26
23
submitted 6 days ago by [email protected] to c/[email protected]
27
28
submitted 6 days ago by [email protected] to c/[email protected]
28
118
submitted 1 week ago by [email protected] to c/[email protected]
29
36
submitted 1 week ago by [email protected] to c/[email protected]

A cyberattack on the Ascension health system operating in 19 states across the U.S. forced some of its 140 hospitals to divert ambulances, caused patients to postpone medical tests and blocked online access to patient records

A cyberattack on the Ascension health system operating in 19 states across the U.S. forced some of its 140 hospitals to divert ambulances, caused patients to postpone medical tests and blocked online access to patient records.

An Ascension spokesperson said it detected “unusual activity” Wednesday on its computer network systems. Officials refused to say whether the non-profit Catholic health system, based in St. Louis, was the victim of a ransomware attack or whether it had paid a ransom, and it did not immediately respond to an email seeking updates.

But the attack had the hallmarks of a ransomware, and Ascension said it had called in Mandiant, the Google cybersecurity unit that is a leading responder to such attacks. Earlier this year, a cyberattack on Change Healthcare disrupted care systems nationwide, and the CEO of its parent, UnitedHealth Group Inc., acknowledged in testimony to Congress that it had paid a ransom of $22 million in bitcoin.

Ascension said that both its electronic records system and the MyChart system that gives patients access to their records and allows them to communicate with their doctors were offline.

“We have determined this is a cybersecurity incident,” the national Ascension spokesperson’s statement said. “Our investigation and restoration work will take time to complete, and we do not have a timeline for completion.”

To prevent the automated spread of ransomware, hospital IT officials typically take electronic medical records and appointment-scheduling systems offline. UnitedHealth CEO Andrew Witty told congressional committees that Change Healthcare immediately disconnected from other systems to prevent the attack from spreading during its incident.

The Ascension spokesperson's latest statement, issued Thursday, said ambulances had been diverted from “several” hospitals without naming them.

In Wichita, Kansas, local news reports said the local emergency medical services started diverting all ambulance calls from its hospitals there Wednesday, though the health system's spokesperson there said Friday that the full diversion of ambulances ended Thursday afternoon.

The EMS service for Pensacola, Florida, also diverted patients from the Ascension hospital there to other hospitals, its spokesperson told the Pensacola News Journal.

And WTMJ-TV in Milwaukee reported that Ascension patients in the area said they were missing CT scans and mammograms and couldn't refill prescriptions.

Connie Smith, president of the Wisconsin Federation of Nurses and Health Professionals, is among the Ascension providers turning to paper records this week to cope. Smith, who coordinates surgeries at Ascension St. Francis Hospital in Milwaukee, said the hospital didn’t cancel any surgical procedures and continued treating emergency patients.

But she said everything has slowed down because electronic systems are built into the hospital’s daily operations. Younger providers are often unfamiliar with paper copies of essential records and it takes more time to document patient care, check the results of prior lab tests and verify information with doctors’ offices, she said.

Smith said union leaders feel staff and service cutbacks have made the situation even tougher. Hospital staff also have received little information about what led to the attack or when operations might get closer to normal, she said.

“You’re doing everything to the best of your ability but you leave feeling frustrated because you know you could have done things faster or gotten that patient home sooner if you just had some extra hands,” Smith said.

Ascension said its system expected to use “downtime” procedures “for some time” and advised patients to bring notes on their symptoms and a list of prescription numbers or prescription bottles with them to appointments.

Cybersecurity experts say ransomware attacks have increased substantially in recent years, especially in the health care sector. Increasingly, ransomware gangs steal data before activating data-scrambling malware that paralyzes networks. The threat of making stolen data public is used to extort payments. That data can also be sold online.

“We are working around the clock with internal and external advisors to investigate, contain, and restore our systems,” the Ascension spokesperson's latest statement said.

The attack against Change Healthcare earlier this year delayed insurance reimbursements and heaped stress on doctor’s offices around the country. Change Healthcare provides technology used by doctor offices and other care providers to submit and process billions of insurance claims a year.

It was unclear Friday whether the same group was responsible for both attacks.

Witty said Change Healthcare's core systems were now fully functional. But company officials have said it may take several months of analysis to identify and notify those who were affected by the attack.

They also have said they see no signs that doctor charts or full medical histories were released after the attack. Witty told senators that UnitedHealth repels an attempted intrusion every 70 seconds.

A ransomware attack in November prompted the Ardent Health Services system, operating 30 hospitals in six states, to divert patients from some of its emergency rooms to other hospitals while postponing certain elective procedures.

30
142
submitted 1 week ago by [email protected] to c/[email protected]

Archived link.

On Jan. 6, 2021, QAnon conspiracy theorists played a significant role in inciting Donald Trump supporters to storm the Capitol building in D.C., hoping to overturn the 2020 election in favor of Trump.

Days later, Twitter suspended tens of thousands of QAnon accounts, effectively banning most users who promote the far-right conspiracy theory.

Now, a new study from Newsguard has uncovered that since Elon Musk acquired the company, QAnon has had a resurgence on X, formerly Twitter, over the past year.

QAnon grows on X

Tracking commonly used QAnon phrases like "QSentMe," "TheGreatAwakening," and "WWG1WGA" (which stands for "Where We Go One, We Go All"), Newsguard found that these QAnon-related slogans and hashtags have increased a whopping 1,283 percent on X under Musk.

From May 1, 2023 to May 1, 2024, there were 1.12 million mentions of these QAnon supporter phrases on X. This was a huge uptick from the 81,100 mentions just one year earlier from May 1, 2022 to May 1, 2023.

One of the most viral QAnon-related posts of the year, on the "Frazzledrip" conspiracy, has received more than 21.8 million views, according to the report. Most concerning, however, is that it was posted by a right-wing influencer who has specifically received support from Musk.

The Jan. 2024 tweet was posted by @dom_lucre, a user with more than 1.2 million followers who commonly posts far-right conspiracy theories. In July 2023, @dom_lucre was suspended on then-Twitter. Responding to @dom_lucre's supporters, Musk shared at the time that @dom_lucre was "suspended for posting child exploitation pictures."

Sharing child sexual abuse material or CSAM would result in a permanent ban on most platforms. However, Musk decided to personally intervene in favor of @dom_lucre and reinstated his account.

Since then, @dom_lucre has posted about how he earns thousands of dollars directly from X. The company allows him to monetize his conspiratorial posts via the platform's official creator monetization program.

Musk has also previously voiced his support for Jacob Chansely, a QAnon follower known as the "QAnon Shaman," who served prison time for his role in the Jan. 6 riot at the Capitol.

The dangers of QAnon

QAnon's adherents follow a number of far-right conspiracy theories, but broadly (and falsely) believe that former President Trump has been secretly battling against a global cabal of Satanic baby-eating traffickers, who just happen to primarily be made up of Democratic Party politicians and Hollywood elites.

Unfortunately, these beliefs have too often turned deadly. Numerous QAnon followers have been involved in killings fueled by their beliefs. In 2022, one Michigan man killed his wife before being fatally shot in a standoff with police. His daughter said her father spiraled out of control as he fell into the QAnon conspiracies. In 2021, another QAnon conspiracy theorists killed his two young children, claiming that his wife had "Serpent DNA" and his children were monsters.

Of course, QAnon never completely disappeared from social media platforms. Its followers still espoused their beliefs albeit in a more coded manner over the past few years to circumvent social media platforms' policies. Now, though, QAnon believers are once again being more open about their radical theories.

The looming November 2024 Presidential election likely plays a role in the sudden resurgence of QAnon on X, as QAnon-believing Trump supporters look to help their chosen candidate. However, Musk and X have actively welcomed these users to their social media service, eagerly providing them with a platform to spread their dangerous falsehoods.

31
143
submitted 1 week ago by [email protected] to c/[email protected]
32
84
submitted 1 week ago by [email protected] to c/[email protected]

Archived version

Here is the report (pdf)

Security researchers at Insikt Group identified a malign influence network, CopyCop, skillfully leveraging inauthentic media outlets in the US, UK, and France. This network is suspected to be operated from Russia and is likely aligned with the Russian government. CopyCop extensively used generative AI to plagiarize and modify content from legitimate media sources to tailor political messages with specific biases. This included content critical of Western policies and supportive of Russian perspectives on international issues like the Ukraine conflict and the Israel-Hamas tensions.

CopyCop’s operation involves a calculated use of large language models (LLMs) to plagiarize, translate, and edit content from legitimate mainstream media outlets. By employing prompt engineering techniques, the network tailors this content to resonate with specific audiences, injecting political bias that aligns with its strategic objectives. In recent weeks, alongside its AI-generated content, CopyCop has begun to gain traction by posting targeted, human-produced content that engages deeply with its audience.

The content disseminated by CopyCop spans divisive domestic issues, including perspectives on Russia’s military actions in Ukraine presented in a pro-Russian light and critical viewpoints of Israeli military operations in Gaza. It also includes narratives that influence the political landscape in the US, notably by supporting Republican candidates while disparaging House and Senate Democrats, as well as critiquing the Biden administration’s policies.

The infrastructure supporting CopyCop has strong ties to the disinformation outlet DCWeekly, managed by John Mark Dougan, a US citizen who fled to Russia in 2016. The content from CopyCop is also amplified by well-known Russian state-sponsored actors such as Doppelgänger and Portal Kombat. Also, it boosts material from other Russian influence operations like the Foundation to Battle Injustice and InfoRos, suggesting a highly coordinated effort.

This use of generative AI to create and disseminate content at scale introduces significant challenges for those tasked with safeguarding elections. The sophisticated narratives, tailored to stir specific political sentiments, make it increasingly difficult for public officials to counteract the rapid spread of these false narratives effectively.

Public-sector organizations are urged to heighten awareness around threat actors like CopyCop and the risks posed by AI-generated disinformation. Legitimate media outlets also face risks, as their content may be plagiarized and weaponized to support adversarial state narratives, potentially damaging their credibility.

33
28
Emoji history: the missing years (blog.gingerbeardman.com)
submitted 1 week ago by [email protected] to c/[email protected]
34
5
RSS and OPML (libranet.de)
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

Can somebody explain me how OPML works for RSS? Are these files usually imported into the RSS reader apps or are they used where they are? If I import multiple OPML files with multiple feeds, will the feeds from the first OPML be overwritten by those in the second one or will they add up? Will article read/unread status be synced to multiple devices if I use the same OPML file or not?

35
20
submitted 1 week ago by [email protected] to c/[email protected]

SMIC, China’s biggest contract chip manufacturer, is seen as critical to Beijing’s ambitions of cutting foreign reliance in its domestic semiconductor industry as the U.S. continues to curb China’s tech power. SMIC lags behind Taiwan’s TSMC and South Korea’s Samsung Electronics, according to analysts.

The company’s first-quarter net income plunged 68.9% from a year earlier to $71.79 million, compared with LSEG analysts’ average estimate of $80.49 million.

Gross margin slid to 13.7% in the quarter – the lowest the firm has ever recorded in nearly 12 years – according to LSEG data.

Revenue for the first quarter was $1.75 billion, up 19.7% from a year earlier, as customers stocked up on chips, SMIC said. This handily beat LSEG estimate of $1.69 billion.

"In the first quarter, the IC [integrated circuits] industry was still in the recovery stage and customer inventory gradually improved. Compared to three months ago, we have noticed that our global customers are more willing to build up inventory,” SMIC said on Friday.

Customers are building up inventory to brace for competition and respond to market demand, the firm said, adding that it was unable to fulfil a few rush orders in the first quarter as some production lines were running at near maximum capacity.

SMIC’s chips are found in automobiles, smartphones, computers, IoT technologies and others. More than 80% of its revenue in the first quarter came from customers in China, it said.

Bracing for competition

In a bid to build up competitiveness and increase market share, the firm said it was prioritizing areas such as capacity construction and R&D activities for investments.

"[To] ensure that the company maintain its leading position in fierce market competition and maximize the protection of investor interest ... the company plans not to pay dividends for the year 2023,” said SMIC.

“We believe that as long as there’s demand from customers along with our technology and capacity readiness, we can ultimately be bigger, better and stronger despite the fierce competition.”

The company expects second-quarter revenue to rise by 5% to 7% from the first quarter on strong demand, while gross margin could dip further to between 9% and 11%.

“Along with the increase in capacity scale, depreciation is expected to rise quarter by quarter. So the gross margin is expected to decline sequentially,” SMIC said.

The company was placed on a U.S. trade blacklist in 2020 due to which businesses were required to apply for a license before they could sell to SMIC, limiting its ability to acquire certain U.S. technology.

In a blow to U.S. sanctions, an analysis of Chinese tech giant Huawei’s Mate 60 Pro smartphone launched last year revealed that it runs on a 7-nanometer chip made by SMIC. The smartphone also appears to support 5G connectivity despite U.S. attempts to cut Huawei from key technologies including 5G chips.

TSMC and Samsung began mass producing 7-nanometer chips in 2018 and currently manufacture 3-nanometer chips — a smaller size denotes more advanced technology.

36
50
submitted 1 week ago by [email protected] to c/[email protected]
37
123
submitted 1 week ago by [email protected] to c/[email protected]
38
113
submitted 1 week ago by [email protected] to c/[email protected]
39
20
An Interview With Jack Dorsey (www.piratewires.com)
submitted 1 week ago by [email protected] to c/[email protected]
40
82
submitted 1 week ago by [email protected] to c/[email protected]

Archived version

One of the cornerstones in censorship circumvention is fully encrypted protocols, which encrypt every byte of the payload in an attempt to “look like nothing”. In early November 2021, the Great Firewall of China (GFW) deployed a new censorship technique that passively detects—and subsequently blocks—fully encrypted traffic in real time. The GFW’s new censorship capability affects a large set of popular censorship circumvention protocols, including but not limited to Shadowsocks, VMess, and Obfs4. Although China had long actively probed such protocols, this was the first report of purely passive detection, leading the anti-censorship community to ask how detection was possible.

The paper discloses findings and suggestions to the developers of different anti-censorship tools, helping millions of users successfully evade this new form of blocking.

41
17
submitted 1 week ago by [email protected] to c/[email protected]
42
38
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

Hello,

Edit2:

After some time has passed since the quite scary and depressing incident that happened to my mother and that promted my original post it is quite clear that this is not something that can be fixed with more technology.

There are a couple of small and reasonable adjustments that can be made but other than that this is a human 'problem' that requires humans.

So I'll try to get my mother more services with people coming to her place to help and to check up on her. I will also go there more myself and help her cook, clean, shop, etc (and ultimately I suspect I'll have to move in with her for the end of her life).

Thanks again to everyone that got involved

/Edit2

Edit:

It's evident that I’m having trouble to define my needs and wants in this domain, probably because I know too little. I’m learning a lot and hopefully I will be able to ask better questions soon.

I think that what I'm looking for is a wearable basic phone to receive and make calls.

Something like https://xplora.se/product/xplora-xgo3/ (Swedish, didn't find in Englis ) or maybe even https://www.doro.com/en-gb/products/smart-devices/smartwatch/ but with less vendor lock in.

It seems that having it be a 'real' phone is less common than I thought but connecting to another mobile device with Bluetooth is more common, and I guess functionally there isn't much difference

Obviously I don't expect to find something that fits perfectly, but by aiming high I hope to find something useful

/Edit

I've just started to look into smartwatches and wonder if you could help me with your prior knowledge and experience.

I have some things on my wishlist, but it's hard to understand if they are reasonable and what to look for in all the sales copy and vendor provided specifications.

I know basically nothing in this domain.

Extra background, for context

innehållsvarningI've started to look into smart watches as I'd like one for my elderly mother that "never" answers her phone as she somedays turns her normal phone off if too many people want to talk to her when she doesn't feel like it but more often than not she simply doesn't get to the phone in time (yes it's a mobile phone, but she uses it as an old cordless landline phone when she is at home).

The idea is to get her a smartwatch with a new number that only I, and her other caregivers and ICE contacts know about so she knows where it is (in her arm) and also knows that it's important to answer when it rings.

Anyhooo....

.

.

  • What I require:
    • phone calls and text messages by cellular tech[1] (Edit: maybe this is not as easy as I thought initially, it might be more like a wish than a requirement)
    • long battery time
  • What I wish for:
    • ability to turn stuff off (either in the stock OS or with alternative OS that is easy to install), specifically health stuff[2]
    • ability to manage the watch remotely so that I can help her keep it updated.
    • budget suggestions rather than premium.
  • What I'll avoid:
    • Vendor lock ins like subscriptions.
    • Apple products.

Well, I think that's it, thanks for reading and I'm looking forward to your suggestions and ideas.

/Kruffa


[1] I'm not sure what the correct English term is for the tech... but using a SIM-card that connects to cell-towers using GSM/edge/4G/5G or similar.

[2] It's my understanding that these kinds of watches can be used to track and monitor health statuses like SpO~2~, heartrate, etc. I don't want her to monitor those unless there is a sure way to connect them to health and/or emergency services.

43
43
Dell Data Breach (literature.cafe)
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

Has anyone else received an email from Dell about a data breach? I’ve gotten three messages just today. What’s going on?

Dell Technologies takes the privacy and confidentiality of your information seriously. We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell. We believe there is not a significant risk to our customers given the type of information involved. 

What data was accessed?
At this time, our investigation indicates limited types of customer information was accessed, including: 

  • Name 
  • Physical address 
  • Dell hardware and order information, including service tag, item description, date of order and related warranty information 


The information involved does not include financial or payment information, email address, telephone number or any highly sensitive customer information. 

**What is Dell doing? **
Upon identifying the incident, we promptly implemented our incident response procedures, began investigating, took steps to contain the incident and notified law enforcement. We have also engaged a third-party forensics firm to investigate this incident. We will continue to monitor the situation. 

**What can I do? **
Our investigation indicates your information was accessed during this incident, but we do not believe there is significant risk given the limited information impacted. However, you should always keep in mind these tips to help avoid tech support phone scams. If you notice any suspicious activity related to your Dell accounts or purchases, please immediately report concerns to [email protected].

44
130
submitted 1 week ago by [email protected] to c/[email protected]

Surely the clearest path to retaining only the best.

45
65
submitted 1 week ago by [email protected] to c/[email protected]

Thanks, I hate it.

46
12
submitted 1 week ago by [email protected] to c/[email protected]
47
13
submitted 1 week ago by [email protected] to c/[email protected]
48
35
submitted 1 week ago by [email protected] to c/[email protected]
49
72
submitted 1 week ago by [email protected] to c/[email protected]
50
28
submitted 1 week ago by [email protected] to c/[email protected]

I wanna make some games but idk where to start. Thinking of gbstudio but the hardware limits would make making a card game hard, any other easy tools? Is there a gbstudio eqivament for 16-32 bit systems?

view more: ‹ prev next ›

Technology

37210 readers
223 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS