffic in the area. Eight months later, in October 2022, it happened again — this time at Dallas-Fort Worth International Airport, which shut down a runway as pilots and air traffic controllers scrambled over two days without GPS to guide them. Federal officials have not said who was responsible for interfering with the systems or why it took so long to get them back online, though they've said the Denver incident was unintentional. But the disruptions stoked fear about the security vulnerabilities of GPS, a satellite network relied on daily by 6 billion people, businesses and governments.

Over the past two years, interference with the U.S. Global Positioning System has grown dramatically, threatening a network that is highly vulnerable to attack in a conflict. The danger could be posed by enemy or rogue nation-states — or even just hobbyists with commercially available equipment. Efforts by the Pentagon to upgrade GPS have been delayed by years and have cost billions, as adversaries are developing increasingly sophisticated ways to jam and trick the system with false signals that make it think it is somewhere it isn't. And it's not just civilian airline traffic at risk. The underpinnings of modern life and entire economies could be disrupted by a broad attack on the fragile satellite system — power grids, financial systems, cellphone networks — raising the prospect of catastrophe in an era of increasing electronic warfare...

A report last year by the OpsGroup, an organization of international airline operators, found that in January 2024, about 300 flights per day were affected by GPS interference. By late last year, that number had grown to 1,500 flights per day as conflicts in Eastern Europe and the Middle East continued. And in a one-month period, between July and August last year, some 41,000 flights were affected. "While GPS interference is not a new phenomenon, the scale and effects of the current wave of spoofing are unprecedented," the report found...

The Pentagon has launched eight of its next-generation GPS III satellites, which broadcast the military-grade signal that is more resistant to jamming and spoofing. Lockheed Martin, the contractor building the satellites, is also developing a next-generation spacecraft, which would have the ability to emit an even stronger "spot beam" directly to areas used by U.S. forces, making it even more difficult to jam.

United States

Trump Signs Defense Bill Prohibiting China-Based Engineers in Pentagon IT Work (propublica.org) 32

President Donald Trump signed into law this month a measure that prohibits anyone based in China and other adversarial countries from accessing the Pentagon's cloud computing systems. From a report: The ban, which is tucked inside the $900 billion defense policy law, was enacted in response to a ProPublica investigation this year that exposed how Microsoft used China-based engineers to service the Defense Department's computer systems for nearly a decade -- a practice that left some of the country's most sensitive data vulnerable to hacking from its leading cyber adversary.

U.S.-based supervisors, known as "digital escorts," were supposed to serve as a check on these foreign employees, but we found they often lacked the expertise needed to effectively supervise engineers with far more advanced technical skills. In the wake of the reporting, leading members of Congress called on the Defense Department to strengthen its security requirements while blasting Microsoft for what some Republicans called "a national betrayal." Cybersecurity and intelligence experts have told ProPublica that the arrangement posed major risks to national security, given that laws in China grant the country's officials broad authority to collect data.

Network

'IPv6 Just Turned 30 and Still Hasn't Taken Over the World, But Don't Call It a Failure' (theregister.com) 233

Three decades after RFC 1883 promised to future-proof the internet by expanding the available pool of IP addresses from around 4.3 billion to over 340 undecillion, IPv6 has yet to achieve the dominance its creators envisioned. Data from Google, APNIC and Cloudflare analyzed by The Register shows less than half of all internet users rely on IPv6 today.

"IPv6 was an extremely conservative protocol that changed as little as possible," APNIC chief scientist Geoff Huston told The Register. "It was a classic case of mis-design by committee." The protocol's lack of backward compatibility with IPv4 meant users had to choose one or run both in parallel. Network address translation, which allows thousands of devices to share a single public IPv4 address, gave operators an easier path forward. Huston adds: "These days the Domain Name Service (DNS) is the service selector, not the IP address," Huston told The Register. "The entire security framework of today's Internet is name based and the world of authentication and channel encryption is based on service names, not IP addresses."

"So folk use IPv6 these days based on cost: If the cost of obtaining more IPv4 addresses to fuel bigger NATs is too high, then they deploy IPv6. Not because it's better, but if they are confident that they can work around IPv6's weaknesses then in a largely name based world there is no real issue in using one addressing protocol or another as the transport underlay."
But calling IPv6 a failure misses the point. "IPv4's continued viability is largely because IPv6 absorbed that growth pressure elsewhere -- particularly in mobile, broadband, and cloud environments," said John Curran, president and CEO of the American Registry for Internet Numbers. "In that sense, IPv6 succeeded where it was needed most." Huawei has sought 2.56 decillion IPv6 addresses and Starlink appears to have acquired 150 sextillion.
United States

DHS Says REAL ID, Which DHS Certifies, Is Too Unreliable To Confirm US Citizenship (reason.com) 275

An anonymous reader shares a report: Only the government could spend 20 years creating a national ID that no one wanted and that apparently doesn't even work as a national ID. But that's what the federal government has accomplished with the REAL ID, which the Department of Homeland Security (DHS) now considers unreliable, even though getting one requires providing proof of citizenship or lawful status in the country.

In a December 11 court filing [PDF], Philip Lavoie, the acting assistant special agent in charge of DHS' Mobile, Alabama, office, stated that, "REAL ID can be unreliable to confirm U.S. citizenship." Lavoie's declaration was in response to a federal civil rights lawsuit filed in October by the Institute for Justice, a public-interest law firm, on behalf of Leo Garcia Venegas, an Alabama construction worker. Venegas was detained twice in May and June during immigration raids on private construction sites, despite being a U.S. citizen. In both instances, Venegas' lawsuit says, masked federal immigration officers entered the private sites without a warrant and began detaining workers based solely on their apparent ethnicity.

And in both instances officers allegedly retrieved Venegas' Alabama-issued REAL ID from his pocket but claimed it could be fake. Venegas was kept handcuffed and detained for an hour the first time and "between 20 and 30 minutes" the second time before officers ran his information and released him.

Security

European Space Agency Acknowledges Another Breach as Criminals Claim 200 GB Data Haul 23

The European Space Agency has acknowledged yet another security incident after a cybercriminal posted an offer on BreachForums the day after Christmas claiming to have stolen over 20GB of data including source code, confidential documents, API tokens and credentials.

The attacker claims they gained access to ESA-linked external servers on December 18 and remained connected for about a week, during which they allegedly exfiltrated private Bitbucket repositories, CI/CD pipelines, Terraform files and hardcoded credentials. ESA said that the breach may have affected only "a very small number of external servers" used for unclassified engineering and scientific collaboration, and that it has initiated a forensic security analysis.
Security

DarkSpectre Hackers Spread Malware To 8.8 Million Chrome, Edge, and Firefox Users (cyberpress.org) 12

An anonymous reader quotes a report from Cyber Press: A newly uncovered Chinese threat group, DarkSpectre, has been linked to one of the most widespread browser-extension malware operations to date, compromising more than 8.8 million users of Chrome, Edge, Firefox, and Opera over the past seven years. According to research by Koi.ai, the group operates three interconnected campaigns: ShadyPanda, GhostPoster, and a newly identified one named The Zoom Stealer, forming a single, strategically organized operation.

DarkSpectre's structure differs from that of ordinary cybercrime operations. The group runs separate but interconnected malware clusters, each with distinct goals. The ShadyPanda campaign, responsible for 5.6 million infections, focuses on long-term user surveillance and e-commerce affiliate fraud. Its extensions have appeared legitimate for years, offering new tab pages and translation utilities, before secretly downloading malicious configurations from command-and-control servers such as jt2x.com and infinitynewtab.com. Once activated, they inject remote scripts, hijack search results, and track browsing activity.

The second campaign, GhostPoster, spreads via Firefox and Opera extensions that conceal malicious payloads in PNG images via steganography. After lying dormant for several days, the extensions extract and execute JavaScript hidden within images, enabling stealthy remote code execution. This campaign has affected over one million users and relies on domains like gmzdaily.com and mitarchive.info for payload delivery.

The most recent discovery, The Zoom Stealer, exposes around 2.2 million users to corporate espionage. These extensions masquerade as productivity tools or video downloaders while secretly harvesting corporate meeting links, credentials, and speaker profiles from more than 28 video conferencing platforms, including Zoom, Microsoft Teams, and Google Meet. The extensions use real-time WebSocket connections to exfiltrate data to Firebase databases, such as zoocorder.firebaseio.com, and to Google Cloud functions, such as webinarstvus.cloudfunctions.net.

China

China Demands Netherlands 'Correct Mistakes' Over Seized Chipmaker as Auto Supply Crunch Deepens (cnbc.com) 34

China's Commerce Ministry on Wednesday demanded that the Netherlands "immediately correct its mistakes" over chipmaker Nexperia, escalating a standoff that has disrupted global semiconductor supply chains and triggered warnings from automakers about component shortages. The Dutch government in September invoked a Cold War-era law to effectively seize control of the Chinese-owned chipmaker, reportedly after the United States raised security concerns. China responded by blocking Nexperia products from leaving the country.

Nexperia manufactures billions of foundation chips -- transistors, diodes and power management components -- that are produced in Europe, assembled and tested in China, and then re-exported to customers worldwide. These low-tech, inexpensive chips are essential in almost every device that uses electricity, from car braking systems and airbag controllers to electric windows and entertainment systems.

The Commerce Ministry spokesperson said the Netherlands "remains indifferent and stubbornly insists on its own way, showing absolutely no responsible attitude towards the security of the global semiconductor supply chain." Dutch Economy Minister Vincent Karremans has repeatedly defended the intervention. Auto industry groups have warned that disruptions have not been fundamentally resolved. Japan's Nissan and German supplier Bosch have flagged looming shortages, and the German Association of the Automotive Industry warned of elevated supply risks "particularly for the first quarter" of 2026.
Government

NYC Inauguration Bans Raspberry Pi, Flipper Zero Devices (adafruit.com) 42

Longtime Slashdot reader ptorrone writes: The January 1, 2026, NYC mayoral inauguration prohibits attendees from bringing specific brand-name devices, explicitly banning Raspberry Pi single-board computers and the Flipper Zero, listed alongside weapons, explosives, and drones. Rather than restricting behaviors or capabilities like signal interference or unauthorized transmitters, the policy names two widely used educational and testing tools while allowing smartphones and laptops that are far more capable. Critics argue this device-specific ban creates confusion, encourages selective enforcement, and reflects security theater rather than a clear, capability-based public safety framework. New York has handled large-scale events more pragmatically before.
Japan

Life in a Shrinking Japan (japantimes.co.jp) 38

Japan's demographic transformation is no longer a distant forecast but an accelerating reality, and the National Institute of Population and Social Security Research now estimates the country's population will fall to roughly 100 million by 2050 -- more than 20 million fewer people than today.

The share of residents aged 65 and over stood at 29.4% as of September and is expected to reach 37.1% by midcentury. The dependency ratio -- children and older adults supported by every 100 working-age people -- is projected to rise from 68.0 to 89.0, meaning each working-age person will effectively support one dependent.

Akita Prefecture is currently offering a preview of this future. Its population fell 1.93% year over year as of November 1, the steepest decline of any prefecture, and more than 40% of its residents are already 65 or older. By 2050, Akita's population is projected to drop to around 560,000, roughly 60% of its current size. Japan's total fertility rate fell for the ninth consecutive year in 2024, declining to 1.15 from 1.2. A health ministry survey found around 319,000 babies were born in the first half of 2025, more than 10,000 fewer than the same period last year -- a pace that could put the full-year total at a record low.
Security

22 Million Affected By Aflac Data Breach (securityweek.com) 26

An anonymous reader quotes a report from SecurityWeek: Insurance giant Aflac is notifying roughly 22.65 million people that their personal information was stolen from its systems in June 2025. The company disclosed the intrusion on June 20, saying it had identified suspicious activity on its network in the US on June 12 and blaming it on a sophisticated cybercrime group. The company said it immediately contained the attack and engaged with third-party cybersecurity experts to help with incident response. Aflac's operations were not affected, as file-encrypting ransomware was not deployed.

[...] The compromised information, the insurance giant says, includes names, addresses, Social Security numbers, dates of birth, driver's license numbers, government ID numbers, medical and health insurance information, and other data. "The review of the potentially impacted files determined personal information associated with customers, beneficiaries, employees, agents, and other individuals related to Aflac was involved," Aflac said in a notification (PDF) on its website. The company is providing the affected individuals with 24 months of free credit monitoring, identity theft protection, and medical fraud protection services.

EU

Challenges Face European Governments Pursuing 'Digital Sovereignty' (theregister.com) 57

The Register reports on challenges facing Europe's pursuit of "digital sovereignty": The US CLOUD Act of 2018 allows American authorities to compel US-based technology companies to provide requested data, regardless of where that data is stored globally. This places European organizations in a precarious position, as it directly clashes with Europe's own stringent privacy regulation, the General Data Protection Regulation (GDPR)... Furthermore, these warrants often come with a gag order, legally prohibiting the provider from informing their customer that their data has been accessed. This renders any contractual clauses requiring transparency or notification effectively meaningless. While technical measures like encryption are often proposed as a solution, their effectiveness depends entirely on who controls the encryption keys. If the US provider manages the keys, as is common in many standard cloud services, they can be forced to decrypt the data for authorities, making such safeguards moot....

American hyperscalers have recognized the market demand for sovereignty and now aggressively market 'sovereign cloud' solutions, typically by placing datacenters on European soil or partnering with local operators. Critics call this 'sovereignty washing'... [Cristina Caffarra, a competition economistand driving force behind the Eurostack initiative] warns that this does not resolve the fundamental problem. "A company subject to the extraterritorial laws of the United States cannot be considered sovereign for Europe," she says. "That simply doesn't work." Because, as long as the parent company is American, it remains subject to the CLOUD Act...

Even when organizations make deliberate choices in favour of European providers, those decisions can be undone by market forces. A recent acquisition in the Netherlands illustrates this risk. In November 2025, the American IT services giant Kyndryl announced its intention to acquire Solvinity, a Dutch managed cloud provider. This came as an "unpleasant surprise" to several of its government clients, including the municipality of Amsterdam and the Dutch Ministry of Justice and Security. These bodies had specifically chosen Solvinity to reduce their dependence on American firms and mitigate CLOUD Act risks.

Still, The Register provides several examples of government systems that are "taking concrete steps to regain control over their IT."
  • Austria's Federal Ministry for Economy, Energy and Tourism now has 1,200 employees on the European open-source collaboration platform Nextcloud, leading several other Austrian ministries to also implement Nextcloud. (The Ministry's CISO tells the Register "We can see our input in Nextcloud releases. That is a feeling we never had with Microsoft.")
  • France's Ministry of Economics and Finance recently completed NUBO (which the Register describes as "an OpenStack-based private cloud initiative designed to handle sensitive data and services.")

Thanks to long-time Slashdot reader mspohr for sharing the article.


Robotics

Researchers Show Some Robots Can Be Hijacked Just Through Spoken Commands (interestingengineering.com) 25

An anonymous Slashdot reader shared this story from Interesting Engineering: Cybersecurity specialists from the research group DARKNAVY have demonstrated how modern humanoid robots can be compromised and weaponised through weaknesses in their AI-driven control systems.

In a controlled test, the team demonstrated that a commercially available humanoid robot could be hijacked with nothing more than spoken commands, exposing how voice-based interaction can serve as an attack vector rather than a safeguard, reports Yicaiglobal... Using short-range wireless communication, the hijacked machine transmitted the exploit to another robot that was not connected to the network. Within minutes, this second robot was also taken over, demonstrating how a single breach could cascade through a group of machines. To underline the real-world implications, the researchers issued a hostile command during the demonstration. The robot advanced toward a mannequin on stage and struck it, illustrating the potential for physical harm.

Space

Is Russia Developing an Anti-Satellite Weapon to Target Starlink? (apnews.com) 140

An anonymous reader shared this report from the Associated Press: Two NATO-nation intelligence services suspect Russia is developing a new anti-satellite weapon to target Elon Musk's Starlink constellation with destructive orbiting clouds of shrapnel, with the aim of reining in Western space superiority that has helped Ukraine on the battlefield. Intelligence findings seen by The Associated Press say the so-called "zone-effect" weapon would seek to flood Starlink orbits with hundreds of thousands of high-density pellets, potentially disabling multiple satellites at once but also risking catastrophic collateral damage to other orbiting systems.

Analysts who haven't seen the findings say they doubt such a weapon could work without causing uncontrollable chaos in space for companies and countries, including Russia and its ally China, that rely on thousands of orbiting satellites for communications, defense and other vital needs. Such repercussions, including risks to its own space systems, could steer Moscow away from deploying or using such a weapon, analysts said. "I don't buy it. Like, I really don't," said Victoria Samson, a space-security specialist at the Secure World Foundation who leads the Colorado-based nongovernmental organization's annual study of anti-satellite systems. "I would be very surprised, frankly, if they were to do something like that." [Later they suggested the research might just be experimental.]

But the commander of the Canadian military's Space Division, Brig. Gen. Christopher Horner, said such Russian work cannot be ruled out in light of previous U.S. allegations that Russia also has been pursuing an indiscriminate nuclear, space-based weapon. "I can't say I've been briefed on that type of system. But it's not implausible," he said... The French military's Space Command said in a statement to the AP that it could not comment on the findings but said, "We can inform you that Russia has, in recent years, been multiplying irresponsible, dangerous, and even hostile actions in space."

The article also points out that this month Russia "said it has fielded a new ground-based missile system, the S-500, which is capable of hitting low-orbit targets..."

Slashdot Top Deals