Technology

3510 readers
261 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Post guidelines

[Opinion] prefixOpinion (op-ed) articles must use [Opinion] prefix before the title.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution


If someone is interested in moderating this community, message @brikox@lemmy.zip.

founded 2 years ago
MODERATORS
76
 
 

AI police tool is designed to avoid accountability, watchdog says.

77
 
 

Amazon Web Services has updated its AWS Free Tier program, allowing new customers to receive up to $200 in AWS credit that can be spent on various AWS services.

78
 
 

Ukrainian firm TENETA introduces the MITLA, a lightweight anti-drone device designed to intercept enemy drones using a rapid-deploying net.

79
 
 

A group of more than 60 Microsoft shareholders has filed a proposal that will be voted on at the company's next Annual General Meeting.

80
81
3
submitted 3 days ago* (last edited 3 days ago) by BrikoX@lemmy.zip to c/technology@lemmy.zip
 
 

OpenAI is following Perplexity and is working on its own AI-powered browser codenamed "Aura."

82
 
 

China wants to launch the world's first hyperloop within a decade.

83
 
 

France, Spain, Italy, Denmark and Greece will test a blueprint for an age verification app to protect children online, the European Commission said on Monday, amid growing global concern about the impact of social media on children's mental health.

84
 
 

Like YouTube, Meta says it won't penalize users who are engaging with other people's content, doing things like making reaction videos, joining a trend, or adding their own takes.

85
 
 

Opinion: Mozilla's management is a bug, not a feature

86
 
 

Google recently disabled uBlock Origin and other extensions for Chrome users with no apparent option to restore them. The good news is that you can still make uBlock Origin work. Here is how.

87
 
 

The Iranian Embassy in India has issued a warning about fraudulent social media accounts impersonating official Iranian entities. These fake accounts are disseminating false information, including claims about Iran reconsidering the Chabahar port agreement with India. The embassy asserts that these accounts aim to undermine the relationship between Iran and India.

88
 
 

Key findings

  • Between March and June 2025, Proofpoint Threat Research observed three Chinese state-sponsored threat actors conduct targeted phishing campaigns against the Taiwanese semiconductor industry. In all cases, the motive was most likely espionage.
  • Targets of these campaigns ranged from organizations involved in the manufacturing, design, and testing of semiconductors and integrated circuits, wider equipment and services supply chain entities within this sector, as well as financial investment analysts specializing in the Taiwanese semiconductor market.
  • This activity likely reflects China’s strategic priority to achieve semiconductor self-sufficiency and decrease reliance on international supply chains and technologies, particularly in light of US and Taiwanese export controls.

China-aligned threat actors have routinely targeted the semiconductor industry for many years. This activity likely aligns with China’s internal strategic economic priorities, which have increasingly emphasized the importance of semiconductor technologies in successive national economic development initiatives, including the Five-Year Plans. A growing focus on ensuring strategic self-reliance for semiconductor technologies, accelerated by external pressures from export controls, has likely reinforced the priority of intelligence collection operations directed at this industry. This is reflected in China-aligned espionage activity tracked by the Proofpoint Threat Research team, where we are currently observing an elevated level of targeting of the industry by China-aligned groups compared to historical activity.

Between March and June 2025, Proofpoint identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. This included a China-aligned threat actor tracked as UNK_FistBump targeting semiconductor design, manufacturing, and supply chain organizations in employment-themed phishing campaigns resulting in the delivery of Cobalt Strike or the custom Voldemort backdoor.

Additionally, Proofpoint observed another China-aligned threat actor tracked as UNK_DropPitch targeting individuals in multiple major investment firms who specialize in investment analysis specifically within the Taiwanese semiconductor industry. This UNK_DropPitch targeting is exemplary of intelligence collection priorities spanning less obvious areas of the semiconductor ecosystem beyond just design and manufacturing entities. Finally, we also observed an actor tracked as UNK_SparkyCarp conducting credential phishing activity against a Taiwanese semiconductor company using a custom Adversary in the Middle (AiTM) phishing kit.

[...]

89
 
 

Chinese AI startup Moonshot releases open-source Kimi K2 model that outperforms OpenAI and Anthropic on coding tasks with breakthrough agentic capabilities and competitive pricing.

90
11
submitted 6 days ago* (last edited 6 days ago) by BrikoX@lemmy.zip to c/technology@lemmy.zip
 
 

Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.

91
 
 

Russia and Belarus intend to develop their own artificial intelligence model built on “traditional values” that would be “understandable” to citizens of both countries.

92
93
 
 

Even Barbie couldn’t save it.

94
95
96
97
98
99
100
view more: ‹ prev next ›