Skip to main content

Microsoft spotlights Apple bug patched in March as SharePoint exploits continue

3 months 1 week ago
Look over there!

Amidst its own failure to fix a couple of bugs now under mass exploitation and being abused for espionage, data theft, and ransomware infections, Microsoft said Monday that it spotted a macOS vulnerability some months ago that could allow attackers to steal private data. Redmond reported the bug to Cupertino, which issued a fix back in March.…

Jessica Lyons

Claude Code Users Hit With Weekly Rate Limits

3 months 1 week ago
Anthropic will implement weekly rate limits for Claude subscribers starting August 28 to address users running its Claude Code AI programming tool continuously around the clock and to prevent account sharing violations. The new restrictions will affect Pro subscribers paying $20 monthly and Max plan subscribers paying $100 and $200 monthly, though Anthropic estimates fewer than 5% of current users will be impacted based on existing usage patterns. Pro users will receive 40 to 80 hours of Sonnet 4 access through Claude Code weekly, while $100 Max subscribers get 140 to 280 hours of Sonnet 4 plus 15 to 35 hours of Opus 4. The $200 Max plan provides 240 to 480 hours of Sonnet 4 and 24 to 40 hours of Opus 4. Claude Code has experienced at least seven outages in the past month due to unprecedented demand.

Read more of this story at Slashdot.

msmash

Bankrupt Futurehome Suddenly Makes Its Smart Home Hub a Subscription Service

3 months 1 week ago
After filing for bankruptcy, Norwegian smart home company Futurehome abruptly transitioned its Smarthub II and other devices to a subscription-only model, disabling essential features unless users pay an annual fee. Needless to say, customers aren't too happy with the move as they bought the hardware expecting lifetime functionality and now find their smart homes significantly less smart. Ars Technica reports: Launched in 2016, Futurehome's Smarthub is marketed as a central hub for controlling Internet-connected devices in smart homes. For years, the Norwegian company sold its products, which also include smart thermostats, smart lighting, and smart fire and carbon monoxide alarms, for a one-time fee that included access to its companion app and cloud platform for control and automation. As of June 26, though, those core features require a 1,188 NOK (about $116.56) annual subscription fee, turning the smart home devices into dumb ones if users don't pay up. "You lose access to controlling devices, configuring; automations, modes, shortcuts, and energy services," a company FAQ page says. You also can't get support from Futurehome without a subscription. "Most" paid features are inaccessible without a subscription, too, the FAQ from Futurehome, which claims to be in 38,000 households, says. After June 26, customers had four weeks to continue using their devices as normal without a subscription. That grace period recently ended, and users now need a subscription for their smart devices to work properly. Some users are understandably disheartened about suddenly having to pay a monthly fee to use devices they already purchased. More advanced users have also expressed frustration with Futurehome potentially killing its devices' ability to work by connecting to a local device instead of the cloud. In its FAQ, Futurehome says it "cannot guarantee that there will not be changes in the future" around local API access. Futurehome claims that introducing the subscription fee was a necessary move due to its recent bankruptcy. Its FAQ page reads: "Futurehome AS was declared bankrupt on 20 May 2025. The platform and related services were purchased from the bankruptcy estate -- 50 percent by former Futurehome owners and 50 percent by Sikom Connect -- and are now operated by FHSD Connect AS. To secure stable operation, fund product development, and provide high-quality support, we are introducing a new subscription model." The company says the subscription fee would allow it to provide customers "better functionality, more security, and higher value in the solution you have already invested in."

Read more of this story at Slashdot.

BeauHD

A Second Tea Breach Reveals Users' DMs About Abortions and Cheating

3 months 1 week ago
A second, far more recent data breach at women's dating safety app Tea has exposed over a million sensitive user messages -- including discussions about abortions, infidelity, and shared contact info. This vulnerability not only compromised private conversations but also made it easy to unmask anonymous users. 404 Media reports: Despite Tea's initial statement that "the incident involved a legacy data storage system containing information from over two years ago," the second issue impacting a separate database is much more recent, affecting messages up until last week, according to the researcher's findings that 404 Media verified. The researcher said they also found the ability to send a push notification to all of Tea's users. It's hard to overstate how sensitive this data is and how it could put Tea's users at risk if it fell into the wrong hands. When signing up, Tea encourages users to choose an anonymous screenname, but it was trivial for 404 Media to find the real world identities of some users given the nature of their messages, which Tea has led them to believe were private. Users could be easily found via their social media handles, phone numbers, and real names that they shared in these chats. These conversations also frequently make damning accusations against people who are also named in the private messages and in some cases are easy to identify. It is unclear who else may have discovered the security issue and downloaded any data from the more recent database. Members of 4chan found the first exposed database last week and made tens of thousands of images of Tea users available for download. Tea told 404 Media it has contacted law enforcement. [...] This new data exposure is due to any Tea user being able to use their own API key to access a more recent database of user data, Rahjerdi said. The researcher says that this issue existed until late last week. That exposure included a mass of Tea users' private messages. In some cases, the women exchange phone numbers so they can continue the conversation off platform. The first breach was due to an exposed instance of app development platform Firebase, and impacted tens of thousands of selfie and driver license images. At the time, Tea said in a statement "there is no evidence to suggest that current or additional user data was affected." The second database includes a data field called "sent_at," with many of those messages being marked as recent as last week.

Read more of this story at Slashdot.

BeauHD