Our other projects: #macos, #ios and #android apps for notes TheNote.app
bsky.app/profile/hack...
Learn how router/video/enterprise processes video over time—identifying objects, actions, and sequences.
#hackernews #news
Learn how router/video/enterprise processes video over time—identifying objects, actions, and sequences.
#hackernews #news
OpenAI previously confirmed that it's testing ads in ChatGPT for free and $8 Go accounts, and now we're seeing early signs of that rollout, at least on Android. [...]
#chatgpt #gpt #openai
UniVideo combines video comprehension, creation, and editing into a single system built on established components—here’s what it does, what it outputs, and how to test it.
#hackernews #news
UniVideo combines video comprehension, creation, and editing into a single system built on established components—here’s what it does, what it outputs, and how to test it.
#hackernews #news
OpenAI has confirmed that it's retiring ChatGPT's most popular model called GPT-4o and several other models, including GPT-5 Instant, GPT-5 Thinking, GPT-4.1, GPT-4.1 mini, and o4-mini. [...]
#chatgpt #gpt #openai
Blockchain Penetration Testing simulates real-world cyberattacks on blockchain systems to identify vulnerabilities before attackers can exploit them. On September 14, 2021, the Solana blockchain network went offline …
#hackernews #news
Blockchain Penetration Testing simulates real-world cyberattacks on blockchain systems to identify vulnerabilities before attackers can exploit them. On September 14, 2021, the Solana blockchain network went offline …
#hackernews #news
AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify vulnerabilities, and a…
#hackernews #news
AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify vulnerabilities, and a…
#hackernews #news
IoT penetration testing is a security assessment of the complete IoT ecosystem, from backend systems and cloud services to mobile devices and hardware. It involves a multi-stage simulated attack on IoT devices and …
#hackernews #news
IoT penetration testing is a security assessment of the complete IoT ecosystem, from backend systems and cloud services to mobile devices and hardware. It involves a multi-stage simulated attack on IoT devices and …
#hackernews #news
How Secure is Secrets Encryption in Financial Services? Have you ever wondered how financial services ensure the safety of critical information? The key lies in the sophisticated management of Non-Human Identities (NHIs…
#hackernews #news
How Secure is Secrets Encryption in Financial Services? Have you ever wondered how financial services ensure the safety of critical information? The key lies in the sophisticated management of Non-Human Identities (NHIs…
#hackernews #news
What is the Role of Agentic AI in DevOps Security? How can organizations ensure the security of machine identities and secrets? A comprehensive security strategy, encompassing Non-Human Identities (NHIs) and Secrets Security Management…
#hackernews #news
What is the Role of Agentic AI in DevOps Security? How can organizations ensure the security of machine identities and secrets? A comprehensive security strategy, encompassing Non-Human Identities (NHIs) and Secrets Security Management…
#hackernews #news
How Can Least Privilege Transform Secure Cloud Operations? Have you ever pondered the repercussions of over-privileged access in cloud environments? With the rapid adoption of cloud technologies, the concept of least…
#hackernews #news
How Can Least Privilege Transform Secure Cloud Operations? Have you ever pondered the repercussions of over-privileged access in cloud environments? With the rapid adoption of cloud technologies, the concept of least…
#hackernews #news
How Do Non-Human Identities Impact Disaster Recovery and Cybersecurity? When considering disaster recovery and cybersecurity in cloud environments, have you thought about the role of Non-Human Identities (NHIs)? These machine identities—ess…
#hackernews #news
How Do Non-Human Identities Impact Disaster Recovery and Cybersecurity? When considering disaster recovery and cybersecurity in cloud environments, have you thought about the role of Non-Human Identities (NHIs)? These machine identities—ess…
#hackernews #news
We usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal.
#hackernews #news
We usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal.
#hackernews #news
An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to a Justice Department document released Friday. An FBI informant said in 2017 that Jeffrey Epstein had a “personal hack…
#hackernews #news
An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to a Justice Department document released Friday. An FBI informant said in 2017 that Jeffrey Epstein had a “personal hack…
#hackernews #news
This week, we round up the best things we’ve been reading, watching and listening to in the newsroom. From a deep dive into the role that bots played in the Johnny Depp v. Amber Heard trials to a look at the ways spammers skirt content mode…
#hackernews #news
This week, we round up the best things we’ve been reading, watching and listening to in the newsroom. From a deep dive into the role that bots played in the Johnny Depp v. Amber Heard trials to a look at the ways spammers skirt content mode…
#hackernews #news
Android is built for mobile devices, where resources are inherently limited. Android must maintain stricter control over what processes are running and when. Android evaluates how important ea…
#hackernews #news
Android is built for mobile devices, where resources are inherently limited. Android must maintain stricter control over what processes are running and when. Android evaluates how important ea…
#hackernews #news
A U.S. federal jury has convicted Linwei Ding, a former software engineer at Google, for stealing AI supercomputer data from his employer and secretly sharing it with Chinese tech firms. [...]
#hackernews #news
A U.S. federal jury has convicted Linwei Ding, a former software engineer at Google, for stealing AI supercomputer data from his employer and secretly sharing it with Chinese tech firms. [...]
#hackernews #news
The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API.
#hackernews #news
The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API.
#hackernews #news
Metrics show patterns but fieldwork reveals reality. By meeting users where they live and work designers uncover real constraints informal workflows and decision logic. This article shares a practical f…
#hackernews #news
Metrics show patterns but fieldwork reveals reality. By meeting users where they live and work designers uncover real constraints informal workflows and decision logic. This article shares a practical f…
#hackernews #news
"Speed" in data engineering is a trade-off, not a single metric. To build effective systems, you must distinguish between two competing concepts:
- Data Latency (Freshness): How long it takes for an …
#hackernews #news
"Speed" in data engineering is a trade-off, not a single metric. To build effective systems, you must distinguish between two competing concepts:
- Data Latency (Freshness): How long it takes for an …
#hackernews #news
Over the past few months, a large-scale cloud storage subscription scam campaign has been targeting users worldwide with repeated emails falsely warning recipients that their photos, files, and accounts are about to be …
#hackernews #news
Over the past few months, a large-scale cloud storage subscription scam campaign has been targeting users worldwide with repeated emails falsely warning recipients that their photos, files, and accounts are about to be …
#hackernews #news
Chapter I of The Affair of the Brains introduces Hawk Carse, a legendary space adventurer, as he risks everything to confront his greatest enemy, Dr. Ku Sui. First published in Astounding Stories of Super-Science in 1932, this public-domain sci-fi tale captu…
#hackernews #news
Chapter I of The Affair of the Brains introduces Hawk Carse, a legendary space adventurer, as he risks everything to confront his greatest enemy, Dr. Ku Sui. First published in Astounding Stories of Super-Science in 1932, this public-domain sci-fi tale captu…
#hackernews #news
The HackerNoon Newsletter provides a summary of the latest happenings in tech, delivered straight to the reader's inbox. On January 31, 2026, the newsletter highlights significant historical events, including the first maj…
#hackernews #news
The HackerNoon Newsletter provides a summary of the latest happenings in tech, delivered straight to the reader's inbox. On January 31, 2026, the newsletter highlights significant historical events, including the first maj…
#hackernews #news
The paper PropertyGPT explores the use of large language models to generate properties for smart contracts, which is a crucial step in formal verification. Formal verification is a technique that proves the correctness of a system with respect to a cer…
#gpt #hackernews #llm
The paper PropertyGPT explores the use of large language models to generate properties for smart contracts, which is a crucial step in formal verification. Formal verification is a technique that proves the correctness of a system with respect to a cer…
#gpt #hackernews #llm
Astounding Stories of Super-Science, March 1932 is a landmark collection from the early days of science fiction. Featuring tales like Off to the Rendezvous and The Color-Storm, it captures how writers of the 1930s …
#hackernews #news
Astounding Stories of Super-Science, March 1932 is a landmark collection from the early days of science fiction. Featuring tales like Off to the Rendezvous and The Color-Storm, it captures how writers of the 1930s …
#hackernews #news
Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) credentials and mult…
#hackernews #news
Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) credentials and mult…
#hackernews #news