Russian oil tankers go dark, evading name-and-shame Twitter bot

Activists from the environmental organization Greenpeace demonstrate in the Baltic Sea in front of a ship carrying Russian oil on March 23, 2022.

Enlarge / Activists from the environmental organization Greenpeace demonstrate in the Baltic Sea in front of a ship carrying Russian oil on March 23, 2022. (credit: Frank Molter/picture alliance)

First there was the Russian oligarch jet tracker; then there was the Russian oligarch yacht tracker; now there’s the Russian oil tanker tracker.

The new tool comes from data scientists at Greenpeace UK, who created an automated bot that draws from public data to tweet about the movements of oil and gas tankers leaving Russian ports. The goal, Greenpeace says, is to cut off one of Russia’s main revenue sources that’s helping fuel President Vladimir Putin’s war in Ukraine.

Russia draws considerable revenue from oil and gas—about 40 percent of its federal budget relies on fossil fuel royalties—which means that tankers fulfilling contracts are essentially contributing to Russia’s war machine. By tweeting the origin, identity, and destination of tankers that have docked at Russian ports, Greenpeace is hoping to shame companies and countries into shunning oil and gas purchases from the country.

Read 10 remaining paragraphs | Comments

CSRF Protection Problem and How to Fix it

One day I was working on a feature at work. I had many branches created in JIRA tickets, so I wanted to open a bunch of PRs (Pull Requests) all at once in different tabs. This is how I usually work – I have a lot of tabs open

Samsung’s new 4K smart monitor has a magnetic wireless webcam

Samsung M8 mnonitor in

Enlarge / Samsung is selling the monitor in (clockwise from top left): Sunset Pink, Warm White, Spring Green, and Daylight Blue. (credit: Samsung)

Samsung’s M8 monitor, announced on Monday, is being positioned to replace your USB webcam and smart TV. The 32-inch 4K smart monitor has a wireless webcam that you can remove and attach via magnets. The TV also features built-in apps, including Netflix and Hulu, that work without a PC connection.

The M8’s 1080p webcam attaches to a holster in the camera via a four-pin connector, a Samsung rep told Ars Technica. The holster is connected to a port on the monitor, giving the camera power and connecting it to the PC. As such, it appears the camera won’t work with another monitor. Once in place, you can tilt the camera or remove it for privacy when it’s not in use.

This differs from a magnetic, wireless webcam prototype Dell showed us in December. Dell’s concept cam detached from the monitor so you could place it in the ideal location, such as the center of the monitor, for the perfect angle. Samsung’s magnetic webcam attempts to help you find the perfect angle through face tracking and auto-zoom.

Read 7 remaining paragraphs | Comments

Roman Numerals – the Roman Numeral for 4, 6, 9, and Others

Roman numerals are a numerical system that originated in ancient Rome. They are used to represent numbers in the decimal system, but they are not used for mathematical operations. In this system, symbols are used to represent different numbers, with I representing 1, V representing 5, X representing 10, L

Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA

Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA

Enlarge (credit: Getty Images)

Multifactor authentication (MFA) is a core defense that is among the most effective at preventing account takeovers. In addition to requiring that users provide a username and password, MFA ensures they must also use an additional factor—be it a fingerprint, physical security key, or one-time password—before they can access an account. Nothing in this article should be construed as saying MFA isn’t anything other than essential.

That said, some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data extortion gang and elite Russian-state threat actors (like Cozy Bear, the group behind the SolarWinds hack) have both successfully defeated the protection.

Enter MFA prompt bombing

The strongest forms of MFA are based on a framework called FIDO2, which was developed by a consortium of companies balancing the needs of both security and simplicity of use. It gives users the option of using fingerprint readers or cameras built into the devices or dedicated security keys to confirm they are authorized to access an account. FIDO2 forms of MFA are relatively new, so many services for both consumers and large organizations have yet to adopt them.

Read 23 remaining paragraphs | Comments

Computer Skills for Résumé – Software Skill Proficiency Guide

Having strong computer skills is necessary for almost any job. That knowledge can set you apart from others who don’t possess it. But what are the most necessary computer skills to have? And when you acquire those skills, how do you showcase them effectively to prospective employers? In this article,
Find the soul