How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»
“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux
Full system compromise possible by peppering servers with thousands of connection requests. Enlarge Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that can be exploited to g.....»»
Micro LED monitors connect like puzzle pieces in HP multi-monitor concept
Concept "can be applied to any panel type technology without a backlight." Enlarge / Yes, there are bigger monitors, but is there a better way to have a tri-monitor setup? (credit: Getty) In a technical disclosure publ.....»»
Federal agency warns critical Linux vulnerability being actively exploited
Cybersecurity and Infrastructure Security Agency urges affected users to update ASAP. Enlarge (credit: Getty Images) The US Cybersecurity and Infrastructure Security Agency has added a critical security bug in Linux to i.....»»
Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919)
Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for local accounts, which they then used to move laterally in the target organizations’ network. &.....»»
Understanding how zwitterionic polymers can lead to safer drugs and disease prevention
Proteins are vital biomolecules responsible for performing various functions in the human body and are thus regarded as the workhorses of a cell. The primary structure of a protein is composed of different amino acids coming together. The structure s.....»»
NIST says NVD will be back on track by September 2024
The National Institute of Standards and Technology (NIST) has awarded a contract for an unnamed company/organization to help them process incoming Common Vulnerabilities and Exposures (CVEs) for inclusion in the National Vulnerability Database (NVD),.....»»
Study shows transgenic expression of rubisco factors increases photosynthesis and chilling tolerance in maize
Maize is one of the world's most widely grown crops and is essential to global food security. But like other plants, its growth and productivity can be limited by the slow activity of Rubisco, the enzyme responsible for carbon assimilation during pho.....»»
Viewpoint: Banning sex crime offenders from changing their names doesn"t make us safer
The government of British Columbia recently introduced a bill to ban people convicted of serious offenses from legally changing their name. The proposed amendment to the province's Name Act would also prohibit those found not criminally responsible d.....»»
Over 300 million young people have experienced online sexual abuse, exploitation, finds metastudy
It takes a lot to shock Kelvin Lay. My friend and colleague was responsible for setting up Africa's first dedicated child exploitation and human trafficking units, and for many years he was a senior investigating officer for the Child Exploitation On.....»»
Study shows relatively low number of superspreaders responsible for large portion of misinformation on Twitter
A small team of social media analysts at Indiana University has found that a major portion of tweets spreading disinformation are sent by a surprisingly small percentage of a given userbase......»»
Taiwan president extends goodwill after China drills, US lawmakers arrive
Taiwan president extends goodwill after China drills, US lawmakers arrive.....»»
Apple Location Services vulnerability can enable troop movements to be tracked
Security researchers report that a key element of Apple Location Services contains what they call “a really serious privacy vulnerability” that allowed troop movements to be tracked. The issue could also allow an attacker to work out the locat.....»»
Google fixes yet another Chrome zero-day exploited in the wild (CVE-2024-5274)
For the eighth time this year, Google has released an emergency update for its Chrome browser that fixes a zero-day vulnerability (CVE-2024-5274) with an in-the-wild exploit. About CVE-2024-5274 As per usual, Google keeps technical details of the vul.....»»
El Nino not responsible for East Africa floods: Scientists
The El Niño weather pattern did not have "any influence" on widespread flooding that killed hundreds in East Africa this year, an expert group of scientists said Friday......»»
HHS pledges $50M for autonomous vulnerability management solution for hospitals
As organizations in the healthcare sector continue to be a prime target for ransomware gangs and CISA warns about a vulnerability (CVE-2023-43208) in a healthcare-specific platform being leveraged by attackers, the Advanced Research Projects Agency f.....»»
GitHub fixes maximum severity Enterprise Server auth bypass bug (CVE-2024-4985)
A critical, 10-out-of-10 vulnerability (CVE-2024-4985) allowing unrestricted access to vulnerable GitHub Enterprise Server (GHES) instances has been fixed by Microsoft-owned GitHub. Fortunately, there is a catch that may narrow down the pool of poten.....»»
Genetic mutation responsible for new coat pattern in cats in Finland identified
A team of geneticists and animal welfare specialists from the U.K. and one from the U.S. has identified the genetic mutation responsible for a newly discovered cat coat color pattern in Finland. In their study, published in the journal Animal Genetic.....»»
Lawmakers say Section 230 repeal will protect children—opponents predict chaos
Repeal bill is bipartisan but has opponents from across the political spectrum. Enlarge / US Rep. Frank Pallone, Jr. (D-N.J.), right, speaks as House Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) looks on during a hea.....»»
First observation of a focused plasma wave on the sun
For the first time, scientists have observed plasma waves from a solar flare focused by a coronal hole, akin to the focusing of sound waves responsible for the Rotunda effect in architecture or the focusing of light by a telescope or microscope......»»
iPhone should be rebranded, says the man behind the i prefix
The man responsible for the i prefix in Apple products says that the convention is now meaningless, and that the iPhone should be rebranded. That would see a change of name for the iPhone, iPad, and iMac – a transition which Apple accidentally b.....»»