Hollywood Theater

Thomas Hawk posted a photo:

Hollywood Theater

yodabashi camera sign - tokyo

xthylacine has added a photo to the pool:

yodabashi camera sign - tokyo

Shinjuku, Tokyo, Japan

Autumn Shadows

lioil has added a photo to the pool:

Autumn Shadows

Showa Memorial Park, Tachikawa, Tokyo, Japan

14426 20251126_084453 fruits against the sky in Lake Macquarie

iain.davidson100 has added a photo to the pool:

14426 20251126_084453 fruits against the sky in Lake Macquarie

The 180m stack at Gidji gold processing plant, owned by Kalgoorlie Consolidated Gold Mines.

Peter.Stokes has added a photo to the pool:

The 180m stack at Gidji gold processing plant, owned by Kalgoorlie Consolidated Gold Mines.

DSC05383

Kalgoorlie Super Pit from the public viewing area.

Peter.Stokes has added a photo to the pool:

Kalgoorlie Super Pit from the public viewing area.

DSC05083

Kalgoorlie Super Pit from the public viewing area.

Peter.Stokes has added a photo to the pool:

Kalgoorlie Super Pit from the public viewing area.

DSC05064-Pano-Edit

That is one BIG dump truck bucket!!!

Peter.Stokes has added a photo to the pool:

That is one BIG dump truck bucket!!!

DSC05089

Slashdot

News for nerds, stuff that matters

'Crime Rings Enlist Hackers To Hijack Trucks'

It's "a complex mix of internet access and physical execution," says the chief informance security officer at Cequence Security.

Long-time Slashdot reader schwit1 summarizes this article from The Wall Street Journal:


By breaking into carriers' online systems, cyber-powered criminals are making off with truckloads of electronics, beverages and other goods In the most recent tactics identified by cybersecurity firm Proofpoint, hackers posed as freight middlemen, posting fake loads to the boards. They slipped links with malicious software into email exchanges with bidders such as trucking companies. By clicking on the links, trucking companies unwittingly downloaded remote-access software that lets the hackers take control of their online systems. Once inside, the hackers used the truckers' accounts to bid on real shipments, such as electronics and energy drinks, said Selena Larson, a threat researcher at Proofpoint. "They know the business," she said. "It's a very convincing full-scale identity takeover."


"The goods are likely sold to retailers or to consumers in online marketplaces," the article explains. (Though according to Proofpoint "In some cases, products are shipped overseas and sold in local markets, where proceeds are used to fund paramilitaries and global terrorists.")

"The average value of cargo thefts is increasing as organized crime groups become more discerning, preferring high-value targets such as enterprise servers and cryptocurrency mining hardware, according to risk-assessment firm Verisk CargoNet."

Read more of this story at Slashdot.

Fokke & Sukke

F & S