Feed aggregator
Qualcomm says license fight was because Arm wants to make its own server chips
Article URL: https://www.theregister.com/2025/04/24/qualcomm_arm_licensing_lawsuit_amendment/
Comments URL: https://news.ycombinator.com/item?id=43782383
Points: 1
# Comments: 0
How to Unlock Hearing Aid Mode for AirPods Pro in Canada
Article URL: https://www.iphoneincanada.ca/2025/04/22/how-to-unlock-hearing-aid-mode-for-airpods-pro-in-canada/
Comments URL: https://news.ycombinator.com/item?id=43782352
Points: 1
# Comments: 0
Ask HN: Share your AI prompt that stumps every model
I had an idea for creating a crowdsourced database of AI prompts that no AI model could yet crack.
I've seen a bunch of those prompts scattered across HN, so thought to open a thread here so we can maybe have a centralied location for this.
Share your prompt that stumps every AI model here.
Comments URL: https://news.ycombinator.com/item?id=43782299
Points: 1
# Comments: 1
4.7 million customers’ data accidentally leaked to Google by Blue Shield of California
Blue Shield of California leaked the personal data of 4.7 million people to Google after a Google Analytics misconfiguration. The tech giant may have used this data for targeted advertising, according to Blue Shield, which is one of the largest health insurers in the US.
In a data breach notice on its website, Blue Shield says it had begun notifying “certain members of a potential data breach that may have included elements of their protected health information.”
Blue Shield a nonprofit health insurer serving nearly 6 million members, used Google Analytics to monitor how customers interacted with its websites to improve services. However, a configuration error in Google Analytics allowed sensitive member data to spill to Google Ads, potentially exposing customer data for almost three years. This likely included protected health information.
Blue Shield stated, “Google may have used this data to show targeted ad campaigns to individual members.”
The transmission of data took place between April 2021 and January 2024. The leaked information includes various details such as the type of health insurance plan, postal code and city, gender, family size, account IDs, names of insured persons, and search queries related to finding a doctor, which could reveal members’ health concerns or needs.
Blue Shield said there was no leak of other types of personal information, such as Social Security numbers, driver’s license numbers, or banking or credit card information.
After discovering the leak, Blue Shield said it reviewed all its websites to ensure no other tracking software was sharing protected health information with third parties.
Usually in a data breach we can point at cybercriminals that went out of their way to obtain the data. In this case, a simple misconfiguration shared data with an entity—that already knows so much about us—that then used the information for targeted advertising.
Maybe this case can serve as a cautionary tale about using analytics tools in areas where misconfigurations can lead to severe privacy violations, especially when sensitive data is involved.
Blue Shield is notifying all customers who may have accessed their member information on the potentially impacted Blue Shield websites during the relevant time frame.
Protecting yourself after a data breachThere are some actions you can take if you are, or suspect you may have been, the victim of a data breach.
- Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened and follow any specific advice they offer.
- Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
- Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
- Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims and verify the identity of anyone who contacts you using a different communication channel.
- Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
- Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
- Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.
Malwarebytes has a free tool for you to check how much of your personal data has been exposed online. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.
Parkinson's disease researchers develop way to protect neural grafts
IBM says 15 contracts impacted by DOGE cost cuts, shares drop
Article URL: https://finance.yahoo.com/news/ibm-forecasts-second-quarter-revenue-201238690.html
Comments URL: https://news.ycombinator.com/item?id=43782280
Points: 2
# Comments: 0
Hubble celebrates 35th year in orbit
Article URL: https://esahubble.org/news/heic2505/
Comments URL: https://news.ycombinator.com/item?id=43782269
Points: 2
# Comments: 0
Scale 1.3: Run CUDA Natively on MI-Instinct GPUs
Article URL: https://docs.scale-lang.com/stable/manual/CHANGELOG/#whats-new
Comments URL: https://news.ycombinator.com/item?id=43782248
Points: 3
# Comments: 1
PyTorch 2.7 Release with Blackwell support
Article URL: https://pytorch.org/blog/pytorch-2-7/
Comments URL: https://news.ycombinator.com/item?id=43782238
Points: 1
# Comments: 0
Best Internet Providers in Jacksonville, Oregon
Proposed Swiss encryption laws may have an impact on VPNs
I Replaced My Devs with Agents – Part 2: What Happened to the Team
Article URL: https://easylab.ai
Comments URL: https://news.ycombinator.com/item?id=43782194
Points: 1
# Comments: 1
Blue Apron Review: 3 CNET Editors Test the Popular Meal Kit Service
Push Security Raises $30 Million in Series B Funding
Push Security has raised $30 million in Series B funding to scale its browser-based identity security platform.
The post Push Security Raises $30 Million in Series B Funding appeared first on SecurityWeek.
1 in 5 Cross-Chain Crypto Investigations Involve More Than 10 Blockchains
Does RL Incentivize Reasoning Capacity in LLMs Beyond the Base Model?
Article URL: https://arxiv.org/abs/2504.13837
Comments URL: https://news.ycombinator.com/item?id=43782163
Points: 2
# Comments: 0
America's reputation drops across the world
Article URL: https://www.ipsos.com/en/americas-reputation-drops-across-the-world
Comments URL: https://news.ycombinator.com/item?id=43782159
Points: 18
# Comments: 2
Ask HN: Who Got Hired? (April 2025)
Who's Getting Hired in April 2025? Let's Talk!
Lately, there's been a lot of buzz that many job postings out there are just... ghost listings - positions that aren't really open.
So, I'm curious: Did you or someone you know actually land a job this month? Or have you noticed the hiring landscape shifting?
Drop your wins, observations, or frustrations in the comments. Let's crowdsource the real hiring trends for April 2025.
Comments URL: https://news.ycombinator.com/item?id=43782146
Points: 2
# Comments: 1
Turn PDFs into Games
Article URL: https://pdftogame.com
Comments URL: https://news.ycombinator.com/item?id=43782144
Points: 1
# Comments: 0
Subtitling Your Life: Eyeglasses with real-time speech transcription
Article URL: https://www.newyorker.com/magazine/2025/04/28/subtitling-your-life
Comments URL: https://news.ycombinator.com/item?id=43782119
Points: 2
# Comments: 1