How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»
U.S. lawmakers want to bar automakers from eliminating AM radio in new vehicles
The bill would direct NHTSA to issue regulations to mandate AM radio in new vehicles without additional charge. .....»»
Syam Nair joins Zscaler as CTO
Zscaler announced that Syam Nair has been appointed as the company’s Chief Technology Officer and EVP of Research and Development. In this role, Nair will be responsible for driving the research and development engines to expand Zscaler’s Zero Tr.....»»
Wemo won’t fix Smart Plug vulnerability allowing remote operation
Tricking a plug with a too-long name could lead to buffer overflows, injections. Enlarge / This guy? This guy can be tricked into offering remote control if you give it a long name. But he's too old for his maker to care much abo.....»»
Mr. ChatGPT goes to Washington: OpenAI CEO Sam Altman testifies before Congress on AI risks
OpenAI CEO Sam Altman urged lawmakers to regulate artificial intelligence during a Senate panel hearing Tuesday, describing the technology's current boom as a potential "printing press moment" but one that required safeguards......»»
Researchers find security flaw in Wemo Smart Plug, Belkin says it won’t release a patch
IoT security company Sternum has discovered a vulnerability in one of Belkin’s smart home devices. Read on for the details about how the Wemo Mini Smart Plug V2 flaw can be exploited for remote command execution and why Belkin has decided not to p.....»»
Mr. ChatGPT goes to Washington: OpenAI CEO Sam Altman set to testify before Congress
OpenAI CEO Sam Altman is set to testify before a Senate Judiciary subcommittee on Tuesday after the viral success of ChatGPT, his company's chatbot tool, renewed an arms race over artificial intelligence and sparked concerns from some lawmakers about.....»»
Study: Socio-economic development on the West African coast is a key factor for increasing flood risks
Anthropogenic factors on the West African coast are contributing more than global climate change to the rapid increase in vulnerability and flood risks in the region. This was demonstrated by an interdisciplinary IRD team, in collaboration with West.....»»
OneTrust enhances Trust Intelligence Platform to empower responsible data use
OneTrust announces new innovations across the Trust Intelligence Platform to help organizations responsibly use data and drive trust intelligence at scale. As companies tackle the challenges of data sprawl, OneTrust’s enhancements provide compa.....»»
“Meaningful harm” from AI necessary before regulation, says Microsoft exec
"Did anybody suffer at least a thousand dollars' worth of damage" because of AI? Enlarge (credit: HJBC | iStock Editorial / Getty Images Plus) As lawmakers worldwide attempt to understand how to regulate rapidly advancin.....»»
Check Point expands Harmony Endpoint with automated patch management capabilities
Check Point has expanded its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vu.....»»
OpenAI CEO Sam Altman to testify before Congress
OpenAI CEO Sam Altman will testify before Congress next Tuesday as lawmakers increasingly scrutinize the risks and benefits of artificial intelligence, according to a Senate Judiciary subcommittee......»»
Codenotary partners with Snyk to ensure the integrity and security of the entire software supply chain
Codenotary and Snyk alliance agreement provides enhanced security and trust for the modern development organization seeking to assure that only known and trusted artifacts are used in software builds. Vulnerability scanners are widely used by organiz.....»»
TikTok patches security flaw that could leave your activity open to anyone
TikTok collaborates with security researchers to fix a worrying security vulnerability......»»
Researchers identify a new protein that controls the production of strawberries" red color
A research group at the University of Cordoba characterizes a new transcription factor that regulates, during the ripening of strawberries, the production of anthocyanins responsible for giving them their red hue......»»
The Voting Rights Act"s impact on Black representation in local government
When the Voting Rights Act was signed into law in 1965, it didn't just enfranchise Black voters in the American South. It also led to greater representation of Black lawmakers in local government, according to a new paper published in the April 2023.....»»
Your voice could be your biggest vulnerability
AI technology is fueling a rise in online voice scams, with just three seconds of audio required to clone a person’s voice, according to McAfee. McAfee surveyed 7,054 people from seven countries and found that a quarter of adults had previously exp.....»»
Critical RCE vulnerability in Cisco phone adapters, no update available (CVE-2023-20126)
Cisco has revealed the existence of a critical vulnerability (CVE-2023-20126) in the web-based management interface of Cisco SPA112 2-Port Phone Adapters. The adapters are widely used to integrate analog phones into VoIP networks without the need for.....»»
Colorado cements plan to reintroduce gray wolves but a snag lingers
Colorado's plan to capture and release dozens of wolves into the Western Slope's wilderness is now finalized, though the timeline might suffer thanks to a bill proposed by the region's lawmakers......»»
Intruder launches continuous attack surface monitoring for SMBs
Intruder has launched its continuous attack surface monitoring capabilities. The company’s new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency of external attac.....»»
Amazon Inspector allows search of its vulnerability intelligence database
Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure across your entire organization. Upon activation, Amazon Inspector automatically detects a.....»»