Advertisements


How EU lawmakers can make mandatory vulnerability disclosure responsible

There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»

Category: securitySource:  netsecurityAug 21st, 2023

Porn VPN searches soar in Utah amid age verification bill

The move comes as Utah becomes the last US state to introduce mandatory age verification to access porn sites, causing a spike of interest in VPN services......»»

Category: topSource:  pcmagRelated NewsMay 3rd, 2023

You can now use passkeys to sign into your Google Account

Google has spent the past several years working to replace passwords because of frequent reuse, vulnerability to data breaches, and phishing. Passkeys are the industry solution, and the ability to log in to your Google Account with them is starting.....»»

Category: topSource:  theglobeandmailRelated NewsMay 3rd, 2023

Attackers are trying to exploit old DVR vulnerabilities (CVE-2018-9995, CVE-2016-20016)

Five years ago, security researcher Fernandez Ezequiel discovered a vulnerability (CVE-2018-9995) in many digital video recorder (DVR) brands and released a tool for exploiting it. The vulnerability is still being exploited in the wild, FortiGuard La.....»»

Category: securitySource:  netsecurityRelated NewsMay 3rd, 2023

A key safety executive at TikTok is leaving as lawmakers keep pressure on the app

TikTok is about to lose a key safety executive as the app faces growing pressure from lawmakers and threats of a ban in the United States......»»

Category: topSource:  cnnRelated NewsMay 3rd, 2023

Easily exploitable flaw in Oracle Opera could spell trouble for hotel chains (CVE-2023-21932)

A recently patched vulnerability (CVE-2023-21932) in Oracle Opera, a property management system widely used in large hotel and resort chains, is more critical than Oracle says it is and could be easily exploited by unauthenticated remote attackers to.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2023

Protein from a round worm may unlock a cellular "fountain of youth"

Working with tiny, nematode worms called C. elegans, a USask research team has identified a pair of genes responsible for clearing cells of the toxins which accumulate in the body and are responsible for aging. By inactivating genes called CCF-1 and.....»»

Category: topSource:  physorgRelated NewsMay 2nd, 2023

Microsoft has a new way to keep ChatGPT ethical, but will it work?

Microsoft shut down its AI ethics team in March, but the company says it’s still working on ways to keep ChatGPT and responsible and prevent further scandals......»»

Category: topSource:  digitaltrendsRelated NewsMay 2nd, 2023

Tenable report shows how generative AI is changing security research 

A Tenable report reveals four ways researchers can use generative AI to enhance vulnerability analysis and debugging. A Tenable report reveals four ways researchers can use generative AI to enhance vulnerability analysis and debugging.Read More.....»»

Category: topSource:  venturebeatRelated NewsApr 30th, 2023

EU lawmakers pass draft of AI Act, includes copyright rules for generative AI

After months of negotiations and two years after a draft rules were proposed, EU lawmakers have a draft of the Artificial Intelligence Act. After months of negotiations and two years after a draft rules were proposed, EU lawmakers have a draft of.....»»

Category: topSource:  venturebeatRelated NewsApr 30th, 2023

Scientists find molecule responsible for the bright white coloring of Pacific cleaner shrimp

An international team of molecular chemists, physicists and nanomolecular scientists has found the molecule responsible for the bright, white-colored stripes sported by the Pacific cleaner shrimp. The study is published in Nature Photonics. Diederik.....»»

Category: topSource:  physorgRelated NewsApr 28th, 2023

After years of silence, Apple finally reveals how many App Store users it has in Europe

The European Digital Services Act is about to be fully enforced, and as part of the law, Apple has been forced to disclose how many users it has in Europe for the first time in five years.European Union flagsAs part of its mandatory reporting for the.....»»

Category: appleSource:  appleinsiderRelated NewsApr 28th, 2023

Rocket Report: Feds assess Starship fallout; Sweden accidentally bombs Norway

"It is crucial that those responsible immediately inform the relevant Norwegian authorities." Enlarge / NASA Administrator Bill Nelson announces the crew of Artemis II. Just kidding. Nelson is holding the Artemis I Snoopy zero g.....»»

Category: topSource:  arstechnicaRelated NewsApr 28th, 2023

GitHub introduces private vulnerability reporting for open source repositories

GitHub has announced that its private vulnerability reporting feature for open source repositories is now available to all project owners. General availability The private vulnerability reporting feature provides a direct collaboration channel that a.....»»

Category: securitySource:  netsecurityRelated NewsApr 27th, 2023

Lawmakers Want To Force Social Media Companies To Add Age Verification

Parental consent would be required for anyone under 18 to use social media, with a minimum age of 13 set for platform access. Parental consent would be required for.....»»

Category: gadgetSource:  slashgearRelated NewsApr 27th, 2023

Forced water-use cuts made California more waterwise, finds research

After a drought-stricken California lifted a year of mandatory water-use cuts that were effective in 2015 and 2016, urban water use crept back up somewhat, but the overall lasting effect was a more waterwise Golden State, a University of California,.....»»

Category: topSource:  pcmagRelated NewsApr 26th, 2023

Eclypsium launches Supply Chain Security Platform with SBOM capability

Eclypsium released Supply Chain Security Platform, enabling an organization’s IT security and operations teams to continuously identify and monitor the bill of materials, integrity and vulnerability of components and system code in each device, pro.....»»

Category: securitySource:  netsecurityRelated NewsApr 26th, 2023

As Sea Levels Rise, the East Coast Is Also Sinking

Coastal lands are subsiding and losing elevation—a “hidden vulnerability” that’s making rising seas all the worse......»»

Category: gadgetSource:  wiredRelated NewsApr 26th, 2023

Dodging justice: Characteristics of repeat child sex offenders

Many crimes are obvious, with those responsible soon apprehended, but with most sexual abuse (including child sexual abuse) remaining unreported or undetected, Griffith University researchers have investigated the characteristics of repeat offenders.....»»

Category: topSource:  physorgRelated NewsApr 26th, 2023

PoC exploit for abused PaperCut flaw is now public (CVE-2023-27350)

An unauthenticated RCE flaw (CVE-2023-27350) in widely-used PaperCut MF and NG print management software is being exploited by attackers to take over vulnerable application servers, and now there’s a public PoC exploit. About the vulnerability.....»»

Category: securitySource:  netsecurityRelated NewsApr 25th, 2023

Exploit released for 9.8-severity PaperCut flaw already under attack

Code-execution flaw was patched in March but doesn't seem to be widely installed. Enlarge (credit: Getty Images) Exploit code for a critical printer software vulnerability became publicly available on Monday in a release.....»»

Category: topSource:  arstechnicaRelated NewsApr 25th, 2023