Advertisements


GitHub Will Require All Code Contributors To Use 2FA

GitHub, the code hosting platform used by tens of millions of software developers around the world, announced today that all users who upload code to the site will need to enable one or more forms of two-factor authentication (2FA) by the end of 2023.....»»

Category: topSource:  slashdotMay 4th, 2022

New, simple and accessible method creates potency-increasing structure in drugs

Chemical structures called cyclopropanes can increase the potency and fine-tune the properties of many drugs, but traditional methods to create this structure only work with certain molecules and require highly reactive—potentially explosive—ingr.....»»

Category: topSource:  physorgRelated NewsAug 3rd, 2023

Endor Labs raises $70 million to expand into other areas of code and pipeline security

Endor Labs raises $70 million in oversubscribed Series A financing from Lightspeed Venture Partners (LSVP), Coatue, Dell Technologies Capital, Section 32, and over 30 industry-leading CEOs, CISOs, and CTOs. Arif Janmohamed of Lightspeed, Sri Viswanat.....»»

Category: securitySource:  netsecurityRelated NewsAug 3rd, 2023

Mac and iPad imports to India will require a license, with immediate effect

A new policy announced today means that Macs and iPad imports to India will require a license. The policy takes “immediate effect.” The move appears to be part of the company’s Made in India strategy, which uses a carrot-and-stick approach t.....»»

Category: gadgetSource:  9to5macRelated NewsAug 3rd, 2023

India limits iPad and Mac imports in drive to boost local manufacturing

Apple's iPad and Mac are among the devices that the Indian government says will now require a licence to import, at least delaying sales of them and potentially limiting their numbers.Mumbai, IndiaIndia has long had an 20% import tax on smartphones w.....»»

Category: appleSource:  appleinsiderRelated NewsAug 3rd, 2023

Assess multi-cloud security with the open-source CNAPPgoat project

Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox environments that are easy to deploy and destroy. It is available on GitHub. CNAPPg.....»»

Category: securitySource:  netsecurityRelated NewsAug 3rd, 2023

Sonar’s new deep-analysis capability discovers and fixes code security issues

Sonar announced a significant advancement of its Clean Code offering – developers can now automatically discover and fix code security issues arising from interactions between user source code and third-party, open-source libraries. Referred to as.....»»

Category: securitySource:  netsecurityRelated NewsAug 2nd, 2023

Hosting Ars, part three: CI/CD, or how I learned to stop worrying and love DevOps

This time we discuss how we manage, update, and deploy the code that makes Ars work. Enlarge / DevOps, DevOps, DevOps! (credit: ArtemisDiana / Getty Images) One of the most important things to happen in the evolution of.....»»

Category: topSource:  arstechnicaRelated NewsAug 2nd, 2023

Dynatrace acquires Rookout to improve productivity for developers

Dynatrace has signed a definitive agreement to acquire Rookout, a provider of enterprise-ready and privacy-aware solutions that enable developers to troubleshoot and debug actively running code in Kubernetes-hosted cloud-native applications. The addi.....»»

Category: securitySource:  netsecurityRelated NewsAug 1st, 2023

Stremio vulnerability exposes millions to attack

CyFox researchers have discovered a DLL planting/hijacking vulnerability in popular media center application Stremio, which could be exploited by attackers to execute code on the victim’s system, steal information, and more. About the vulnerabi.....»»

Category: securitySource:  netsecurityRelated NewsAug 1st, 2023

Open-source security challenges and complexities

Open source refers to software or technology that is made available to the public with its source code openly accessible, editable, and distributable. In other words, the source code contains the underlying programming instructions and is freely avai.....»»

Category: securitySource:  netsecurityRelated NewsJul 31st, 2023

Apple Vision Pro release might see movie libraries updated with 3D options

An Apple Vision Pro code dive has revealed a 'Play 3D' option in the new TV app, which may presage Apple upgrading users' libraries to 3D where and when available.Apple Vision Pro at WWDC 2023Apple showed off 3D movies during its launch of the Apple.....»»

Category: appleSource:  appleinsiderRelated NewsJul 31st, 2023

Researchers use quantum circuit to identify single nucleotides

DNA sequencing technology, i.e., determining the order of nucleotide bases in a DNA molecule, is central to personalized medicine and disease diagnostics, yet even the fastest technologies require hours, or days, to read a complete sequence. Now, a m.....»»

Category: topSource:  theglobeandmailRelated NewsJul 31st, 2023

NHTSA proposes 58 mpg standard for new vehicles by 2032

NHTSA on Friday said its new standards for the 2027-32 model years would require a 2 percent per year improvement in fuel efficiency for cars and a 4 percent per year improvement for light trucks......»»

Category: topSource:  autonewsRelated NewsJul 28th, 2023

Baffle Advanced Encryption analyzes regulated data while meeting all compliance standards

Baffle unveiled Baffle Data Protection Services with Advanced Encryption, a privacy-enhanced technology solution that enables analytical and operational computations on protected, regulated data. Baffle’s no code, data-centric software protects dat.....»»

Category: securitySource:  netsecurityRelated NewsJul 28th, 2023

Blocking access to ChatGPT is a short term solution to mitigate risk

For every 10,000 enterprise users, an enterprise organization is experiencing approximately 183 incidents of sensitive data being posted to ChatGPT per month, according to Netskope. Source code accounts for the largest share of sensitive data being e.....»»

Category: securitySource:  netsecurityRelated NewsJul 28th, 2023

ZTNA can be more than a VPN replacement for application access

In the wake of increased workforce mobility, today’s organizations require more innovative, more flexible, and more secure methods of granting network and application access to their workers. ZTNA adoption The encryption-based security approach lev.....»»

Category: securitySource:  netsecurityRelated NewsJul 28th, 2023

App Store to require developers to describe why their apps use certain APIs

The App Store review process is very strict to ensure that apps comply with Apple’s guidelines. And soon, this whole process will get even more strict. That’s because Apple recently announced that developers would be required to detail why their.....»»

Category: topSource:  pcmagRelated NewsJul 28th, 2023

Senate committee advances bill requiring AM radio in new cars

The Democratic-led Senate Commerce Committee advanced the AM Radio for Every Vehicle Act, which directs the Transportation Department to require automakers to keep AM radio receivers in new vehicles as standard equipment......»»

Category: topSource:  autonewsRelated NewsJul 27th, 2023

Your genetic code has lots of "words" for the same thing—information theory may help explain the redundancies

Nearly all life, from bacteria to humans, uses the same genetic code. This code acts as a dictionary, translating genes into the amino acids used to build proteins. The universality of the genetic code indicates a common ancestry among all living org.....»»

Category: topSource:  physorgRelated NewsJul 27th, 2023

New geology study cracks the code of what causes diamonds to erupt

New research into the forces that bring diamonds to the surface from deep in the Earth's mantle could help locate undiscovered diamond deposits, say Macqurie University geologists......»»

Category: topSource:  physorgRelated NewsJul 27th, 2023