You can log into 28 vintage computer systems in your browser for free, thanks to the Interim Computer Museum — Experience legendary OSes, architectures, programming languages, and games | Tom’s Hardware

The Interim Computer Museum (ICM) and SDF.org have made 28 vintage computer systems accessible online for free. There’s a plethora of old but gold – some legendary – systems available, so your visit should be like entering a living museum of computing.

The DJI Romo robovac had security so poor, this man remotely accessed thousands of them | The Verge

He could remotely control them, and look and listen through their live camera feeds, he tells me, saying he tested that out with a friend. He could watch them map out each room of a house, generating a complete 2D floor plan. He could use any robot’s IP address to find its rough location.

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG).

Researcher finds Chinese KVM has undocumented microphone, communicates with China-based servers — Sipeed’s nanoKVM switch has other severe security flaws and allows audio recording, claims researcher | Tom’s Hardware

The researcher says the device’s software stack exposes weak points from the moment it boots. Early units arrived with a pre-set password and open SSH access, a problem the researcher reported to Sipeed and which the company later corrected. The web interface still lacks basic protections, including CSRF defence and any mechanism to invalidate active sessions.

Amazon faces FAA probe after delivery drone incident in Texas

The probe comes as Amazon vies to expand drone deliveries to more pockets of the U.S., more than a decade after it first conceived the aerial distribution program, and faces stiffer competition from Walmart, which has also begun drone deliveries.

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data | WIRED

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.

High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech | Tom’s Hardware

The processing works like this: the raw audio data is run through digital signal processing using a Wiener Filter, where you can start to hear some information. This is then further cleared up through a neural model, giving the researchers clear audio.

ChatGPT hallucinated about music app Soundslice so often, the founder made the lie come true | TechCrunch

Earlier this month, Adrian Holovaty, founder of music-teaching platform Soundslice, solved a mystery that had been plaguing him for weeks. Weird images of what were clearly ChatGPT sessions kept being uploaded to the site.

Nvidia beats Apple and Microsoft to become the world’s first $4 trillion public company | CNN Business

Nvidia beat Apple and Microsoft to the $4 trillion mark. Apple entered this year as the world’s most valuable company at just about $3.9 trillion before tumbling in recent months amid President Donald Trump’s tariff turmoil. Nvidia and Microsoft traded places as the world’s most valuable company in recent months, before Nvidia surged ahead to reach the $4 trillion mark first.

Eavesdropping on MEMS Microphones With a Radio – Hackster.io

No modifications to the hardware or software are required — any phone, computer, or other device with this type of microphone is vulnerable right out of the box. And you may not even need to explicitly enable the microphone because certain commonly used apps, such as Spotify, YouTube, Amazon Music, and Google Drive, already turn it on under certain conditions.