GitHub Will Require All Code Contributors To Use 2FA
GitHub, the code hosting platform used by tens of millions of software developers around the world, announced today that all users who upload code to the site will need to enable one or more forms of two-factor authentication (2FA) by the end of 2023.....»»
Team examines importance of zeolite in catalysts for syngas conversion
The fuels used today depend heavily on petroleum. As the demand grows, scientists are looking for ways to produce fuels that do not require petroleum. A research team set out to examine the role of zeolites in the conversion of synthetic gas to fuels.....»»
Google quietly corrects previously submitted disclosure for critical webp 0-day
Previous CVE submission failed to mention that thousands of apps were affected. Enlarge / Malware Detected Warning Screen with abstract binary code 3d digital concept (credit: Getty Images) Google has quietly resubmitted.....»»
Colorado has a new plan to reduce greenhouse gases. Critics say it fails those most impacted by air pollution
Colorado's air regulators have approved a new rule that will require the state's 18 largest manufacturers to reduce their greenhouse gas emissions, but the plan is receiving pointed criticism from environmental advocates who say loopholes will allow.....»»
Reddit to begin paying people for popular posts
The social media site will split revenue with contributors who are awarded "gold" by other users......»»
Apple won"t make a Google search rival, says Cue
Apple executive Eddy Cue is expected to testify in court that the company has no plan to make an "Apple Search" engine, because its deal with Google is the best for users.Eddy Cue at the 2014 Code Conference (Source: Re/code)As previously reported, A.....»»
Are developers giving enough thought to prompt injection threats when building code?
With National Coding Week behind us, the development community has had its annual moment of collective reflection and focus on emerging technologies that are shaping the industry. Among these, large language models (LLMs) and “generative AI” have.....»»
BinDiff: Open-source comparison tool for binary files
BinDiff is a binary file comparison tool to find differences and similarities in disassembled code quickly. It was made open source today. With BinDiff, you can identify and isolate fixes for vulnerabilities in vendor-supplied patches. You can also p.....»»
Spotify Supremium lossless audio – planned pricing looks to be $20/month
We first heard back in June that Spotify Supremium might be the name given to the company’s long-awaited lossless audio tier, and that now appears to have been confirmed by code found within the app. The code also contains a reference to pricing.....»»
Contrast Security integrates with AWS Security Hub to help organizations mitigate threats
Contrast Security, the code security platform built for developers and trusted by security, today announced its integration with Amazon Web Services (AWS) Security Hub to offer full-spectrum security visibility, from infrastructure to applications. A.....»»
Optimizing Metal: Ways to improve code made for Apple"s graphics framework
There is a vast array of ways to optimize your Metal graphics code to get top performance. Here's how to get started getting your code into better shape for the Metal framework.Apple GPU architectureApple GPUs are Tile-Based Deferred Renderers - whic.....»»
Is there more to palm oil than deforestation?
Palm oil is the world's most produced and consumed vegetable oil and everyone knows that its production can damage the environment. But do consumers have the full picture? In fact, replacing palm oil with rapeseed oil would require a four to five-fol.....»»
Scientists reveal intricate mechanisms cells use to build protein destruction signals
Within the intricate molecular landscape inside of a cell, the orchestration of proteins demands precise control to avoid disease. While some proteins must be synthesized at specific times, others require timely breakdown and recycling. Protein degra.....»»
Fake WinRAR PoC spread VenomRAT malware
An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro.....»»
Building GenAI competence for business growth
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and.....»»
iPhone 15 provides more details on battery health and lets users limit charge to 80%
Right after Apple released iOS 17 RC to developers and beta users last week, 9to5Mac found code references to a new option to limit the maximum battery charge on the iPhone in order to better preserve it. As some people already have iPhone 15 in thei.....»»
Code leak says WhatsApp is finally coming to iPad
We've been here before, but a new report about beta test versions of WhatsApp appear to show that it will be getting a native iPad version soon.WhatsApp on iPhoneIt's expected soon because the code, as first spotted by WaBetaInfo, is in the current T.....»»
Entrust’s zero trust solutions enhance security of applications, encryption keys and secrets
Entrust announced new capabilities to help organizations enhance their security posture and advance their zero trust maturity journey. The new features extend protections, visibility, and governance over virtual infrastructures, code and application.....»»
Microsoft accidentally released 38TB of private data in a major leak
Microsoft’s own AI researchers accidentally leaked 38TB of highly sensitive data on their own GitHub page, potentially creating a field day for hackers......»»
How can solar energy installations prioritize ecosystems?
Solar energy will be an integral part of a more sustainable future, but with current technology, generating the amount of power needed in Colorado alone would require using roughly the land area of Denver......»»
Unveiling the invisible: A bioinspired CMOS-integrated polarization imaging sensor
Polarimetric imaging can uncover features invisible to human eyes and conventional imaging sensors, and it is becoming an ever more essential technique in modern society. Conventional polarimetric imaging systems require complex optical components an.....»»