Grand Theft Auto 6: Rockstar confirmed content theft

The source codes and many preview videos of the highly anticipated Grand Theft Auto game have been stolen. It seems like a play on words or a mocking coincidence but it is reality.
Rockstar Games has confirmed that it has suffered a security breach on the servers on which it stored various content related to the development of the future Grand Theft Auto 6. Information and confidential content have been downloaded and made public on the network, including these images and videos, as well as a part of the source code. In a message published via its official Twitter profile, as expected Rockstar said that it was “footage from an early development version” and was quick to point out that the leak will not affect the development process of GTA. 6. Furthermore, it is added that the game will be released “when it is ready”, which highlights that there is still a long way to go until development is complete. Officially, in fact, Rockstar has not yet disclosed any media or the possible release date of GTA 6. But according to some, the game would be released approximately between 2024 and 2025.

for more info:

https://www.gabrieleromano.org/pages/articles/gta6-theft-hacker.html

17th July (’22): World Emoji Day

A version of the ‘Tear-off calendar’ emoji displaying 17 July.

World Emoji Day is an annual unofficial holiday occurring on 17 July, intended to celebrate emoji; in the years since the earliest observance, it has become a popular date to make product or other announcements and releases relating to emoji.


The date originally referred to the day Apple premiered its iCal calendar application in 2002. The day, July 17, was displayed on the Apple Color Emoji version of the calendar emoji (📅) as an Easter egg.

World Emoji Day is “the brainchild of Jeremy Burge” according to CNBC which stated that the founder of Emojipedia created it in 2014.

The New York Times reported that Burge created this on 17 July “based on the way the calendar emoji is shown on iPhones”. For the first World Emoji Day, Burge told The Independent “there were no formal plans put in place” other than choosing the date. The Washington Post suggested in 2018 that readers use this day to “communicate with only emoji”.

NBC reported that the day was Twitter’s top trending item on 17 July in 2015.


Since 2017, Apple has used each World Emoji Day to announce upcoming expansions to the range of emojis on iOS.

On World Emoji Day 2015, Pepsi launched PepsiMoji which included an emoji keyboard and custom World Emoji Day Pepsi cans and bottles. These were initially released in Canada and expanded to 100 markets in 2016.

In 2016, Sony Pictures Animation used World Emoji Day to announce T. J. Miller as the first cast member for The Emoji Movie, Google released “a series of new emoji that are more inclusive of women from diverse backgrounds”, and Emojipedia launched the first World Emoji Awards. Other World Emoji Day announcements in 2016 came from Disney, General Electric, Twitter, and Coca-Cola.

London’s Royal Opera House presented 20 operas and ballets in emoji form, Google announced the end of its blob emoji and winners of the World Emoji Awards were announced from the trading floor of the New York Stock Exchange and broadcast on Cheddar.

In 2018, Kim Kardashian released her Kimoji fragrance line on World Emoji Day, Apple previewed new emoji designs including redheads and replaced executive photos on its corporate leadership page with emojis, Google announced the return of “blob emojis” in sticker form, and Facebook announced that “700 million emojis are used in Facebook posts each day”.

On World Emoji Day 2019 the award for Most Popular New Emoji was announced as the Smiling Face With Hearts In 2020 the Most Popular New Emoji was announced as the White Heart on Australia’s The Morning Show.

Microsoft used World Emoji Day in 2021 to preview an overhaul to the Windows emoji set using the Fluent Design System for the first time. Facebook used World Emoji Day 2021 to announce Soundmojis, Google unveiled a solution for faster emoji updates on Android, and Emojipedia revealed sample images for the latest emoji draft list.


Emoji: Here are all the new smilies coming soon.

The emojis are updated more and more often and the latest update coming in the coming months will allow users to use new smileys that are more and more fun but also unique and original. The 15.0 update of the Unicode consortium foresees up to 31 new smileys arriving on all platforms within the year. Compared to past years, the number of new images is much smaller but there are some smilies and drawings that are already going viral such as the smiley shaking his head.

Not only because there are also new colors for the heart and the outstretched hand to the right or left which in the original idea should be used to possibly give a virtual five during a conversation, but which could also represent an invitation to remain calm. There is no shortage of animals, plants and symbols of various kinds, let’s make a summary of the possible new emojis.

Probably not all 31 could actually be active later in 2023. Yes, because these have actually passed the penultimate skimming but we know that before actually arriving on the smartphones and user platforms they will still have to pass the grand final. Usually the process is to make them appear in the summer and then make their debut at the turn of the new year on Android or iPhone smartphones, but also on computers with Windows, macOS and Linux and in various applications.

Last year, the 14.0 update had always arrived in mid-July with smilies used today as the one that melts or the dotted one without forgetting the famous pregnant man or the lips that bite. For the record, last year the finalist emojis were 112 while in 2020 they were even 334. This year, however, they are only 31.

Among the new emojis, therefore, we have said that we find a smiley that shakes the head but also a part of the body with color variations or the hand extended to the right or left. There are three colored hearts of blue, gray and pink, animals like the elk, the crow and the jellyfish, but also foods like ginger and the pod with peas and the hyacinth flower. Also nice are other objects such as the comb, the fan and musical instruments such as the maracas and the flute to close with the symbol of wi-fi and the Khanda, the symbol of Sikhism.

When will we be able to use the new emojis in Update 15.0? The latest finalist selection will be announced in September by the Unicode Consortium and we do not know if this number of new emojis could still decrease as well as some graphics or colors could have changed.

Internet Explorer is dead after 26 years in business. Microsoft: ‘Will be permanently disabled’

Internet Explorer is dead and represents a past that is not too exciting for Microsoft when it comes to web browsing. From 15 June, therefore, an important step has been added to Microsoft’s strategy to modernize a fundamental aspect of its OSes.

Internet Explorer is dead: Edge is Microsoft’s only browser in the future

Specifically Lyndersay has performed that confirms the web browser, no longer on some versions of Windows, will be “permanently disabled” through an OS update that will come in the future. Below is the comment in full, as reported by BleepingComputer:

“Users will still see the Internet Explorer icon on their devices (for example on the taskbar or Start menu), but clicking to open Internet Explorer will launch Microsoft Edge with the ability to easily access IE mode. Internet Explorer will eventually be completely disabled permanently through a future Windows Update, at which point the Internet Explorer icons on users’ devices will be removed. “

Internet Explorer is dead: Edge is Microsoft’s only browser in the future
During this time, user data (including settings, favorites and passwords) will be transferred to Microsoft Edge. Microsoft will also add a “Reload with IE mode” button to the Edge toolbar to make it easier for users to run sites and services that are not compliant with the new standards. On the other hand, from 2020 those who try to run incompatible websites with Internet Explorer (there are almost 1500 certified incompatible websites, including Facebook, Twitter, Instagram, Google Drive) are automatically redirected to Edge.

On June 15, Internet Explorer ended its life cycle within the Windows 10 Semi-Annual Channel (SAC). The application was not already available on Windows 11 and the most popular versions of Windows 10, but it was in the SAC channel Windows 10 and still is on Windows 7 ESU, Windows 8.1 and all versions of Windows 10 LTSC, IoT and Server. On these operating systems, even if no longer supported, IE will continue to receive critical security updates until support ends for the version of Windows it runs on.

The Chinese government abandons Windows and “Western” PCs: space for Linux

Over the next two years China will take care of nearly 50 million PCs used in government agencies with “non-foreigners” that can be maintained nationwide. This also involves the abandonment of Windows in favor of Linux, to an extent aimed at cutting any possible dependence on US realities for everything related to the operation of the state machine.

This is a measure that actually comes “from afar”, with the Chinese government over the last decade trying to encourage the adoption of local hardware and software as much as possible, including hiring a company to monitor local suppliers in the development of sensitive components and services for the operation of government information systems.

A move that could have quite severe effects on the reality as Dell and HP, for which the supply and assistance of a government reality is an important part of their turnover. Conversely, Lenovo could have the opportunity to snatch significant market share from US competitors.

However, there are some components that are fundamental for certain purposes and for which there is still no “made in China” alternative. Chinese PC system manufacturers will still rely on Western components – for example, processors and GPUs – to be able to build their machines.

It is similar that special permits will continue to exist for some specific categories, such as state media and cybersecurity agencies, because they can continue to source foreign technology, even if there is no real future in the future for a squeeze for these particular cases as well.

Proofpoint: with “job fraud” cybercriminals target students looking for work

A new threat is exploding in the world of cybercrime: it is called “job fraud” and tends to affect higher education organizations almost exclusively, in the United States but also in Europe and Australia. These types of attacks saw a further surge during the pandemic, when cybercriminals exploited people’s willingness to work from home or remote working. Indeed, with the promise of easy money (for example, working from home to collect personal data), cybercriminals steal money or persuade victims to unwittingly participate in illegal activities, such as money laundering.
For the FBI’s Internet Crime Complaint Center, the average loss of a “job fraud” is $ 3,000.

Proofpoint has identified a number of job-related threats: nearly 95% target educational institutions, particularly colleges and universities. So far, the majority of attacks have been concentrated in the United States, although attackers have targeted European and Australian institutions and facilities (nearly 4,000 email threats were recorded daily).

Sherrod DeGrippo, Vice President, Threat Research and Detection at Proofpoint points out, “Threats like this can cause people to lose their life savings or involve them in criminal operations without their knowledge. They are very worrying, especially for universities, so much so that Proofpoint detects and blocks thousands of fraud threats every week that could harm their students and teachers. “

31 March (2022): The World Backup Day

World Backup Day on March 31st reminds us to protect our precious digital documents as we’ve become more reliant on technology.

There’s always that one photo, video or memory that you took the time to save, yet for some reason, it’s not yours anymore. Whether it was a lost or broken phone, a faulty hard drive or some other technological mishap, it can feel impossible to keep all your files in one piece.

Thankfully, the day before April Fools is World Backup Day, which saves us from being the punchline of a joke played by our own devices. It is the day when we finally stop saying, “I’ll do it tomorrow,” and make sure all our precious files find a safe space.

Try not to think of it as a hassle. Remember when you swore to backup all those pictures and videos from your last vacation? Now’s the time buddy.

Each day we depend more and more on data to serve our lives. Although it may be difficult to imagine a future where our precious files aren’t as accessible as they are today, it’s not our job to take digital memories for granted. Now put your foot down take a stand, and back that thing up!

WHAT IS BACKUP? A backup is a second copy of all your important files — for example, your family photos, home videos, documents, and emails. Instead of storing it all in one place (like your computer), you keep another copy of everything somewhere safe. For more info on this day – go to www.worldbackupday.com

HOW TO OBSERVE #WorldBackupDay

If you haven’t already, invest in an external hard drive, USB stick or purchase some space in the cloud. While you’re waiting for your file transfer to reach 100%, take a moment to plan out your next big data dump. Because let’s face it, one day a year isn’t nearly enough.

Take the pledge to back up your phone, computer, tablet, and all other coveted devices and share with the world using hashtag #WorldBackUpDay.

WORLD BACKUP DAY HISTORY

World Backup Day originally began as World Backup Month, started by a hard drive company by the name of Maxtor which was later acquired by Seagate Technology.

https://worldbackupday.com/en

The US government places Kaspersky on the cybersecurity blacklist

In recent days, the Federal Communications Commission has decided to include the Russian security company Kaspersky within the same “entity list” that has hosted Huawei and ZTE since last year. According to the FCC, Kaspersky security products pose a national security risk and therefore will no longer be eligible for federal funds. In addition to Kaspersky, which has long since been banned from all US government networks, China Mobile and China Telecom have also been added to the list of unwelcome companies. “Kaspersky is disappointed with the Federal Communications Commission’s decision to ban the use of certain federal telecommunications subsidies for the purchase of Kaspersky products and services. This decision is not based on any technical assessment of Kaspersky products that the company continually supports. , but it is taken on a political basis, “said the Russian security company. “I am pleased that our national security agencies agreed with my assessment that China Mobile and China Telecom appeared to meet the threshold needed to be added to our list. Their addition, as well as that of Kapsersky Labs, will help protect our networks from threats posed by state-backed Chinese and Russian entities seeking to engage in espionage and otherwise harm America’s interests, “FCC Commissioner Brendan Carr said. In this way, Kaspersky earns the double distinction of being the first Russian company and the first company specialized in cyber security to enter the US entity list. Recall that the companies on this list represent, according to the US, a threat to national security and therefore are excluded from the possibility of receiving funds among the 8 billion dollars available every year in the Universal Service Fund program of the Federal Communications Commission, which goes to support telecommunication services in rural areas or for the low-income population or even for institutions such as schools, libraries and hospitals. The move by the FCC comes within the context of the consequences triggered by the military invasion of Ukraine by the Russian Federation. Company founder Eugene Kaspersky has long been accused of having ties to the Russian military and intelligence, although he has repeatedly stated that his company is completely independent of the government. A couple of weeks ago the German Federal Office for Cybersecurity advised companies in the country not to use Kaspersky products as the company could be forced to put its products at the service of Russian intelligence.

Log4Shell is the new zeroday flaw: a bug present in most applications, and very easily exploitable

Log4Shell is a new zeroday vulnerability discovered last Thursday when it was exploited to remotely compromise Minecraft servers. The vulnerability was traced with the code CVE-2021-44228 and was assigned a severity level of 10 out of 10 as it can be exploited very easily and allows the execution of remote unauthenticated code.

The vulnerability concerns in particular Log4j, an open source event logging tool based on Java and available from Apache that is used by hundreds of thousands of apps, especially in the cloud and including those commonly used in almost all companies on the planet. .

Event logging is a process by which applications keep an up-to-date list of the activities performed and which can thus be analyzed later in the event of errors. Almost all network security systems run some kind of event log, which gives libraries such as Log4j nearly endless coverage.

The exploitation of the vulnerability occurs by managing to have a special sequence of characters recorded on the log, as Cloudflare illustrated in detail in its analysis. And, as mentioned, the vulnerability can be exploited with ease: in the case of Minecraft, for example, it was possible to record the sequence of characters on the log simply by sending a message in the chat within the game.

Since the compromise of the Minecraft servers occurred, the security company Greynoise has detected an active scan in progress on the Internet that attempted to identify vulnerable servers. The researchers point out that they have observed that the vulnerability is exploited for various purposes: from the installation of malware to cryptomining, to the hardening of Linux botnets, passing from the extraction of data and configurations.