#dr-dos-revival

[ follow ]
#cybersecurity
fromSilicon Canals
6 days ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Information security
fromThe Hacker News
1 day ago

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

A new Zig dropper in the GlassWorm campaign stealthily infects all IDEs on a developer's machine through a malicious VS Code extension.
Information security
fromSilicon Canals
6 days ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
fromEngadget
2 days ago

A maverick hacker got Mac OS X running on a Wii

"Last year, when I saw that Windows NT had been ported to the Wii, I felt a renewed sense of motivation. Even if my lack of low-level experience resulted in failure, attempting this project would still be an opportunity to learn something new."
Games
#linux
fromZDNET
2 months ago
Software development

This Linux project proves you can bring back Windows 8 - but not why you should

fromZDNET
2 months ago
Software development

This Linux project proves you can bring back Windows 8 - but not why you should

Roam Research
fromTheregister
5 days ago

The developer who came in from the cold melted a mainframe

A reader shares a humorous story about being a Sybase developer in the 1990s, dealing with cold conditions and a clever workaround.
Information security
fromThe Hacker News
3 days ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
fromThe Verge
1 week ago

Apple II Forever!

Apple would never have made it if it weren't for the Apple II, the company's first hit product and the first one to generate the amount of devotion we've now come to expect from fans of Apple's products.
Apple
fromTechCrunch
2 weeks ago

Let's take a look at the retro tech making a comeback | TechCrunch

Digital typewriters are carving out a niche for a more focused writing experience, stripping things back to the essentials: just you, a keyboard, and your words.
Photography
fromThe Verge
1 week ago

I saved a doomed Windows laptop by embracing Linux

The solution, according to Microsoft, is to get rid of it and buy a computer that can run Windows 11. But that's not good enough. This ThinkPad - like millions of other PCs in the same boat - is still perfectly functional.
Software development
Apple
fromThe Verge
1 week ago

The Macintosh changed computers forever

The Macintosh revolutionized computing despite initial shortcomings, and its iconic commercial significantly raised its profile and legacy.
Fashion & style
fromwww.scientificamerican.com
3 weeks ago

The math that explains why Y2K is back in fashion

Fashion trends follow a mathematical 20-year cycle, with hemlines, necklines, and waistlines returning to popularity approximately two decades after their previous prominence.
Gadgets
fromZDNET
2 weeks ago

The Flipper One looks like a serious hacking tool, and I can't wait to try it - here's why

The Flipper Zero is an educational digital tool for hacking and exploring wireless technologies.
fromKotaku
3 weeks ago

'Unhackable' Xbox One Finally Hacked, 12 Years After Release

While the PlayStation 4 was considered jailbroken by 2016, the Xbox One has remained invulnerable since its release on November 22, 2013. Well, that is until very recently, as Markus 'Doom' Gaasedelen just showcased a newly discovered 'Bliss' exploit at RE//verse 2026.
Video games
#windows
fromTechCrunch
1 month ago
Information security

Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch

fromTechCrunch
1 month ago
Information security

Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch

Web development
fromTheregister
3 weeks ago

Brilliant backups landed web developer in big trouble

A website migration oversight caused a two-year disconnect where office staff viewed outdated content due to hardcoded DNS settings, while the client only discovered the issue when accessing the site from the office.
Privacy professionals
fromSecurityWeek
3 weeks ago

Hacker Conversations: Ben Harris, from Unintentional Young Hacker to Intentional Adult CEO

Ben Harris evolved from a mischievous school hacker into a legitimate cybersecurity entrepreneur, founding WatchTowr to identify and validate exploitable vulnerabilities in real-time.
#windows-95
Privacy technologies
fromTheregister
4 weeks ago

Nanny state vs. Linux: show us your ID, kid

Multiple US states now require operating system vendors to collect and store user age or date of birth, with similar laws emerging globally and threatening open-source platforms' user freedom principles.
Games
fromTheregister
3 weeks ago

Former Microsoft dev trains AI to master Robotron: 2084

A former Microsoft engineer is training AI to master Robotron: 2084, a 1982 arcade game requiring real-time decision-making, prioritization, and tactical gameplay under extreme pressure.
#windows-security
fromTheregister
2 weeks ago
Information security

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
fromComputerworld
2 weeks ago
Information security

A critical Windows security fix puts legacy hardware on borrowed time

Microsoft will block unvetted kernel drivers starting April 2026, impacting legacy applications while enhancing security.
Information security
fromTheregister
2 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
#supply-chain-attack
fromMedium
1 month ago
Web frameworks

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

fromInfoWorld
1 month ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

fromMedium
1 month ago
Web frameworks

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

fromInfoWorld
1 month ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

DevOps
fromTheregister
1 month ago

Microsoft Azure CTO says Claude found vulns in Apple II code

AI can decompile machine code and discover vulnerabilities in legacy systems, creating security risks for billions of deployed microcontrollers worldwide.
fromYanko Design - Modern Industrial Design News
4 weeks ago

This Foldable DIY Cyberdeck Has Breadboards Built In and Runs Doom - Yanko Design

What separates this from a standard Raspberry Pi build is the pair of breadboards soldered directly to the GPIO pins, seated inside the case, and accessible through a removable back panel. Connecting a sensor no longer means hunting for a separate breadboard and a tangle of jumper wires. PickentCode plugged in a temperature and humidity sensor and had it reading live data within minutes.
Gadgets
Information security
fromSecurityWeek
2 weeks ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
fromTheregister
1 month ago

When protecting your data meant punching a hole in it

The presence of a notch made the floppy write-protected, so you started with a write-enabled floppy, and if you wanted to protect it, you punched a notch at just the right spot.
Typography
fromSecurityWeek
1 month ago

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

I got a rush from feeling challenged. The computer would say 'No', and I would think, 'Well, we'll see'. In his own words it was more a case of Rage Against the Machine than simply Stayin' Alive.
Digital life
Tech industry
fromWIRED
1 month ago

These Official ChromeOS Flex USB Sticks Can Give Your Old Mac or Windows PC a Second Life

Google and Back Market partner to offer ChromeOS Flex as an affordable alternative to Windows 11, allowing users to extend device lifespans rather than purchasing new hardware.
fromTheregister
1 month ago

DR-DOS rises again - rebuilt from scratch, not open source

The long-dormant DR-DOS.com website is alive again, and DR-DOS 9.0 is in development. There have been six preliminary releases so far this year. The current work-in-progress version is version 9.0.291. This is not the same OS as the DOS-compatible OS that Digital Research developed back in the 1980s, working on the basis of its multitasking multiuser Concurrent DOS OS.
Software development
Information security
fromTheregister
1 month ago

CISA says n8n critical bug exploited in real-world attacks

CISA mandates immediate patching of CVE-2025-68613, a critical 9.9-severity remote code execution vulnerability in n8n workflow automation platform affecting over 103,000 users.
Privacy professionals
fromFast Company
1 month ago

Teenage hackers are on the rise, and they're more dangerous than you think

Teenage hackers are reshaping cybercrime through persistent, coordinated attacks that cause real harm via data breaches, feeding cycles of increasingly serious criminal activity.
Video games
fromKotaku
1 month ago

Retro Video Game Preservation Site Myrient Shutting Down

Myrient, a free video game preservation site with 390+ terabytes of content, will shut down by March 31, 2026, due to unsustainable $6,000 monthly server costs and stagnant donations amid rising hardware prices.
Software development
fromTheregister
1 month ago

Firefox finds a slew of new bugs with Claude's help

Approximately 10-15 percent of Firefox browser crashes result from bit flips caused by faulty hardware rather than software errors, affecting hundreds of thousands of users monthly.
fromTechRepublic
1 month ago

Fake Claude Code Spreads Malware to Windows, macOS Users - TechRepublic

Attackers are distributing almost identical cloned sites of popular developer tools like Claude Code with fake install instructions via malicious search engine ads - tricking victims into installing infostealer malware instead. The cloned sites closely replicate the official documentation pages for popular tools, but the installation instructions are altered to fetch malware instead of the intended software.
Information security
fromTheregister
2 months ago

How CP/M-86's delay handed Microsoft the keys to the kingdom

It's the story of why the 16-bit version of Digital Research CP/M was late, but the delayed arrival of this now-obscure OS is what catalyzed the development of a different, but source-level compatible, OS. That OS started Microsoft on its way to its current $3.5 trillion capitalization, and is also what led to the development of OS/2, Windows, and indirectly Linux.
History
Tech industry
fromTheregister
2 months ago

Windows 2000 rusts in peace by the sea

A Windows 2000-based Comboios de Portugal ticket terminal at Granja station halted after a memory-related Windows service error, likely disabling card payments.
Information security
fromSecurityWeek
1 month ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
fromVulture
2 months ago

Obex Will Make You Nostalgic for Old Technology

What telling people to touch grass ignores, in part, is that grass is not all that good to touch. It's itchy and sticky - there could be bugs in there. There's a far more profoundjoyin touching machines, as is shown again and again in Albert Birney's Obex, which functions as both a shrine to and warning about our reliance on technology.
Film
Information security
fromThe Hacker News
1 month ago

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft discovered a ClickFix campaign using Windows Terminal to deploy Lumma Stealer malware through social engineering and hex-encoded commands.
fromTheregister
1 month ago

Reviving a CIDCO MailStation - the last Z80 computer

Pleban's talk, "Hacking the last Z80 computer ever made," was more than just a dive into retro computing. It also explored some of the many strange decisions involved in launching a new range of hardware based on the eight-bit Zilog Z80 chip in 1999 - when the 16-bit computer era was largely over, and just a couple of years before 32-bit x86 chips would be replaced by x86-64.
Gadgets
Privacy technologies
fromThe Hacker News
2 months ago

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

Information-stealing attacks are expanding to macOS, leveraging cross-platform languages, social-engineering lures, and trusted platforms to distribute Python-based stealers at scale.
Video games
fromKotaku
1 month ago

Capcom Slaps Crappy DRM On Steam Ports Of Dino Crisis 1 & 2 - Kotaku

Capcom released Dino Crisis 1 and 2 on Steam with Enigma Protector DRM, potentially harming performance despite DRM-free versions on GOG.
Gadgets
fromTheregister
1 month ago

OpenClaw is the most fun I've had with a PC in 50 years

An early encounter with a DECwriter produced instant awe and intense play, igniting a lasting fascination with interactive, text-based computing.
Software development
fromZDNET
1 month ago

One of my old favorite Linux distros is back - and it's still a great Windows escape

PCLinuxOS, a Windows-user-friendly Linux distribution, is experiencing renewed popularity and has re-entered the top rankings on Distrowatch at position 34.
fromKotaku
2 months ago

Every Old Game Deserves A 60FPS Update

Returning to old games isn't always easy. Depending on how old the game is, you might run into various problems, including unusual controls or compatibility issues. Another common point of friction you might encounter is an older game running poorly. This can make it a slog to replay some of the modern classics, even if they're just a decade or so old. So I'm happy to see Ubisoft going back and updating performance in games like Far Cry Primal and Assassin's Creed Unity.
Video games
Video games
fromKotaku
2 months ago

What Games Are Forever Stuck In Your Backlog?

Players often keep one game perpetually unfinished due to boredom, unengaging worlds, outdated mechanics, or design barriers that block continued play.
fromwww.theguardian.com
2 months ago

Commodore 64 Ultimate review it's like 1982 all over again!

The emotional hit was something I didn't expect, although perhaps I should have. The Commodore 64 Ultimate, a new version of the legendary 8-bit computer, comes in a box designed to resemble the original packaging a photo of the machine itself on a background of deep blue fading into a series of white stripes. Then when you open it, you find an uncannily accurate replica of what fans lovingly referred to as the breadbox the chunky, sloped Commodore 64, in hues of brown and beige,
Gadgets
Information security
fromSecurityWeek
1 month ago

Claude Code Flaws Exposed Developer Devices to Silent Hacking

Check Point researchers discovered critical vulnerabilities in Claude Code that could enable attackers to gain unauthorized control of developer computers through malicious configuration files.
fromThe Hacker News
1 month ago

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

The average e-crime breakout time - the period between initial access and lateral movement onto another system - dropped to 29 minutes, a 65% increase in speed from 2024. One such intrusion undertaken by Luna Moth targeting a law firm moved from initial access to data exfiltration in four minutes.
Information security
fromWIRED
1 month ago

This Gadget Lets You Play Game Boy Games on a Laptop-If You Have the Cartridge

The Game Boy family of handheld consoles was groundbreaking, making gaming more accessible to millions worldwide. Nintendo's portables beat off technologically superior competition from the likes of Sega's Game Gear and Atari's Lynx. They became home to foundational moments for the medium, from what is still arguably the definitive version of Tetris to the birth of Pokémon. Yet with the iconic gray monolith launching in 1989, it's now pushing 40-and playing those important classics gets tougher every year.
Gadgets
fromZDNET
1 month ago

8 Linux distros I always recommend first to developers - and why

For the longest time, Linux was considered to be geared specifically for developers and computer scientists. Modern distributions are far more general purpose now -- but that doesn't mean there aren't certain distros that are also ideal platforms for developers. What makes a distribution right for developers? Although I consider app compatibility, stability, and flexibility to be essential attributes for most any Linux distribution, developers also need the right tools
Software development
Gadgets
fromTheregister
2 months ago

Raspberry Pi 500+ made to look like a BBC Micro PC

An engineer converted a Raspberry Pi 500+ into a BBC Micro-style beige keyboard computer using paint and Acorn-style replacement keycaps.
fromEngadget
1 month ago

Hacker used Anthropic's Claude chatbot to attack multiple government agencies in Mexico

In total, it produced thousands of detailed reports that included ready-to-execute plans, telling the human operator exactly which internal targets to attack next and what credentials to use. This started in December and continued for around a month, resulting in the theft of 150GB of official government data, including taxpayer records, employee credentials and more.
Information security
Software development
fromTheregister
2 months ago

Linux mid-life crisis: A Tux-led transformation chance

Sudo's sole maintainer has carried the project for 30 years and urgently needs help; single-maintainer reliance threatens Linux utility security and continuity.
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
#sshstalker
Information security
fromSecurityWeek
1 month ago

Hacker Conversations: Professional Hacker Douglas Day

A hacker uses systems in unintended ways; computer hacking can be a professional, bug-bounty–funded occupation and applies beyond computers.
Information security
fromTheregister
1 month ago

Infosec researchers mull curious case of Telnet ancient flaw

Tier-1 transit operators likely applied port 23 filtering after advance warning of a critical GNU InetUtils telnetd flaw (CVE-2026-24061), collapsing Telnet traffic.
Information security
fromThe Hacker News
2 months ago

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Small, quiet shifts across systems—abused trusted tools and unnoticed vulnerabilities—are causing privilege escalation, cryptomining infections, and broader erosion of access, data, and trust.
fromTheregister
2 months ago

Microsoft finally ends extended updates for ancient Windows

January 13 marked another milestone for legacy systems, as support for the software - codenamed Longhorn Server - expired for customers that bought Microsoft Premium Assurance (PA). Extended support ended for Windows Server 2008 on January 14, 2020. It was possible to keep the lights on until January 10, 2023, via Extended Security Updates. A fourth year came courtesy of Azure, which took the code to January 9, 2024, but that was it for anyone without PA.
Information security
Information security
fromTechzine Global
2 months ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
Information security
fromThe Hacker News
2 months ago

ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories

Attackers increasingly exploit trusted systems and workflows, using scale, patience, and minimal friction to gain control without novel techniques.
Information security
fromTheregister
2 months ago

Developer writes script to throw AI out of Windows

Developers released a PowerShell script, Remove Windows AI, to strip AI features from Windows 11 to enhance user privacy, security, and experience.
fromDataBreaches.Net
1 month ago

New "Kurd Hackers Forum" Focuses on Middle Eastern Data Breaches and Leaks - DataBreaches.Net

Reza abasi notes that there is a new forum called the "Kurd Hacker Forum" that focuses on databreaches in Iran, Syria, and Turkey. The domain was registered January 28, 2026. The forum, which is on the clear net, looks like it has the same format as the classic BreachForums, with the same types of sections and subsections. The threads in the forum are either in English or Kurdish languages.
Information security
Information security
fromTheregister
1 month ago

Critical Microsoft bug from 2024 under exploitation

A 9.8-rated SQL injection in Microsoft Configuration Manager, patched Oct 2024, is actively exploited and requires immediate patching.
Information security
fromwww.theguardian.com
2 months ago

I'm a tech-savvy zillennial who knows how to safeguard against hacking. Scammers still managed to get me | Caitlin Cassidy

Tech-savvy individuals can be deceived by realistic phishing while distracted, enabling scammers to steal funds through fake sites and cardless cash authorisations.
[ Load more ]