How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»
Porn VPN searches soar in Utah amid age verification bill
The move comes as Utah becomes the last US state to introduce mandatory age verification to access porn sites, causing a spike of interest in VPN services......»»
You can now use passkeys to sign into your Google Account
Google has spent the past several years working to replace passwords because of frequent reuse, vulnerability to data breaches, and phishing. Passkeys are the industry solution, and the ability to log in to your Google Account with them is starting.....»»
Attackers are trying to exploit old DVR vulnerabilities (CVE-2018-9995, CVE-2016-20016)
Five years ago, security researcher Fernandez Ezequiel discovered a vulnerability (CVE-2018-9995) in many digital video recorder (DVR) brands and released a tool for exploiting it. The vulnerability is still being exploited in the wild, FortiGuard La.....»»
A key safety executive at TikTok is leaving as lawmakers keep pressure on the app
TikTok is about to lose a key safety executive as the app faces growing pressure from lawmakers and threats of a ban in the United States......»»
Easily exploitable flaw in Oracle Opera could spell trouble for hotel chains (CVE-2023-21932)
A recently patched vulnerability (CVE-2023-21932) in Oracle Opera, a property management system widely used in large hotel and resort chains, is more critical than Oracle says it is and could be easily exploited by unauthenticated remote attackers to.....»»
Protein from a round worm may unlock a cellular "fountain of youth"
Working with tiny, nematode worms called C. elegans, a USask research team has identified a pair of genes responsible for clearing cells of the toxins which accumulate in the body and are responsible for aging. By inactivating genes called CCF-1 and.....»»
Microsoft has a new way to keep ChatGPT ethical, but will it work?
Microsoft shut down its AI ethics team in March, but the company says it’s still working on ways to keep ChatGPT and responsible and prevent further scandals......»»
Tenable report shows how generative AI is changing security research
A Tenable report reveals four ways researchers can use generative AI to enhance vulnerability analysis and debugging. A Tenable report reveals four ways researchers can use generative AI to enhance vulnerability analysis and debugging.Read More.....»»
EU lawmakers pass draft of AI Act, includes copyright rules for generative AI
After months of negotiations and two years after a draft rules were proposed, EU lawmakers have a draft of the Artificial Intelligence Act. After months of negotiations and two years after a draft rules were proposed, EU lawmakers have a draft of.....»»
Scientists find molecule responsible for the bright white coloring of Pacific cleaner shrimp
An international team of molecular chemists, physicists and nanomolecular scientists has found the molecule responsible for the bright, white-colored stripes sported by the Pacific cleaner shrimp. The study is published in Nature Photonics. Diederik.....»»
After years of silence, Apple finally reveals how many App Store users it has in Europe
The European Digital Services Act is about to be fully enforced, and as part of the law, Apple has been forced to disclose how many users it has in Europe for the first time in five years.European Union flagsAs part of its mandatory reporting for the.....»»
Rocket Report: Feds assess Starship fallout; Sweden accidentally bombs Norway
"It is crucial that those responsible immediately inform the relevant Norwegian authorities." Enlarge / NASA Administrator Bill Nelson announces the crew of Artemis II. Just kidding. Nelson is holding the Artemis I Snoopy zero g.....»»
GitHub introduces private vulnerability reporting for open source repositories
GitHub has announced that its private vulnerability reporting feature for open source repositories is now available to all project owners. General availability The private vulnerability reporting feature provides a direct collaboration channel that a.....»»
Lawmakers Want To Force Social Media Companies To Add Age Verification
Parental consent would be required for anyone under 18 to use social media, with a minimum age of 13 set for platform access. Parental consent would be required for.....»»
Forced water-use cuts made California more waterwise, finds research
After a drought-stricken California lifted a year of mandatory water-use cuts that were effective in 2015 and 2016, urban water use crept back up somewhat, but the overall lasting effect was a more waterwise Golden State, a University of California,.....»»
Eclypsium launches Supply Chain Security Platform with SBOM capability
Eclypsium released Supply Chain Security Platform, enabling an organization’s IT security and operations teams to continuously identify and monitor the bill of materials, integrity and vulnerability of components and system code in each device, pro.....»»
As Sea Levels Rise, the East Coast Is Also Sinking
Coastal lands are subsiding and losing elevation—a “hidden vulnerability” that’s making rising seas all the worse......»»
Dodging justice: Characteristics of repeat child sex offenders
Many crimes are obvious, with those responsible soon apprehended, but with most sexual abuse (including child sexual abuse) remaining unreported or undetected, Griffith University researchers have investigated the characteristics of repeat offenders.....»»
PoC exploit for abused PaperCut flaw is now public (CVE-2023-27350)
An unauthenticated RCE flaw (CVE-2023-27350) in widely-used PaperCut MF and NG print management software is being exploited by attackers to take over vulnerable application servers, and now there’s a public PoC exploit. About the vulnerability.....»»
Exploit released for 9.8-severity PaperCut flaw already under attack
Code-execution flaw was patched in March but doesn't seem to be widely installed. Enlarge (credit: Getty Images) Exploit code for a critical printer software vulnerability became publicly available on Monday in a release.....»»