Salta al contenuto principale



Alberto Trentini, dal governo un anno di silenzio intollerabile
possibile.com/alberto-trentini…
L’immobilismo del governo Meloni non può essere tollerato, facciamo pressione, chiediamo che si attivi e adoperi ogni strumento diplomatico necessario alla sua liberazione.
L'articolo Alberto Trentini, dal governo un anno di silenzio intollerabile proviene da


Druetti-Marro (Possibile): Cannabis, il Senato blocca l’esame del DDL di iniziativa popolare in violazione del proprio regolamento. Conferenza stampa il 20 novembre, ore 16.00 – Sala Nassirya
possibile.com/druetti-marro-ca…
Il 20 novembre alle ore 16.00, presso la Sala Nassirya del Senato, si terrà la conferenza stampa “Io Coltivo: che fine ha fatto la proposta di legge


Piantedosi, faccia votare i fuorisede
possibile.com/piantedosi-facci…
Chiediamo che il Governo abbandoni rinvii e ambiguità e si assuma la responsabilità di rendere l’Italia una democrazia più accessibile e inclusiva. Invitare al voto è importante; permettere davvero a tutte e tutti di votare lo è ancora di più.
L'articolo Piantedosi, faccia votare i fuorisede proviene da Possibile.


Ahmad Salem libero: la mobilitazione per la Palestina non è reato
possibile.com/ahmad-salem-libe…
Salem è un ragazzo palestinese, da sei mesi detenuto in regime di alta sicurezza in un carcere della nostra regione per aver denunciato il genocidio che il suo popolo stava e sta subendo per mano di Israele.
L'articolo Ahmad Salem libero: la mobilitazione per la Palestina non è reato proviene da


In fondo, Nordio è stato sincero!


@Giornalismo e disordine informativo
articolo21.org/2025/11/in-fond…
Un grazie sincero al ministro Nordio che, mai come questa volta, ha parlato in modo sobrio, puntuale, senza ambiguità alcuna. Cosa c ‘é di male, ci ha fatto sapere a riprendere e attuare le cose buone del progetto di Licio Gelli, promotore di quella loggia che aveva tra i suoi



Basta tagli: al presidio AVS contro i tagli agli enti locali
possibile.com/basta-tagli-pres…
Oggi in piazza a Roma insieme a tanti amministratori e amministratrici da tutta Italia per partecipare al presidio organizzato da Alleanza Verdi e Sinistra che denuncia i tagli agli enti locali fatti dal governo Meloni.
L'articolo Basta tagli: al presidio AVS contro i tagli agli enti locali proviene da Possibile.




Allarmi cyber, 80 attacchi al giorno contro l’Italia. Serve più difesa digitale

@Notizie dall'Italia e dal mondo

Non è più il tempo di soli sistemi anti missile o bunker sotto terra. La nuova guerra si combatte a colpi di attacchi ibridi al fine di destabilizzare le infrastrutture sociali di un Paese, per questa ragione va approntata una difesa digitale a 360 gradi non più



Attacco al Gruppo Ferrovie dello Stato e Almaviva SpA: cosa sappiamo sul data leak


@Informatica (Italy e non Italy 😁)
Un threat actor negli scorsi giorni ha rivendicato e diffuso online 2,3 TB di dati interni esfiltrati da infrastrutture che contengono documenti di Almaviva SpA e Gruppo FS. La nota di Almaviva: "immediatamente attivate le procedure di

reshared this




Vi viene in mente qualche SW Open Source per gestire la prenotazione di scrivanie in un'azienda dove si fa smart working e le scrivanie vengono usate a rotazione (nessuno ha la sua e quindi ci si mette dove capita)?



Danimarca: crollano i socialdemocratici, a Copenaghen vince la sinistra


@Notizie dall'Italia e dal mondo
A Copenaghen ed in altre città della Danimarca crollano i socialdemocratici, puniti per la loro svolta a destra, e avanzano diversi partiti di sinistra più o meno radicale
L'articolo Danimarca: crollano i socialdemocratici, a Copenaghen vince la sinistra proviene da




Truffe online sfruttano la condivisione schermo di WhatsApp: come difendersi


@Informatica (Italy e non Italy 😁)
Una nuova tattica ingannevole sta inducendo le persone a condividere lo schermo del proprio telefono durante una videochiamata su WhatsApp per rubare dati, identità e il loro denaro. Un meccanismo di truffa particolarmente efficace da cui è





Trump tra insulti e aggressività, gli attacchi a giornalisti e rivali

[quote]NEW YORK – Offese rivolte alle donne, alle persone con disabilità e anche ai suoi avversari. Gli insulti e le umiliazioni sembrano essere parte integrante della comunicazione del presidente degli…
L'articolo Trump tra insulti e aggressività, gli attacchi a giornalisti e rivali su



Manovra, si tratta. La Lega rilancia sulle pensioni. Ipotesi condono “largo” fino al 2025

Alle 16 il termine per l'indicazione degli emendamenti segnalati, cioè quelli per i quali i gruppi chiedono un esame in via prioritaria
L'articolo Manovra, si tratta. La Lega rilancia sulle pensioni. Ipotesi condono “largo” fino al 2025 su Lumsanews.



Space&Underwater, il 3 dicembre la Conferenza a Roma. Tra gli speaker Samantha Cristoforetti


@Informatica (Italy e non Italy 😁)
Nel contesto geopolitico come affrontare e vincere le sfide per la Cybersecurity nello Spazio e nella Dimensione Subacquea? Sono due domìni sempre più strategici e interconnessi da cui dipendono sia la continuità delle transazioni



Difesa comune, perché l’innovazione non è più un’opzione

@Notizie dall'Italia e dal mondo

L’incontro promosso da Sopra Steria Italia e dall’Ambasciata di Francia a Palazzo Farnese ha mostrato come la difesa europea stia vivendo una stagione in cui innovazione, governance dei dati e capacità industriali procedono insieme. La discussione tra istituzioni italiane e francesi, vertici militari e



Medici per i diritti umani denuncia uccisioni prigionieri di Gaza nelle carceri israeliane


@Notizie dall'Italia e dal mondo
Il rapporto, "Deaths of Palestinians in Israeli custody: enforced disappearances, systematic killings and cover-ups", descrive una macchina repressiva che con l’inizio dell'offensiva contro Gaza ha acquisito una violenza



Klimt da record, il ritratto di Elizabeth Lederer venduto per 236 milioni di dollari

[quote]NEW YORK – La produzione artistica di Gustav Klimt segna un nuovo primato. Il ritratto di Elizabeth Lederer, opera del pittore austriaco, è stato battuto da Sotheby’s per 236 milioni…
L'articolo Klimt da record, il ritratto di Elizabeth Lederer venduto per 236 milioni



Pioggia di droni russi Ucraina. Zelensky vola in Turchia, Mosca allontana un piano di pace

[quote]KIEV – Sale ancora il bilancio dei morti nel massiccio attacco russo di stanotte, 19 novembre, in Ucraina. Nella città di Ternopil il conteggio delle vittime è arrivato a sedici,…
L'articolo Pioggia di droni russi Ucraina. Zelensky vola in Turchia, Mosca



IT threat evolution in Q3 2025. Mobile statistics
IT threat evolution in Q3 2025. Non-mobile statistics

The quarter at a glance


In the third quarter of 2025, we updated the methodology for calculating statistical indicators based on the Kaspersky Security Network. These changes affected all sections of the report except for the statistics on installation packages, which remained unchanged.

To illustrate the differences between the reporting periods, we have also recalculated data for the previous quarters. Consequently, these figures may significantly differ from the previously published ones. However, subsequent reports will employ this new methodology, enabling precise comparisons with the data presented in this post.

The Kaspersky Security Network (KSN) is a global network for analyzing anonymized threat information, voluntarily shared by users of Kaspersky solutions. The statistics in this report are based on KSN data unless explicitly stated otherwise.

The quarter in numbers


According to Kaspersky Security Network, in Q3 2025:

  • 47 million attacks utilizing malware, adware, or unwanted mobile software were prevented.
  • Trojans were the most widespread threat among mobile malware, encountered by 15.78% of all attacked users of Kaspersky solutions.
  • More than 197,000 malicious installation packages were discovered, including:
    • 52,723 associated with mobile banking Trojans.
    • 1564 packages identified as mobile ransomware Trojans.



Quarterly highlights


The number of malware, adware, or unwanted software attacks on mobile devices, calculated according to the updated rules, totaled 3.47 million in the third quarter. This is slightly less than the 3.51 million attacks recorded in the previous reporting period.

Attacks on users of Kaspersky mobile solutions, Q2 2024 — Q3 2025 (download)

At the start of the quarter, a user complained to us about ads appearing in every browser on their smartphone. We conducted an investigation, discovering a new version of the BADBOX backdoor, preloaded on the device. This backdoor is a multi-level loader embedded in a malicious native library, librescache.so, which was loaded by the system framework. As a result, a copy of the Trojan infiltrated every process running on the device.

Another interesting finding was Trojan-Downloader.AndroidOS.Agent.no, which was embedded in mods for messaging and other apps. It downloaded Trojan-Clicker.AndroidOS.Agent.bl onto the device. The clicker received a URL from its server where an ad was being displayed, opened it in an invisible WebView window, and used machine learning algorithms to find and click the close button. In this way, fraudsters exploited the user’s device to artificially inflate ad views.

Mobile threat statistics


In the third quarter, Kaspersky security solutions detected 197,738 samples of malicious and unwanted software for Android, which is 55,000 more than in the previous reporting period.

Detected malicious and potentially unwanted installation packages, Q3 2024 — Q3 2025 (download)

The detected installation packages were distributed by type as follows:

Detected mobile apps by type, Q2* — Q3 2025 (download)

* Changes in the statistical calculation methodology do not affect this metric. However, data for the previous quarter may differ slightly from previously published figures due to a retrospective review of certain verdicts.

The share of banking Trojans decreased somewhat, but this was due less to a reduction in their numbers and more to an increase in other malicious and unwanted packages. Nevertheless, banking Trojans, still dominated by Mamont packages, continue to hold the top spot. The rise in Trojan droppers is also linked to them: these droppers are primarily designed to deliver banking Trojans.

Share* of users attacked by the given type of malicious or potentially unwanted app out of all targeted users of Kaspersky mobile products, Q2 — Q3 2025 (download)

* The total may exceed 100% if the same users experienced multiple attack types.

Adware leads the pack in terms of the number of users attacked, with a significant margin. The most widespread types of adware are HiddenAd (56.3%) and MobiDash (27.4%). RiskTool-type unwanted apps occupy the second spot. Their growth is primarily due to the proliferation of the Revpn module, which monetizes user internet access by turning their device into a VPN exit point. The most popular Trojans predictably remain Triada (55.8%) and Fakemoney (24.6%). The percentage of users who encountered these did not undergo significant changes.

TOP 20 most frequently detected types of mobile malware


Note that the malware rankings below exclude riskware and potentially unwanted software, such as RiskTool or adware.

Verdict%* Q2 2025%* Q3 2025Difference in p.p.Change in ranking
Trojan.AndroidOS.Triada.ii0.0013.78+13.78
Trojan.AndroidOS.Triada.fe12.5410.32–2.22–1
Trojan.AndroidOS.Triada.gn9.498.56–0.93–1
Trojan.AndroidOS.Fakemoney.v8.886.30–2.59–1
Backdoor.AndroidOS.Triada.z3.754.53+0.77+1
DangerousObject.Multi.Generic.4.394.52+0.13–1
Trojan-Banker.AndroidOS.Coper.c3.202.86–0.35+1
Trojan.AndroidOS.Triada.if0.002.82+2.82
Trojan-Dropper.Linux.Agent.gen3.072.64–0.43+1
Trojan-Dropper.AndroidOS.Hqwar.cq0.372.52+2.15+60
Trojan.AndroidOS.Triada.hf2.262.41+0.14+2
Trojan.AndroidOS.Triada.ig0.002.19+2.19
Backdoor.AndroidOS.Triada.ab0.002.00+2.00
Trojan-Banker.AndroidOS.Mamont.da5.221.82–3.40–10
Trojan-Banker.AndroidOS.Mamont.hi0.001.80+1.80
Trojan.AndroidOS.Triada.ga3.011.71–1.29–5
Trojan.AndroidOS.Boogr.gsh1.601.68+0.080
Trojan-Downloader.AndroidOS.Agent.nq0.001.63+1.63
Trojan.AndroidOS.Triada.hy3.291.62–1.67–12
Trojan-Clicker.AndroidOS.Agent.bh1.321.56+0.240

* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.

The top positions in the list of the most widespread malware are once again occupied by modified messaging apps Triada.ii, Triada.fe, Triada.gn, and others. The pre-installed backdoor Triada.z ranked fifth, immediately following Fakemoney – fake apps that collect users’ personal data under the guise of providing payments or financial services. The dropper that landed in ninth place, Agent.gen, is an obfuscated ELF file linked to the banking Trojan Coper.c, which sits immediately after DangerousObject.Multi.Generic.

Region-specific malware


In this section, we describe malware that primarily targets users in specific countries.

VerdictCountry*%**
Trojan-Dropper.AndroidOS.Hqwar.bjTurkey97.22
Trojan-Banker.AndroidOS.Coper.cTurkey96.35
Trojan-Dropper.AndroidOS.Agent.smTurkey95.10
Trojan-Banker.AndroidOS.Coper.aTurkey95.06
Trojan-Dropper.AndroidOS.Agent.uqIndia92.20
Trojan-Banker.AndroidOS.Rewardsteal.qhIndia91.56
Trojan-Banker.AndroidOS.Agent.wbIndia85.89
Trojan-Dropper.AndroidOS.Rewardsteal.abIndia84.14
Trojan-Dropper.AndroidOS.Banker.bdIndia82.84
Backdoor.AndroidOS.Teledoor.aIran81.40
Trojan-Dropper.AndroidOS.Hqwar.gyTurkey80.37
Trojan-Dropper.AndroidOS.Banker.acIndia78.55
Trojan-Ransom.AndroidOS.Rkor.iiGermany76.90
Trojan-Dropper.AndroidOS.Banker.bgIndia75.12
Trojan-Banker.AndroidOS.UdangaSteal.bIndonesia75.00
Trojan-Dropper.AndroidOS.Banker.bcIndia74.73
Backdoor.AndroidOS.Teledoor.cIran70.33

* The country where the malware was most active.
** Unique users who encountered this Trojan modification in the indicated country as a percentage of all Kaspersky mobile security solution users attacked by the same modification.

Banking Trojans, primarily Coper, continue to operate actively in Turkey. Indian users also attract threat actors distributing this type of software. Specifically, the banker Rewardsteal is active in the country. Teledoor backdoors, embedded in a fake Telegram client, have been deployed in Iran.
Notable is the surge in Rkor ransomware Trojan attacks in Germany. The activity was significantly lower in previous quarters. It appears the fraudsters have found a new channel for delivering malicious apps to users.

Mobile banking Trojans


In the third quarter of 2025, 52,723 installation packages for mobile banking Trojans were detected, 10,000 more than in the second quarter.

Installation packages for mobile banking Trojans detected by Kaspersky, Q3 2024 — Q3 2025 (download)

The share of the Mamont Trojan among all bankers slightly increased again, reaching 61.85%. However, in terms of the share of attacked users, Coper moved into first place, with the same modification being used in most of its attacks. Variants of Mamont ranked second and lower, as different samples were used in different attacks. Nevertheless, the total number of users attacked by the Mamont family is greater than that of users attacked by Coper.

TOP 10 mobile bankers

Verdict%* Q2 2025%* Q3 2025Difference in p.p.Change in ranking
Trojan-Banker.AndroidOS.Coper.c13.4213.48+0.07+1
Trojan-Banker.AndroidOS.Mamont.da21.868.57–13.28–1
Trojan-Banker.AndroidOS.Mamont.hi0.008.48+8.48
Trojan-Banker.AndroidOS.Mamont.gy0.006.90+6.90
Trojan-Banker.AndroidOS.Mamont.hl0.004.97+4.97
Trojan-Banker.AndroidOS.Agent.ws0.004.02+4.02
Trojan-Banker.AndroidOS.Mamont.gg0.403.41+3.01+35
Trojan-Banker.AndroidOS.Mamont.cb3.033.31+0.29+5
Trojan-Banker.AndroidOS.Creduz.z0.173.30+3.13+58
Trojan-Banker.AndroidOS.Mamont.fz0.073.02+2.95+86

* Unique users who encountered this malware as a percentage of all Kaspersky mobile security solution users who encountered banking threats.

Mobile ransomware Trojans


Due to the increased activity of mobile ransomware Trojans in Germany, which we mentioned in the Region-specific malware section, we have decided to also present statistics on this type of threat. In the third quarter, the number of ransomware Trojan installation packages more than doubled, reaching 1564.

Verdict%* Q2 2025%* Q3 2025Difference in p.p.Change in ranking
Trojan-Ransom.AndroidOS.Rkor.ii7.2324.42+17.19+10
Trojan-Ransom.AndroidOS.Rkor.pac0.2716.72+16.45+68
Trojan-Ransom.AndroidOS.Congur.aa30.8916.46–14.44–1
Trojan-Ransom.AndroidOS.Svpeng.ac30.9816.39–14.59–3
Trojan-Ransom.AndroidOS.Rkor.it0.0010.09+10.09
Trojan-Ransom.AndroidOS.Congur.cw15.719.69–6.03–3
Trojan-Ransom.AndroidOS.Congur.ap15.369.16–6.20–3
Trojan-Ransom.AndroidOS.Small.cj14.918.49–6.42–3
Trojan-Ransom.AndroidOS.Svpeng.snt13.048.10–4.94–2
Trojan-Ransom.AndroidOS.Svpeng.ah13.137.63–5.49–4

* Unique users who encountered the malware as a percentage of all Kaspersky mobile security solution users attacked by ransomware Trojans.


securelist.com/malware-report-…



Margaret Glaspy – The Golden Heart Protector
freezonemagazine.com/articoli/…
Un EP di duetti che è anche una confessione intima C’è qualcosa di profondamente umano nel modo in cui Margaret Glaspy affronta la voce altrui. In The Golden Heart Protector, la cantautrice californiana trapiantata a New York trasforma l’idea del duetto in un gesto di ascolto, più che di esposizione. Non cerca la fusione spettacolare, […]
L'articolo Margaret Glaspy –


ho smesso di avere rispetto per...


... continua qui: noblogo.org/differx/ho-smesso-…

reshared this



La differenza fondamentale di Luciano Floridi

@Politica interna, europea e internazionale

L’intelligenza artificiale non è soltanto una nuova tecnologia: è la forza che sta ridefinendo il nostro presente. Capace di apprendere, adattarsi e decidere in autonomia, l’IA sta già trasformando in profondità la nostra vita quotidiana, l’economia, le imprese, il lavoro, l’istruzione, la politica, la cultura e



intitolerei questo post "i cani del sinai", come il titolo di un celebre libro di Franco Fortini critico verso #israele
seguendo il link https://t.ly/YiBWu si trova un riferimento alle pratiche di #tortura messe in atto dallo stato sionista contro #prigionieri palestinesi. tra queste pratiche ce n'è una, particolarmente atroce e umiliante, che ha una terribile consonanza con quell'espressione fortiniana.
in reply to differx

Dico solo che se io vedo un indirizzo ofuscato per il quale non ho neppure una vaga indicazione che mi anticipi dove porta, senza uno straccio di descrizione che mi spieghi di cosa si tratta, posso solo pensare allo SPAM; non lo seguitò mai.

Se chi pubblica pensa che non valga la pena spendere due minuti per spiegare perché il riferimento proposto può essere interessante, perché mai dovrei dedicare tempo a guardarlo?

Preferisco spenderlo per dire: rispettate chi vi legge.
@differx @poliversity

in reply to Pare 🚲 🌞

@Pare 🚲 🌞 @Poliversity - Università ricerca e giornalismo
ecco il post corretto: poliverso.org/display/0477a01e…


intitolerei questo post "i cani del sinai", come il titolo di un celebre libro di Franco Fortini critico verso #israele
seguendo il link https://t.ly/YiBWu si trova un riferimento alle pratiche di #tortura messe in atto dallo stato sionista contro #prigionieri palestinesi. tra queste pratiche ce n'è una, particolarmente atroce e umiliante, che ha una terribile consonanza con quell'espressione fortiniana.



c'è chi pensa che il fine giustifica il mezzo. che hitler e stalin fossero diversi, perché stalin aveva uno "scopo di giustizia", mentre hitler il male puro. ma alla fine il mezzo mangia la persona, e quindi non c'è differenza tra stalin e hiter, neppure sul piano ideologico, perché alla fine conta quello che fai e quello che hai realizzato, e cioè una dittatura spietata in entrambi i casi.

reshared this



ilgiorno.it/milano/cronaca/stu…

quello che io chiamo un classico involucro vuoto che parla, mangia ma che non ha un'anima o niente dentro. una specie di macchina assassina. che poi è a quanto pare è lo stato finale dell'umanità. anche chi non andrebbe a uccidere la gente per strada, è infatti spesso non in grado di esprimere un pensiero coerente e logico, e tutto sommato diventa difficile da definire una piena persona. che questo coincida con il 60% di definiti analfabeti funzionali?



La Francia in rivolta sui pesticidi riscrive il rapporto tra scienza e potere


@Notizie dall'Italia e dal mondo
Il 7 agosto 2025, il Consiglio costituzionale francese ha dichiarato incostituzionale la cosiddetta legge Duplomb, approvata dal Parlamento un mese prima. La norma prevedeva la reintroduzione dell’acetamiprid, pesticida vietato dal 2018 per la sua comprovata



è sbagliato mettere sempre di mezzo la chiesa... ci fosse solo e soltanto unico cattivo... sarebbe bello. di certo gli italiani non sono estranei a questa cultura maschilista e patriarcale, di bullismo e di machismo.

credo che il primo passo per liberarsi della chiesa sia liberarsi dall'ossessione e smettere di parlarne. dopotutto qualcuno diceva che va bene che si parli di qualcuno, anche male, purché se ne parli... parlarne così è dare e sopratutto riconoscere (molto peggio) potere. è un palloncino che va lasciaro sgonfiare naturalmente, senza pestarlo continuamente. da ignorare.

dopotutto i grandi mangiatori di preti, la cosiddetta sinistra "vera", quella che oggi difende un fascista come putin, ha prodotto una cultura altrettanto tossica...

sarà pur vero che la sinistra, sempre quella "vera", non ha mai mangiato bambini, ma è pur vero che sostiene putin che lo fa, con quelli ucraini. si dice attorno ai 35'000 bambini. che oggi combattono in ucraina a fianco dei russi, con il cervello lavato, e più sfortunati dei russi.



La Francia in rivolta sui pesticidi riscrive il rapporto tra scienza e potere


@Notizie dall'Italia e dal mondo
Il 7 agosto 2025, il Consiglio costituzionale francese ha dichiarato incostituzionale la cosiddetta legge Duplomb, approvata dal Parlamento un mese prima. La norma prevedeva la reintroduzione dell’acetamiprid, pesticida vietato dal 2018 per la sua comprovata




Oggi è la Giornata nazionale in memoria delle vittime della strada. In occasione della ricorrenza studentesse e studenti parteciperanno, presso il Teatro Don Bosco di Roma, all'iniziativa di formazione in materia di educazione e sicurezza stradale pr…




Kissing is ubiquitous among many animals, especially primates, suggesting deep evolutionary roots of the behavior.#TheAbstract


Scientists Discover the Origin of Kissing — And It’s Not Human


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Kissing is one of humanity’s most cherished rituals—just think of the sheer variety of smooches, from the “wedding kiss” to the “kiss of death.” Now, scientists have discovered that the origins of this behavior, which is widespread among many primates, likely dates back at least 21 million years, according to a study published on Tuesday in the journal Evolution and Human Behavior.

In other words, our early primate relatives were sitting in a tree, K-I-S-S-I-N-G, in the early Miocene period. Moreover, the deep evolutionary roots of kissing suggest that Neanderthals likely smooched each other, and probably our human ancestors as well. The new study is the first attempt to reconstruct the evolutionary timeline of kissing by analyzing a wealth of observations about this behavior in modern primates and other animals.

“It is kind of baffling to me that people haven't looked at this from an evolutionary perspective before,” said Matilda Brindle, an evolutionary biologist at the University of Oxford who led the study, in a call with 404 Media. “There have been some people who have put ideas out there, but no one's done it in a systematic way.”

“Kissing doesn't occur in all human cultures, but in those that it does, it's really important,” she added. “That's why we thought it was really exciting to study.”
A collage of mouth-to-mouth contact across species. Image: Brindle, Matilda et al.
The ritual of the “first kiss” is a common romantic trope, but tracking down the “first kiss” in an evolutionary sense is no easy feat. For starters, the adaptive benefits of kissing have long eluded researchers. Mouth-to-mouth contact raises the odds of oral disease transfer, and it’s not at all clear what advantages puckering up confers to make it worth the trouble.

“Kissing is kind of risky,” Brindle said. “You're getting very close to another animal's face. There could be diseases. To me, that suggests that it is important. There must be some benefits to this behavior.”

Some common explanations for sex-related kissing include mate evaluation—bad breath or other red flags during a smoochfest might affect the decision to move on to copulation. Kissing may also stimulate sexual receptiveness and perhaps boost the odds of fertilization. In platonic contexts, kissing could serve a social purpose, similar to grooming, of solidifying bonds between parents and offspring, or even to smooth over conflicts between group members.

“We know that chimpanzees, when they've had a bit of a bust up, will often go and kiss each other and make up,” Brindle said. “That might be really useful for navigating social relationships. Primates are obviously an incredibly social group of animals, and so this could be just a social lubricant for them.”

Though most of us have probably never considered the question, Brindle and her colleagues first had to ask: what is a kiss? They made a point to exclude forms of oral contact that don’t fall into the traditional idea of kissing as a prosocial behavior. For example, lots of animals share food directly through mouth-to-mouth contact, such as regurgitation from a parent to offspring. In addition, some animals display antagonistic behavior through mouth-to-mouth contact, such as “kiss-fighting” behavior seen in some fish.

The team ultimately defined kissing as “a non-agonistic interaction involving directed, intraspecific, oral-oral contact with some movement of the lips/mouthparts and no food transfer.” Many animals engage in kissing under these terms—from insects, to birds, to mammals—but the researchers were most interested in primates.

To that end, they gathered observations of kissing across primate species and fed the data into models that analyzed the timeline of the behavior through the evolutionary relationships between species. The basic idea is that if humans, bonobos, and chimpanzees all kiss (which they do) then the common ancestor of these species likely kissed as well.

The results revealed that the evolutionary “first kiss” likely occurred among primates at least 21 million years ago. Since Neanderthals and our own species, Homo sapiens, are known to have interbred—plus they also shared oral microbes—the team speculates that Neanderthals and our own human ancestors might have kissed as well.

While the study provides a foundation for the origins of kissing, Brindle said there is not yet enough empirical data to test out different hypotheses about its benefits—or to explain why it is important in some species and cultures, but not others. To that end, she hopes other scientists will be inspired to report more observations about kissing in wild and captive animal populations.

“I was actually surprised that there were so few data out there,” Brindle said. “I thought that this would be way better documented when I started this study. What I would really love is, for people who see this behavior, to note it down, report it, so that we can actually start collecting more contextual information: Is this a romantic or a platonic kiss? Who were the actors in it? Was it an adult male and an adult female, or a mother and offspring? Were they eating at the time? Was there copulation before or after the kiss?”

“These sorts of questions will enable us to pick apart these potential adaptive hypotheses,” she concluded.

🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.




HOPE Hacking Conference Banned From University Venue Over Apparent ‘Anti-Police Agenda’#News #HOPE


HOPE Hacking Conference Banned From University Venue Over Apparent ‘Anti-Police Agenda’


The legendary hacker conference Hackers on Planet Earth (HOPE) says that it has been “banned” from St. John’s University, the venue where it has held the last several HOPE conferences, because someone told the university the conference had an “anti-police agenda.”

HOPE was held at St. John’s University in 2022, 2024, and 2025, and was going to be held there in 2026, as well. The conference has been running at various venues over the last 31 years, and has become well-known as one of the better hacking and security research conferences in the world. Tuesday, the conference told members of its mailing list that it had “received some disturbing news,” and that “we have been told that ‘materials and messaging’ at our most recent conference ‘were not in alignment with the mission, values, and reputation of St. John’s University’ and that we would no longer be able to host our events there.”

The conference said that after this year’s conference, they had received “universal praise” from St. John’s staff, and said they were “caught by surprise” by the announcement.

“What we're told - and what we find rather hard to believe - is that all of this came about because a single person thought we were promoting an anti-police agenda,” the email said. “They had spotted pamphlets on a table which an attendee had apparently brought to HOPE that espoused that view. Instead of bringing this to our attention, they went to the president's office at St. John's after the conference had ended. That office held an investigation which we had no knowledge of and reached its decision earlier this month. The lack of due process on its own is extremely disturbing.”

“The intent of the person behind this appears clear: shut down events like ours and make no attempt to actually communicate or resolve the issue,” the email continued. “If it wasn't this pamphlet, it would have been something else. In this day and age where academic institutions live in fear of offending the same authorities we've been challenging for decades, this isn't entirely surprising. It is, however, greatly disappointing.”

St. John’s University did not immediately respond to a request for comment. Hacking and security conferences in general have a long history of being surveilled by or losing their venues. For example, attendees of the DEF CON hacking conference have reported being surveilled and having their rooms searched; last year, some casinos in Las Vegas made it clear that DEF CON attendees were not welcome. And academic institutions have been vigorously attacked by the Trump administration over the last few months over the courses they teach, the research they fund, and the events they hold, though we currently do not know the specifics of why St. John’s made this decision.

It is not clear what pamphlets HOPE is referencing, and the conference did not immediately respond to a request for comment, but the conference noted that St. Johns could have made up any pretext for banning them. It is worth mentioning that Joshua Aaron, the creator of the ICEBlock ICE tracking app, presented at HOPE this year. ICEBlock has since been deleted by the Apple App Store and the Google Play store after being pressured by the Trump administration.

“Our content has always been somewhat edgy and we take pride in challenging policies we see as unfair, exposing security weaknesses, standing up for individual privacy rights, and defending freedom of speech,” HOPE wrote in the email. The conference said that it has not yet decided what it will do next year, but that it may look for another venue, or that it might “take a year off and try to build something bigger.”

“There will be many people who will say this is what we get for being too outspoken and for giving a platform to controversial people and ideas. But it's this spirit that defines who we are; it's driven all 16 of our past conferences. There are also those who thought it was foolish to ever expect a religious institution to understand and work with us,” the conference added. “We are not changing who we are and what we stand for any more than we'd expect others to. We have high standards for our speakers, presenters, and staff. We value inclusivity and we have never tolerated hate, abuse, or harassment towards anyone. This should not be news, as HOPE has been around for a while and is well known for its uniqueness, spirit, and positivity.”




“Most drivers are unaware that San Jose’s Police Department is tracking their locations and do not know all that their saved location data can reveal about their private lives and activities."#Flock


ACLU and EFF Sue a City Blanketed With Flock Surveillance Cameras


Lawyers from the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) sued the city of San Jose, California over its deployment of Flock’s license plate-reading surveillance cameras, claiming that the city’s nearly 500 cameras create a pervasive database of residents movements in a surveillance network that is essentially impossible to avoid.

The lawsuit was filed on behalf of the Services, Immigrant Rights & Education Network and Council on American-Islamic Relations, California, and claims that the surveillance is a violation of California’s constitution and its privacy laws. The lawsuit seeks to require police to get a warrant in order to search Flock’s license plate system. The lawsuit is one of the highest profile cases challenging Flock; a similar lawsuit in Norfolk, Virginia seeks to get Flock’s network shut down in that city altogether.

“San Jose’s ALPR [automatic license plate reader] program stands apart in its invasiveness,” ACLU of Northern California and EFF lawyers wrote in the lawsuit. “While many California agencies run ALPR systems, few retain the locations of drivers for an entire year like San Jose. Further, it is difficult for most residents of San Jose to get to work, pick up their kids, or obtain medical care without driving, and the City has blanketed its roads with nearly 500 ALPRs.”

The lawsuit argues that San Jose’s Flock cameras “are an invasive mass surveillance technology” that “collect[s] driver locations en masse.”

“Most drivers are unaware that San Jose’s Police Department is tracking their locations and do not know all that their saved location data can reveal about their private lives and activities,” it adds. The city of San Jose currently has at least 474 ALPR cameras, up from 149 at the end of 2023; according to data from the city, more than 2.6 million vehicles were tracked using Flock in the month of October alone. The lawsuit states that Flock ALPRs are stationed all over the city, including “around highly sensitive locations including clinics, immigration centers, and places of worship. For example, three ALPR cameras are positioned on the roads directly outside an immigration law firm.”

Andrew Crocker, surveillance litigation director for the EFF, told 404 Media in a phone call that “it’s fair to say that anyone driving in San Jose is likely to have their license plates captured many times a day. That pervasiveness is important.”
DeFlock's map of San Jose's ALPRsA zoomed in look at San Jose
A search of DeFlock, a crowdsourced map of ALPR deployments around the country, shows hundreds of cameras in San Jose spaced essentially every few blocks around the city. The map is not exhaustive.

The lawsuit argues that warrantless searches of these cameras are illegal under the California constitution’s search and seizure clause, which Crocker said “has been interpreted to be even stronger than the Fourth Amendment,” as well as other California privacy laws. The case is part of a broader backlash against Flock as it expands around the United States. 404 Media’s reporting has shown that the company collects millions of records from around the country, and that it has made its national database of car locations available to local cops who have in turn worked with ICE. Some of those searches have violated California and Illinois law, and have led to reforms from the company. Crocker said that many of these problems will be solved if police simply need to get a warrant to search the system.

“Our legal theory and the remedy we’re seeking is quite simple. We think they need a warrant to search these databases,” he said. “The warrant requirement is massive and should help in terms of preventing these searches because they will have to be approved by a judge.” The case in Norfolk is ongoing. San Jose Police Department and Flock did not immediately respond to a request for comment.




The move comes after intense pressure from lawmakers and 404 Media’s months-long reporting about the airline industry's data selling practices.

The move comes after intense pressure from lawmakers and 404 Media’s months-long reporting about the airline industryx27;s data selling practices.#Impact


Airlines Will Shut Down Program That Sold Your Flights Records to Government


Airlines Reporting Corporation (ARC), a data broker owned by the U.S.’s major airlines, will shut down a program in which it sold access to hundreds of millions of flight records to the government and let agencies track peoples’ movements without a warrant, according to a letter from ARC shared with 404 Media.

ARC says it informed lawmakers and customers about the decision earlier this month. The move comes after intense pressure from lawmakers and 404 Media’s months-long reporting about ARC’s data selling practices. The news also comes after 404 Media reported on Tuesday that the IRS had searched the massive database of Americans flight data without a warrant.

“As part of ARC’s programmatic review of its commercial portfolio, we have previously determined that TIP is no longer aligned with ARC’s core goals of serving the travel industry,” the letter, written by ARC President and CEO Lauri Reishus, reads. TIP is the Travel Intelligence Program. As part of that, ARC sold access to a massive database of peoples’ flights, showing who travelled where, and when, and what credit card they used.
The ARC letter.
“All TIP customers, including the government agencies referenced in your letter, were notified on November 12, 2025, that TIP is sunsetting this year,” Reishus continued. Reishus was responding to a letter sent to airline executives earlier on Tuesday by Senator Ron Wyden, Congressman Andy Biggs, Chair of the Congressional Hispanic Caucus Adriano Espaillat, and Senator Cynthia Lummis. That letter revealed the IRS’s warrantless use of ARC’s data and urged the airlines to stop the ARC program. ARC says it notified Espaillat's office on November 14.

ARC is co-owned by United, American, Delta, Southwest, JetBlue, Alaska, Lufthansa, Air France, and Air Canada. The data broker acts as a bridge between airlines and travel agencies. Whenever someone books a flight through one of more than 12,800 travel agencies, such as Expedia, Kayak, or Priceline, ARC receives information about that booking. It then packages much of that data and sells it to the government, which can search it by name, credit card, and more. 404 Media has reported that ARC’s customers include the FBI, multiple components of the Department of Homeland Security, ATF, the SEC, TSA, and the State Department.

Espaillat told 404 Media in a statement “this is what we do. This is how we’re fighting back. Other industry groups in the private sector should follow suit. They should not be in cahoots with ICE, especially in ways may be illegal.”

Wyden said in a statement “it shouldn't have taken pressure from Congress for the airlines to finally shut down the sale of their customers’ travel data to government agencies by ARC, but better late than never. I hope other industries will see that selling off their customers' data to the government and anyone with a checkbook is bad for business and follow suit.”

“Because ARC only has data on tickets booked through travel agencies, government agencies seeking information about Americans who book tickets directly with an airline must issue a subpoena or obtain a court order to obtain those records. But ARC’s data sales still enable government agencies to search through a database containing 50% of all tickets booked without seeking approval from a judge,” the letter from the lawmakers reads.

Update: this piece has been updated to include statements from CHC Chair Espaillat and Senator Wyden.




A bipartisan letter reveals the IRS searched a database of hundreds of millions of travel records without first conducting a legal review. Airlines like Delta, United, American, and Southwest are selling these records to the government through a co-owned data broker.#arc #Privacy


IRS Accessed Massive Database of Americans Flights Without a Warrant


The IRS accessed a database of hundreds of millions of travel records, which show when and where a specific person flew and the credit card they used, without obtaining a warrant, according to a letter signed by a bipartisan group of lawmakers and shared with 404 Media. The country’s major airlines, including Delta, United Airlines, American Airlines, and Southwest, funnel customer records to a data broker they co-own called the Airlines Reporting Corporation (ARC), which then sells access to peoples’ travel data to government agencies.

The IRS case in the letter is the clearest example yet of how agencies are searching the massive trove of travel data without a search warrant, court order, or similar legal mechanism. Instead, because the data is being sold commercially, agencies are able to simply buy access. In the letter addressed to nine major airlines, the lawmakers urge them to shut down the data selling program. Update: after this piece was published, ARC said it already planned to shut down the program. You can read more here.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




Dalle ore 12.00 di domani, mercoledì #19novembre, la piattaforma #CartadelDocente sarà accessibile per gli insegnanti che dispongano di eventuali residui dell’Anno Scolastico 2024/2025 e per i beneficiari di sentenze a cui è stata data esecuzione.

Roberto Rossetti reshared this.