Tuxedo Book XP15 Linux laptop now available with up to NVIDIA GeForce RTX 3080 graphics

Linux laptop company Tuxedo Computers is now offering a handful of notebooks with support for NVIDIA GeForce RTX 30 series graphics, including the new Tuxedo Book XP15 Gen 12 notebook which is a 4.4 pound computer with a 15.6 inch display, an Intel Co…

Linux laptop company Tuxedo Computers is now offering a handful of notebooks with support for NVIDIA GeForce RTX 30 series graphics, including the new Tuxedo Book XP15 Gen 12 notebook which is a 4.4 pound computer with a 15.6 inch display, an Intel Core i7-10870H processor, and support for up to RTX 3080 Max-Q graphics. […]

The post Tuxedo Book XP15 Linux laptop now available with up to NVIDIA GeForce RTX 3080 graphics appeared first on Liliputing.

Neue Clearingstelle: Provider könnten jährlich bis zu 250 Domains sperren

Eine neu eingerichtete Clearingstelle der Provider und Rechteinhaber hat erstmals eine Webseitensperre empfohlen. Jährlich sind bis zu 250 Sperren möglich. (Netzneutralität, WLAN)

Eine neu eingerichtete Clearingstelle der Provider und Rechteinhaber hat erstmals eine Webseitensperre empfohlen. Jährlich sind bis zu 250 Sperren möglich. (Netzneutralität, WLAN)

Recht haben und Recht bekommen in Sachen Klimaschutz

Auf zwei Ebenen klagen Umwelthilfe und Aktivisten gegen die Bundesregierung: Bestenfalls muss sie die Zielvorgaben im Klimaschutzgesetz von 2019 nach oben korrigieren. Oder wenigstens die bescheidenen Ziele einhalten

Auf zwei Ebenen klagen Umwelthilfe und Aktivisten gegen die Bundesregierung: Bestenfalls muss sie die Zielvorgaben im Klimaschutzgesetz von 2019 nach oben korrigieren. Oder wenigstens die bescheidenen Ziele einhalten

Why Big Tech is facing regulatory threats from Australia to Arizona

The era of Silicon Valley exceptionalism is over.

Why Big Tech is facing regulatory threats from Australia to Arizona

Enlarge (credit: Jackie Niam | Getty Images)

Last week, Arizona's House of Representatives approved legislation to prohibit platform owners like Apple and Google from locking app makers into their own payment systems. The bill passed only narrowly, and it must be approved by the Arizona Senate and Gov. Doug Ducey before it can become law. But regardless of the bill's ultimate fate, the vote is the latest sign of a dramatic shift in public attitudes toward Silicon Valley's most powerful companies.

For the first two decades of the Internet era, there was a broad consensus that politicians shouldn't tie Silicon Valley companies down with burdensome rules and regulations. Companies like Apple, Amazon, Google, and Uber were widely admired. In 2007, presidential candidates from both parties made pilgrimages to associate themselves with Google. In 2015, Jeb Bush, Ted Cruz, and other Republican hopefuls tripped over each other to position themselves as the most Uber-friendly candidate.

Tech companies' prestige bolstered their political power. Those who proposed regulations to rein in tech companies—or in some cases just wanted to subject them to the same rules as other companies—were often dismissed as out-of-touch reactionaries and enemies of progress.

Read 25 remaining paragraphs | Comments

Stopp von Zwangs-Rollout: Zu dumm, um smart zu sein

Nach einem Gerichtsbeschluss sind vernetzte Stromzähler nicht schlau genug für die Energiewende. Was bedeutet das für Betreiber und Verbraucher? Eine Analyse von Friedhelm Greis (Smart Meter, GreenIT)

Nach einem Gerichtsbeschluss sind vernetzte Stromzähler nicht schlau genug für die Energiewende. Was bedeutet das für Betreiber und Verbraucher? Eine Analyse von Friedhelm Greis (Smart Meter, GreenIT)

There’s a vexing mystery surrounding the 0-day attacks on Exchange servers

A half-dozen groups exploiting the same 0-days is unusual, if not unprecedented.

The phrase Zero Day can be spotted on a monochrome computer screen clogged with ones and zeros.

Enlarge (credit: Getty Images)

The Microsoft Exchange vulnerabilities that allow hackers to take over Microsoft Exchange servers are under attack by no fewer than 10 advanced hacking groups, six of which began exploiting them before Microsoft released a patch, researchers reported Wednesday. That raises a vexing mystery: how did so many separate threat actors have working exploits before the security flaws became publicly known?

Researchers say that as many as 100,000 mail servers around the world have been compromised, with those for the European Banking Authority and Norwegian Parliament being disclosed in the past few days. Once attackers gain the ability to execute code on the servers, they install web shells, which are browser-based windows that provide a means for remotely issuing commands and executing code.

When Microsoft issued emergency patches on March 2, the company said the vulnerabilities were being exploited in limited and targeted attacks by a state-backed hacking group in China known as Hafnium. On Wednesday, ESET provided a starkly different assessment. Of the 10 groups ESET products have recorded exploiting vulnerable servers, six of those APTs—short for advanced persistent threat actors—began hijacking servers while the critical vulnerabilities were still unknown to Microsoft.

Read 18 remaining paragraphs | Comments