Advertisements


How EU lawmakers can make mandatory vulnerability disclosure responsible

There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»

Category: securitySource:  netsecurityAug 21st, 2023

“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux

Full system compromise possible by peppering servers with thousands of connection requests. Enlarge Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that can be exploited to g.....»»

Category: topSource:  arstechnicaRelated NewsJul 3rd, 2024

Micro LED monitors connect like puzzle pieces in HP multi-monitor concept

Concept "can be applied to any panel type technology without a backlight." Enlarge / Yes, there are bigger monitors, but is there a better way to have a tri-monitor setup? (credit: Getty) In a technical disclosure publ.....»»

Category: topSource:  arstechnicaRelated NewsJun 1st, 2024

Federal agency warns critical Linux vulnerability being actively exploited

Cybersecurity and Infrastructure Security Agency urges affected users to update ASAP. Enlarge (credit: Getty Images) The US Cybersecurity and Infrastructure Security Agency has added a critical security bug in Linux to i.....»»

Category: topSource:  arstechnicaRelated NewsMay 31st, 2024

Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919)

Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for local accounts, which they then used to move laterally in the target organizations’ network. &.....»»

Category: securitySource:  netsecurityRelated NewsMay 31st, 2024

Understanding how zwitterionic polymers can lead to safer drugs and disease prevention

Proteins are vital biomolecules responsible for performing various functions in the human body and are thus regarded as the workhorses of a cell. The primary structure of a protein is composed of different amino acids coming together. The structure s.....»»

Category: topSource:  physorgRelated NewsMay 30th, 2024

NIST says NVD will be back on track by September 2024

The National Institute of Standards and Technology (NIST) has awarded a contract for an unnamed company/organization to help them process incoming Common Vulnerabilities and Exposures (CVEs) for inclusion in the National Vulnerability Database (NVD),.....»»

Category: securitySource:  netsecurityRelated NewsMay 30th, 2024

Study shows transgenic expression of rubisco factors increases photosynthesis and chilling tolerance in maize

Maize is one of the world's most widely grown crops and is essential to global food security. But like other plants, its growth and productivity can be limited by the slow activity of Rubisco, the enzyme responsible for carbon assimilation during pho.....»»

Category: topSource:  physorgRelated NewsMay 28th, 2024

Viewpoint: Banning sex crime offenders from changing their names doesn"t make us safer

The government of British Columbia recently introduced a bill to ban people convicted of serious offenses from legally changing their name. The proposed amendment to the province's Name Act would also prohibit those found not criminally responsible d.....»»

Category: topSource:  marketingvoxRelated NewsMay 27th, 2024

Over 300 million young people have experienced online sexual abuse, exploitation, finds metastudy

It takes a lot to shock Kelvin Lay. My friend and colleague was responsible for setting up Africa's first dedicated child exploitation and human trafficking units, and for many years he was a senior investigating officer for the Child Exploitation On.....»»

Category: topSource:  marketingvoxRelated NewsMay 27th, 2024

Study shows relatively low number of superspreaders responsible for large portion of misinformation on Twitter

A small team of social media analysts at Indiana University has found that a major portion of tweets spreading disinformation are sent by a surprisingly small percentage of a given userbase......»»

Category: topSource:  marketingvoxRelated NewsMay 27th, 2024

Taiwan president extends goodwill after China drills, US lawmakers arrive

Taiwan president extends goodwill after China drills, US lawmakers arrive.....»»

Category: topSource:  informationweekRelated NewsMay 26th, 2024

Apple Location Services vulnerability can enable troop movements to be tracked

Security researchers report that a key element of Apple Location Services contains what they call “a really serious privacy vulnerability” that allowed troop movements to be tracked. The issue could also allow an attacker to work out the locat.....»»

Category: gadgetSource:  9to5macRelated NewsMay 24th, 2024

Google fixes yet another Chrome zero-day exploited in the wild (CVE-2024-5274)

For the eighth time this year, Google has released an emergency update for its Chrome browser that fixes a zero-day vulnerability (CVE-2024-5274) with an in-the-wild exploit. About CVE-2024-5274 As per usual, Google keeps technical details of the vul.....»»

Category: securitySource:  netsecurityRelated NewsMay 24th, 2024

El Nino not responsible for East Africa floods: Scientists

The El Niño weather pattern did not have "any influence" on widespread flooding that killed hundreds in East Africa this year, an expert group of scientists said Friday......»»

Category: topSource:  pcmagRelated NewsMay 24th, 2024

HHS pledges $50M for autonomous vulnerability management solution for hospitals

As organizations in the healthcare sector continue to be a prime target for ransomware gangs and CISA warns about a vulnerability (CVE-2023-43208) in a healthcare-specific platform being leveraged by attackers, the Advanced Research Projects Agency f.....»»

Category: securitySource:  netsecurityRelated NewsMay 23rd, 2024

GitHub fixes maximum severity Enterprise Server auth bypass bug (CVE-2024-4985)

A critical, 10-out-of-10 vulnerability (CVE-2024-4985) allowing unrestricted access to vulnerable GitHub Enterprise Server (GHES) instances has been fixed by Microsoft-owned GitHub. Fortunately, there is a catch that may narrow down the pool of poten.....»»

Category: securitySource:  netsecurityRelated NewsMay 23rd, 2024

Genetic mutation responsible for new coat pattern in cats in Finland identified

A team of geneticists and animal welfare specialists from the U.K. and one from the U.S. has identified the genetic mutation responsible for a newly discovered cat coat color pattern in Finland. In their study, published in the journal Animal Genetic.....»»

Category: topSource:  physorgRelated NewsMay 23rd, 2024

Lawmakers say Section 230 repeal will protect children—opponents predict chaos

Repeal bill is bipartisan but has opponents from across the political spectrum. Enlarge / US Rep. Frank Pallone, Jr. (D-N.J.), right, speaks as House Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) looks on during a hea.....»»

Category: topSource:  informationweekRelated NewsMay 22nd, 2024

First observation of a focused plasma wave on the sun

For the first time, scientists have observed plasma waves from a solar flare focused by a coronal hole, akin to the focusing of sound waves responsible for the Rotunda effect in architecture or the focusing of light by a telescope or microscope......»»

Category: topSource:  theglobeandmailRelated NewsMay 22nd, 2024

iPhone should be rebranded, says the man behind the i prefix

The man responsible for the i prefix in Apple products says that the convention is now meaningless, and that the iPhone should be rebranded. That would see a change of name for the iPhone, iPad, and iMac – a transition which Apple accidentally b.....»»

Category: topSource:  marketingvoxRelated NewsMay 21st, 2024