One teen may have just achieved the dream of every cost-conscious wireless user: free, no-strings-attached mobile data. High school student Jacob Ajit claims to have discovered a trick that gets you all the T-Mobile data you want by using a proxy server. If you use the proxy to make it look like every site link has that text, you can surf to your heart's content at no charge beyond what it cost to get the SIM. Before you ask: sorry, folks, Ajit's proxy is down. We've asked T-Mobile about the workaround, and we'll let you know if it can verify its authenticity and say what it's doing in response.
At AWS re:Invent 2019, we launched the preview of Amazon RDS Proxy, a fully managed, highly available database proxy for Amazon Relational Database Service (RDS) that makes applications more scalable, more resilient to database failures, and more secure. Following the preview of MySQL engine, we extended to the PostgreSQL compatibility. Today, I am pleased to announce that we are now generally available for both engines. Many applications, including those built on modern serverless architectures using AWS Lambda, Fargate, Amazon ECS, or EKS can have a large number of open connections to the database server, and may open and close database connections at a high rate, exhausting database memory and compute resources. Amazon RDS Proxy allows applications to pool and share connections established with the database, improving database efficiency, application scalability, and security.
Ransomware distributors expecting an easy payday are having their illicit earnings stolen before they're even received by other cyber criminals who are hijacking the ransom payments and redirecting them into their own bitcoin wallets. But not only are the attacks giving criminals a taste of their own medicine in becoming victims of cyber theft, it's also preventing ransomware victims from unlocking their encrypted files -- because as far as those distributing the malware are concerned, they never received their money. Uncovered by researchers at Proofpoint, it's believed to be the first scheme of its kind, with cyber criminals using a Tor proxy browser to carry out man-in-the-middle attacks to steal the . The attacks take advantage of how ransomware distributors request victims to use Tor to buy cryptocurrency to make payments. While many ransomware notes provide instructions on how to download and run the Tor browser, others provide links to a Tor proxy - regular websites that translate Tor traffic into normal web traffic - so the process of paying is as simple as possible for the victim.
Queen Elizabeth's mother has been baptized as a Mormon. The Queen Mother didn't practice the religion when she was alive: she was a faithful member of the Church of England. But Helen Radkey, a former Mormon herself, discovered the "proxy baptism" of the royal after analyzing the church's public genealogical database, called Family Search. She also found that at least 20 Holocaust victims have been baptized in the past five years in defiance of church rules.
Yahoo said it learned of its recent massive breach, which affected more than 500 million user accounts, in August. Yet on Sept. 9 -- after it started its investigation -- the company said in a regulatory filing that it was not aware of "any incidents of, or third party claims alleging" security breaches, "unauthorized access or use" of its information technology systems or misuse of personal information that could significantly impact its business. This apparent conflict between when it learned about the breach and what it filed with the Securities and Exchange Commission about its proposed sale to Verizon has raised questions about what the tech company knew and when. Companies are required to tell the SEC about events that any "reasonable investor would consider important in an investment decision," according to the agency. Independent security experts who looked at the proxy filing say the company could be on shaky ground if it comes to light that it in any way understood the seriousness of the breach when it had made that statement.