Agregátor RSS

Nejlepší filmy s odstřelovači. Příběhy, kde o osudu rozhoduje jediný výstřel snipera

Živě.cz - 17 Duben, 2026 - 20:15
Odstřelovači se vyskytují v mnoha filmech. V našem výběru najdete filmy historické, válečné, moderní i akční. Některé jsou realistické, jiné skuteční snajpři označují spíše za pohádky. Všechny ale mají jedno společné – odstřelovači zde hrají důležitou nebo dokonce hlavní roli.
Kategorie: IT News

IPv6 may briefly have accounted for more than half of internet traffic

Computerworld.com [Hacking News] - 17 Duben, 2026 - 20:02

Has IPv6 finally reached its day of glory?

It’s fair to say that IPv6 has not had the level of take-up expected when the Internet Engineering Task Force (IETF) ratified it back in 1998. Take-up has been agonizingly slow, not reaching 5 percent of traffic until 2014. However, the use of IPv6 has been slowly climbing since, and according to Google statistics, briefly accounted for 50.1% of the internet traffic Google sees on March 28.

However, technology publication The Register, which spotted the tiny but significant blip in Google’s traffic graphic, quoted two other sources: Cloudflare and APNIC Labs as stating that IPv6 had yet to reach such an exalted level: Cloudflare tracked it at a high of 43 percent, while APNIC registered that 43.13% of network hosts across the world were IPv6 capable.

It has been a long climb to this point. IPv6, with support for around 3.4 x 1038  addresses, was developed due to fears that the 4.3 billion unique addresses available under the previous version of the protocol, IPv4, would be insufficient for a global population now numbering around 8 billion.

While the development of technologies such as Network Address Translation has extended the lifespan of IPv4 by allowing multiple devices to hide behind a single address, there is little doubt that IPv6 has gradually been growing in importance and there is every chance that the 50 percent usage line will be crossed for good at some point in the future.

This article first appeared on Network World.

Kategorie: Hacking & Security

Portál Moje daně se přestěhuje na jednodušší adresu pod doménu gov.cz

Živě.cz - 17 Duben, 2026 - 19:45
Ač už Finanční správa stejně jako většina ostatních největších státních úřadů funguje na jednotné doméně financnisprava.gov.cz, tak klíčový eGov nástroj Moje daně nadále běží na staré nepřehledné adrese adisspr.mfcr.cz/pmd/home. Letos se to ale změní a služba pro podávání daňových přiznání se také ...
Kategorie: IT News

Robot Zuckerberg shows how IT can free up CEOs’ time

Computerworld.com [Hacking News] - 17 Duben, 2026 - 19:28

Mark Zuckerberg, the CEO of Meta, is building an AI version of himself.

The virtual CEO is being trained on Zuckerberg’s mannerisms and will be loaded with his views on corporate strategy, the Financial Times reported.

The idea is that employees will find the virtual Zuckerberg more accessible than they would the flesh and blood manifestation.

There are plenty of claims that AI will lead to jobs being eliminated but, until now, the CEO job has looked safe. If Zuckerberg’s experiment proves successful, though, even company leaders could be due for the chop.

In February, OpenAI’s Sam Altman warned that CEOs could be as vulnerable as other senior executives. “AI superintelligence at some point on its development curve would be capable of doing a better job being the CEO of a major company than any executive, certainly me,” Altman said. “On our current trajectory, we believe we may be only a couple of years away from early versions of true superintelligence.”

Klarna CEO Sebastian Siemiatkowski has already tempted fate, using an AI version of himself to present the company’s financial results to analysts, and even to take customer calls. So far, though, he’s kept his job.

Kategorie: Hacking & Security

UK wants to build sovereign AI — with just 0.08% of OpenAI’s market cap

Computerworld.com [Hacking News] - 17 Duben, 2026 - 19:20

The UK government has created a Sovereign AI investment fund with up to £500 million (US$675 million) to spend on turning UK startups into national AI champions.

Its support could involve investments of up to £20 million per startup, or provision of up to 1 million GPU-hours of AI compute, and fast-tracking of visas to bring skilled workers to the UK.

The multi-million-pound budget sounds impressive, but it’s just 0.08% of OpenAI’s recent $852 billion valuation. That company just received fresh investment of $122 billion, dwarfing the UK’s sovereign fund.

Closer to home, that £500 million would buy about 5% of French AI startup Mistral, which has achieved its success by offering a European alternative for businesses that do not want to use American or Chinese AI providers.

The UK government does not have a great record when it comes to investing in national IT champions. In the 1960s and 1970s, the government ran the National Enterprise Board which provided funding to new technology companies, but even the biggest names helped in this way have slipped out of UK ownership: ICL, a mainframe challenger to IBM, eventually became part of Japan’s Fujitsu, while Inmos, an early innovator in parallel computing, is now part of Dutch chip giant STMicroelectronics.

Kategorie: Hacking & Security

CISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attack

The Register - Anti-Virus - 17 Duben, 2026 - 19:09
Bug hiding in plain sight for over a decade lands on KEV list

CISA is sounding the alarm on a newly-exploited Apache ActiveMQ bug, ordering federal agencies to patch within two weeks as attackers circle a flaw that's been quietly lurking for more than a decade.…

Kategorie: Viry a Červi

Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker

The Register - Anti-Virus - 17 Duben, 2026 - 18:31
Or, how public information and a €5 tracker exposed an avoidable opsec lapse

Militaries around the world spend countless hours training, developing policies, and implementing best operational security practices, so imagine the size of the egg on the face of the Dutch navy when journalists managed to track one of its warships for less than the cost of some hagelslag and a coffee.…

Kategorie: Viry a Červi

Hackeři, kteří vykradli Spotify, u soudu prohráli bez boje. Musí zaplatit 322 milionů dolarů

Živě.cz - 17 Duben, 2026 - 17:45
Ze Spotify útočníci stáhli všechno, co se dalo. • Obří balík obsahuje hudební soubory, přebaly, metadata apod. • Piráti chtějí postupně všechny sdílet na torrentech.
Kategorie: IT News

eBPF for Runtime Threat Detection: What Linux Admins Are Actually Deploying

LinuxSecurity.com - 17 Duben, 2026 - 17:44
Runtime security has moved from ''nice to have'' to an operational baseline in Linux environments. Most teams learned the hard way that logs and post-event alerts don't catch what actually runs on the system in real time. Attackers don't wait for indexing pipelines or SIEM correlation.
Kategorie: Hacking & Security

How to think about Apple Business

Computerworld.com [Hacking News] - 17 Duben, 2026 - 17:43

Apple Business is aimed at small businesses coalesced around Macs, iPhones, and iPads. If that’s you, and all your systems are made by Apple, the service is likely to be all you need to run a small operation of up to a few dozen seats. 

But Apple Business isn’t really designed to handle the advanced needs of larger enterprises. And while it can provide a starting point for Mac deployments in mixed-platform environments, it probably shouldn’t be where you end up.

It doesn’t handle cross-platform device deployments, for which you’ll need full-strength MDM solutions (such as those from up-and-coming vendor Fleet). Another thing Apple Business doesn’t do is cover the full extent of compliance targets you might need to meet at your company. So, if you need to ensure compliance with standards/benchmarks such as HIPAASOC 2ISO 27001, or CIS, you’ll need to choose something else.

This is also true if you need to ensure your endpoints are secured, or you require automated vulnerability scanning. 

A gift to small enterprise

That’s not to say Apple Business doesn’t have its uses. It clearly does. If you run a small business with up to, say, 50 staffers and you use Apple kit across the company, you’ll be able to manage your devices and app deployments yourself, no admin required.

That makes it a great tool for high-growth startups, many of which use Apple right from the start. Those businesses will be able to manage devices across their teams for free using Apple Business. They can always scale up once business is booming, making the service a gateway to tech success for many startups or small enterprises. The ability to streamline device management company-wide at no charge is a gift.

Setting the stage

Many might feel that with the international introduction of Apple Business, the company has torn a chunk out of the MDM industry. That’s less true than it sounds; many in the space already support small deployments for free, so what Apple is doing is winnowing away some of the smaller businesses who might use the resources provided by MDM firms but never become paying customers. 

Those customers are also an excellent market for the AppleCare support the company offers alongside Apple Business. It gives people the experience of device management, so that by the time they shift to a more advanced plan to support growth, they have a better understanding of what that involves.

Apple has drawn a line in the sand with the business. It’s basically saying that on the SMB side of that strip, it has you covered — and it has effectively defined its rapidly maturing MDM partners as focused on the needs of large customer deployments.

Market opportunity knocks

The good news there is that those large deployments do actually exist. In the last three years, Apple has confirmed huge Mac deployments (thousands of Macs) at SAP, Snowflake, Capital One, Coppel, Nubank, and elsewhere. Just last year, Apple CFO Kevan Parekh confirmed the best ever June quarter for Mac in the enterprise, and with the MacBook Neo, the company seems to be seeing dramatic growth in every one of the 200 markets in which you can now sign up for Apple Business.

So, while Apple nurtures tomorrow’s big businesses, its MDM partners can continue to meet the more diverse and demanding needs of larger enterprise entities. 

With the low-cost Neo arguably emerging to be the company’s iPhone moment for the Mac, Apple is also building business fast in emerging markets. Since use of Apple Business remains an integral component of working with any third-party device management partner (if only to assign the devices to an MDM system), the opportunity exits to scale up for business growth and scale down if that market contracts. It’s a world-class, ecosystem-based set of functionalities to support small business and enable corporations, all in one place.

You just need to know which problems it solves. Deployment? Yes. Compliance, edge security, and cross-platform support? No.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

Otevřené modely našly stejné chyby co Anthropic Mythos

AbcLinuxu [zprávičky] - 17 Duben, 2026 - 17:17
Stanislav Fort, vedoucí vědecký pracovník z Vlčkovy 'kyberbezpečnostní' firmy AISLE, zkoumal dopady Anthropic Mythos (nový AI model od Anthropicu zaměřený na hledání chyb, který před nedávnem vyplašil celý svět) a předvedl, že schopnosti umělé inteligence nejsou lineárně závislé na velikosti nebo ceně modelu a dokázal, že i některé otevřené modely zvládly v řadě testů odhalit ve zdrojových kódech stejné chyby jako Mythos (například FreeBSD CVE-2026-4747) a to s výrazně nižšími provozními náklady.
Kategorie: GNU/Linux & BSD

Grinex exchange blames "Western intelligence" for $13.7M crypto hack

Bleeping Computer - 17 Duben, 2026 - 17:08
Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies. [...]
Kategorie: Hacking & Security

Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops

Bleeping Computer - 17 Duben, 2026 - 16:01
In cybercrime markets, trust isn't assumed, it's verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability. [...]
Kategorie: Hacking & Security

Tak vypadá budoucnost války. Ukrajina dobyla nepřátelskou pozici bez pěchoty, pouze pomocí dronů a pozemních robotů

Živě.cz - 17 Duben, 2026 - 15:45
Ukrajinská armáda poprvé dobyla pozici pouze pomocí autonomních platforem • Ukrajinský zbrojní průmysl aktuálně produkuje miliony různých dronů • Zahraniční experti varují před budoucími politickými riziky robotických invazí
Kategorie: IT News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

The Hacker News - 17 Duben, 2026 - 15:21
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Alza se znovu porouchala. Na pobočkách nelze vyzvedávat objednávky

Živě.cz - 17 Duben, 2026 - 14:30
Oživeno 17. 4. ve 14:30 | Alza má od dnešního poledne na webu další varovnou hlášku. „Omlouváme se, ale z technických důvodů momentálně nelze vyzvedávat objednávky na našich pobočkách. Na opravě usilovně pracujeme. Děkujeme za pochopení,“ stojí na stránkách. Jestli jde o stejnou chybu jako ...
Kategorie: IT News

Webinar: From phishing to fallout — Why MSPs must rethink both security and recovery

Bleeping Computer - 17 Duben, 2026 - 14:20
Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing driving much of today's cybercrime. Join our upcoming webinar to learn how to combine security and recovery strategies to reduce risk and maintain business continuity. [...]
Kategorie: Hacking & Security
Syndikovat obsah