www-malware-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

all.html malware-microsoft.html potential-malware.html proprietar...


From: Diff Report
Subject: all.html malware-microsoft.html potential-malware.html proprietar...
Date: Fri, 16 Jul 2021 00:02:34 -0400

Modified:

    all.html
    malware-microsoft.html
    potential-malware.html
    proprietary-censorship.html
    proprietary.html
    proprietary-insecurity.html
    proprietary-manipulation.html

diff -rNU2 all.html all.html
--- all.html    2021-07-05 04:04:13.712165504 +0000
+++ all.html    2021-07-16 04:02:34.137331685 +0000
@@ -43,4 +43,30 @@
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-05' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
 <!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Peloton company which produces treadmills recently <a
@@ -2290,5 +2316,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-microsoft.html malware-microsoft.html
--- malware-microsoft.html      2021-07-05 04:04:13.736165511 +0000
+++ malware-microsoft.html      2021-07-16 04:02:34.161331686 +0000
@@ -201,4 +201,22 @@
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202103050">
     <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
@@ -954,5 +972,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/13 08:13:32 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
diff -rNU2 potential-malware.html potential-malware.html
--- potential-malware.html      2021-07-05 04:04:13.744165513 +0000
+++ potential-malware.html      2021-07-16 04:02:34.165331686 +0000
@@ -55,4 +55,16 @@
 
 <ul class="blurbs">
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M201903280">
     <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
@@ -194,5 +206,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2021/07/15 07:13:04 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-censorship.html proprietary-censorship.html
--- proprietary-censorship.html 2021-07-05 04:04:13.752165515 +0000
+++ proprietary-censorship.html 2021-07-16 04:02:34.173331687 +0000
@@ -51,5 +51,5 @@
 users can access.  Here are examples of programs which do this.
 We have a <a
-href="/proprietary/proprietary-jails.html#about-page">separate
+href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;).</p>
@@ -213,5 +213,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2021/07/15 07:11:54 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html    2021-07-05 04:04:13.764165518 +0000
+++ proprietary.html    2021-07-16 04:02:34.181331687 +0000
@@ -97,6 +97,6 @@
 </div>
 
-<p>As of June, 2021, the pages in this directory list around 500
-instances of malicious functionalities (with more than 600 references to
+<p>As of July, 2021, the pages in this directory list around 500
+instances of malicious functionalities (with more than 610 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
@@ -187,4 +187,34 @@
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M202106220">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -231,26 +261,4 @@
     across different platforms.</p>
   </li>
-
-  <li id="M202106030">
-    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>TikTok
-    apps collect biometric identifiers and biometric information from
-    users' smartphones</a>. The company behind it does whatever it wants
-    and collects whatever data it can.</p>
-  </li>
-
-  <li id="M202004131">
-    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>Google, Apple, and Microsoft (and probably some other companies)
-    <a href="https://www.lifewire.com/wifi-positioning-system-1683343";>are
-    collecting people's access points and GPS coordinates (which can
-    identify people's precise location) even if their GPS is turned
-    off</a>, without the person's consent, using proprietary software
-    implemented in person's smartphone. Though merely asking for permission
-    would not necessarily legitimize this.</p>
-  </li>
 </ul>
 <p class="button right-align">
@@ -315,5 +323,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:21:12 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2021-07-05 04:04:13.768165520 +0000
+++ proprietary-insecurity.html 2021-07-16 04:02:34.189331687 +0000
@@ -72,4 +72,22 @@
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202106030">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -1141,5 +1159,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/28 13:40:29 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-manipulation.html proprietary-manipulation.html
--- proprietary-manipulation.html       2021-07-05 04:04:13.776165522 +0000
+++ proprietary-manipulation.html       2021-07-16 04:02:34.193331688 +0000
@@ -69,4 +69,16 @@
 
 <ul class="blurbs">
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M202106220">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -237,5 +249,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:13:04 $
 <!-- timestamp end -->
 </p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]