Feed aggregator

Windows File Shredder: When deleting a file isn’t enough

Malware Bytes Security - Thu, 03/05/2026 - 6:07am

Most of us think deleting a file means it’s gone for good. But “delete” on a Windows device often just means “out of sight,” not necessarily “out of reach.”

That’s where File Shredder, a new feature within Malwarebytes Tools for Windows, comes in. File Shredder lets you securely delete files from your hard drive or USB drive, so the files are not just removed—but completely unrecoverable, even with specialized recovery software.

What File Shredder does differently

When you delete a file by placing it in your Recycle Bin and emptying the contents, your computer typically removes the reference to it—but the data itself can remain on the drive until it’s overwritten. That leftover data can sometimes be recovered using basic digital tools, some of which can even be downloaded for free online. These data traces pose a problem if the file you want to delete includes personal, financial, or other sensitive information, like tax documents, scanned IDs, contracts, or anything else you would like to remain private forever.

File Shredder goes beyond standard deletion by instead permanently overwriting the file data, ensuring it can’t be reconstructed or recovered. Once a file is shredded, it’s gone for good—no undo, no recovery, no second chances.

That makes File Shredder especially useful when:

  • You’re cleaning up sensitive files before selling or donating a device
  • You need to securely remove files from a USB drive
  • You’re minimizing digital clutter without leaving data behind
  • You want peace of mind that private files stay private
How to use File Shredder

File Shredder is designed to be powerful without being complicated.

To use File Shredder:

  • Open the Malwarebytes app and select the “Tools” icon from the lefthand menu (the screwdriver and wrench icon)
  • From this menu, find and click on “File Shredder”
  • Once here, you can manually add files or folders to the list and then click on the button “Delete permanently”
  • You will be asked to confirm your request before File Shredder deletes the files
  • The Malwarebytes Tools screen
  • Manually select files and folders for deletion
  • Confirm your deletion requests
  • Done!

After your files are deleted by File Shredder you can move on, confident that the data can’t be accessed again.

Protection means your data is in your control

Cybersecurity isn’t just about blocking threats—it’s also about giving you control over your own data. File Shredder provides a way to do exactly that, helping you close the door on files that you no longer want on your devices.

Because when you’re done with a file, it should really be done.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Categories: Malware Bytes

Show HN: Building a WebSocket Chat App with C#, Redis Pub/Sub and .NET

Hacker News - Thu, 03/05/2026 - 6:07am

I wrote a tutorial explaining how to build a simple real-time chat server using WebSockets and Redis Pub/Sub in .NET.

The article walks through the architecture and implementation of a server that supports channel subscriptions, message publishing, and fanout using Redis.

Topics covered:

- WebSocket connection handling - Redis Pub/Sub for message distribution - inbound/outbound message loops - channel subscription management - basic architecture for real-time messaging systems

The full source code is available here: https://github.com/sanzor/Ctesiphon

Would be curious to hear feedback from people working on messaging infrastructure or real-time systems.

Comments URL: https://news.ycombinator.com/item?id=47260237

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: I built an AI desktop Waifu that remembers you

Hacker News - Thu, 03/05/2026 - 6:06am

She sits on your screen, watches what you do, and develops her own personality over time .

4-tier memory → emotions → personality islands → beliefs

Open source. Any VRM model.

Comments URL: https://news.ycombinator.com/item?id=47260233

Points: 1

# Comments: 0

Categories: Hacker News

Obsessed With Your Air Fryer? These 9 Accessories Are a Must

CNET Feed - Thu, 03/05/2026 - 6:00am
Saddle your air fryer with sidekicks to elevate the trusty countertop oven.
Categories: CNET

Supreme Court to decide whether geofence warrants are constitutional

Malware Bytes Security - Thu, 03/05/2026 - 5:54am

Google has weighed in on a court case that will decide the future of a powerful but contentious tool for law enforcement. The company submitted an opinion to the US Supreme Court arguing that geofence warrants are unconstitutional.

A geofence warrant is a form of “reverse warrant” that turns a regular warrant on its head. Police get a regular warrant when they want to target a particular person. With a reverse warrant, police don’t know exactly who they’re looking for. Instead, they ask someone (typically a technology company) for a broad data set about a group of unknown people based on some common behavior. Then they analyze that data set for potential suspects.

With a geofence warrant, that data set is defined by a location and a time window. Law enforcement officials obtain a list of phones that were in that area during that period. Every device that was inside the circle comes back in the results, even if nobody on that list has been suspected of anything. Proximity is the only criterion.

That’s how Okello Chatrie was charged with armed bank robbery in Virginia in 2019: His phone showed up in a geofence warrant covering 17.5 acres (larger than three football fields). He argued that this kind of search isn’t constitutional and shouldn’t have been used as evidence.

In 2024, the Fifth Circuit Court of Appeals agreed with him, overturning a Fourth Circuit ruling. Now prosecutors have taken the case to the Supreme Court, with parties due to make oral arguments on April 27.

The case has seen a flurry of amicus curiae briefs, which are opinions from interested expert parties that have no direct involvement in the case. One of these is from Google, which on Monday urged the justices to consider the geofence warrants unconstitutional because of their broad scope. It has objected to more than 3,000 of them on constitutional grounds in recent months.

Google’s brief stated:

“Many of these overbroad warrants swept in hundreds, sometimes even thousands, of innocent people. State and federal courts have repeatedly granted Google’s motions to quash these overbroad warrants.”

How the database gets built

Although Google is just one of many organizations that filed amicus briefs, its position is especially notable because it has historically collected so much location data. Its Timeline feature (formerly Location History) logs device position via GPS, Wi-Fi networks, Bluetooth, and mobile signals, including when Google apps aren’t being used, according to its policy page.

At the time of the Chatrie warrant, it was recording position as frequently as every two minutes. All of that fed a centralised internal database which held 592 million individual accounts. So responding to any geofence request required Google to search essentially the entire store before producing a single name, according to an analysis by privacy advocacy group EPIC, which also regularly submits amicus briefs on privacy cases.

Google moved Timeline storage from its own servers onto users’ devices in July 2025, closing the door to fresh cloud-based requests against its own systems. But the constitutional question survives for historical data and for any company that has not followed suit.

The warrant that grew and grew

A geofence warrant does not stay fenced, according to a separate brief that the Center for Democracy and Technology (CDT) filed in the case last week. It said Google’s standard response to warrants had three steps. First it would deliver an anonymized list of devices inside the geofence. Then, police could ask for movement data on chosen “devices of interest,” which could track them outside the geographic boundary and beyond the original time window. Finally, again without any further judicial approval, police could ask for subscriber-identifying information for whichever devices police chose to unmask.

In the Chatrie case, positioning data was imprecise enough that, as the district court found, the warrant may have included devices outside the intended area. According to the CDT brief:

“The Geofence Warrant could have captured the location of someone who was hundreds of feet outside the geofence.”

The CDT argues in its brief that this can expose the privacy of people going about their everyday lives, engaging in legal activities that they might not want others to know about. The warrant that scooped up Chatrie included a hotel and a restaurant.

Some of these requests are far broader. Google successfully challenged a warrant asking for the location history of anyone in large portions of San Francisco for two and a half days, it said. Google complained in its brief:

“No court would authorize a physical search of hundreds of people or places, yet geofence warrants sometimes do so by design.”

What can you do to stop yourself getting swept up in a geofencing search?

If your phone stores detailed location history with Google, that data may be included in geofence warrant responses. Limiting what gets saved can reduce how much location information exists in the first place.

There are two Google settings that matter: Timeline (Location History) and Web & App Activity. Turning off one does not automatically disable the other.

Timeline stores a detailed record of where your device has been, although it’s off by default. Web & App Activity can also log location signals when you use Google services like Search, Maps, or other apps.

Google provides instructions on how to review and disable these settings in its support documentation:

Google has previously settled lawsuits accusing it of misleading users about how location data is stored across these settings, so reviewing both controls is important.

Reverse warrants may not stop at location data

The implications of the case extend well past maps, though. The CDT brief warns that if courts endorse the logic behind geofence warrants, then law enforcement may try to apply the same approach to other large datasets held by technology companies, such as AI chatbot data. That’s a step the DHS has already taken, issuing what has been reported as the first known warrant for ChatGPT user data.

We don’t just report on privacy—we offer you the option to use it.

Privacy risks should never spread beyond a headline. Keep your online privacy yours by using Malwarebytes Privacy VPN.

Categories: Malware Bytes

LeakBase Cybercrime Forum Shut Down, Suspects Arrested

Security Week - Thu, 03/05/2026 - 5:46am

The stolen credential marketplace had been active since 2021 and in late 2025 it counted 142,000 users. 

The post LeakBase Cybercrime Forum Shut Down, Suspects Arrested appeared first on SecurityWeek.

Categories: SecurityWeek

Prominent scandal victim given leave to appeal High Court decision in his legal action against the Post Office and Fujitsu

Computer Weekly Feed - Thu, 03/05/2026 - 5:37am
Prominent scandal victim given leave to appeal High Court decision in his legal action against the Post Office and Fujitsu
Categories: Computer Weekly

A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data

Computer Weekly Feed - Thu, 03/05/2026 - 5:37am
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data
Categories: Computer Weekly

Hacktivist activity surrounding the Iran war is sky-high but Iran’s state-backed cyber espionage actors have yet to show their hands, giving security teams a valuable window of time to shore up their defences

Computer Weekly Feed - Thu, 03/05/2026 - 5:37am
Hacktivist activity surrounding the Iran war is sky-high but Iran’s state-backed cyber espionage actors have yet to show their hands, giving security teams a valuable window of time to shore up their defences
Categories: Computer Weekly

What's an API?

Hacker News - Thu, 03/05/2026 - 5:29am
Categories: Hacker News

The Best Sleep Headphones for Blocking Out Noise and Lulling You to Sleep

CNET Feed - Thu, 03/05/2026 - 5:29am
Based on testing done by our sleep experts and headphone expert, these are the best headphones and earbuds for sleep.
Categories: CNET

I Want This Twisted Firestarter Smartphone in My Camping Essentials

CNET Feed - Thu, 03/05/2026 - 5:26am
Don't need to light things on fire? The phone still has a massive battery, bright spotlight and big speaker to suit your campsite.
Categories: CNET

Paloha – Agence de communication Montpellier

Hacker News - Thu, 03/05/2026 - 5:26am

Article URL: https://paloha.fr/fr

Comments URL: https://news.ycombinator.com/item?id=47259981

Points: 1

# Comments: 1

Categories: Hacker News

Are companies preventing sensitive data from being sent to external LLM APIs

Hacker News - Thu, 03/05/2026 - 5:25am

I’m curious how engineering and security teams are handling governance around AI usage inside companies.

As more teams integrate APIs from providers like OpenAI, Anthropic, and other LLM services, it seems possible for sensitive data to accidentally end up in prompts.

Some questions I’m trying to understand:

• Do companies route AI API traffic through some internal gateway or proxy? • How do you prevent sensitive information (customer data, credentials, internal documents) from being sent to external models? • Is AI usage across teams actually tracked anywhere? • If an auditor asked how AI systems are governed in your company, would you have a clear answer?

I’d be interested to hear how teams are currently handling this in practice.

Comments URL: https://news.ycombinator.com/item?id=47259975

Points: 1

# Comments: 0

Categories: Hacker News

Pages