Messenger billed as better than Signal is riddled with vulnerabilities
Threema comes with unusually strong claims. They crumble under new research findings. Enlarge (credit: Getty Images) Academic researchers have discovered serious vulnerabilities in the core of Threema, an instant messeng.....»»
WhatsApp could soon let you directly message other apps like Signal
WhatsApp could soon let you directly message other apps like Signal.....»»
Gulls swap natural for urban habitats, machine-learning study finds
A recent study published in Ecological Informatics by a team of University of Alaska Fairbanks researchers has used artificial intelligence to further illuminate a habitat swap among short-billed gulls......»»
Meta relents to EU, allows unlinking of Facebook and Instagram accounts
New standalone Messenger, Marketplace, and Gaming apps coming to the EU, too. Enlarge (credit: Anadolu / Contributor | Anadolu) Meta will allow some Facebook and Instagram users to unlink their accounts as part of the pl.....»»
Researchers observe how the flexibility of a protein hinge is crucial to the transfer of cell proteins
Ubiquitination—the addition of the protein ubiquitin—is a key stage in many cell processes, such as protein degradation, DNA repairs, and signal transduction. Using high-speed atomic force microscopy (HS-AFM) and molecular modeling, researchers l.....»»
New UEFI vulnerabilities send firmware devs industry wide scrambling
PixieFail is a huge deal for cloud and data centers. For the rest, less so. Enlarge (credit: Nadezhda Kozhedub) UEFI firmware from five of the leading suppliers contains vulnerabilities that allow attackers with a toehol.....»»
New UEFI vulnerabilities send firmware devs across an entire ecosystem scrambling
PixieFail is a huge deal for cloud and data centers. For the rest, less so. Enlarge (credit: Nadezhda Kozhedub) UEFI firmware from five of the leading suppliers contains vulnerabilities that allow attackers with a toehol.....»»
Google fixes actively exploited Chrome zero-day (CVE-2024-0519)
In the new stable release of the Chrome browser, Google has fixed three security vulnerabilities affecting the V8 engine, including one zero-day (CVE-2024-0519) with an existing exploit. About CVE-2024-0519 V8 is an open-source JavaScript and WebAsse.....»»
Accenture and SandboxAQ offer protection against quantum-based decryption attacks
Accenture and SandboxAQ are partnering to deliver AI and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent Accenture research, executives’ top concern for 2024 is the ability.....»»
Famous xkcd comic comes full circle with AI bird-identifying binoculars
Swarovski AX Visio, billed as first "smart binoculars," names species and tracks location. Enlarge / The Swarovski Optik Visio binoculars, with an excerpt of a 2014 xkcd comic strip called "Tasks" in the corner. (credit: xckd / S.....»»
“Such signal, much wow”: Starlink’s first texts via “cellphone towers in space”
Starlink's Direct to Cell satellites to fill in dead spots in T-Mobile network. Enlarge / Starlink satellites with direct-to-cell capability. (credit: SpaceX) SpaceX is showing off the first text messages sent between T.....»»
Impact Craters: Can they help us find life elsewhere?
When we look at the moon, either through a pair of binoculars, a telescope, or past footage from the Apollo missions, we see a landscape that's riddled with what appear to be massive sinkholes. But these "sinkholes" aren't just on the moon, as they a.....»»
Ivanti Connect Secure zero-days exploited by attackers (CVE-2023-46805, CVE-2024-21887)
Two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti Connect Secure VPN devices are under active exploitation by unknown attackers, Volexity researchers have discovered. Patches for these flaws are currently unavailable, but the ri.....»»
Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks
Organizations using Ivanti Connect Secure should take action at once. Enlarge (credit: Getty Images) Unknown threat actors are actively targeting two critical zero-day vulnerabilities that allow them to bypass two-factor.....»»
Even wireless tools aren"t safe from ransomware attacks
Researchers found multiple vulnerabilities on intranet-connected wrenches......»»
Top LLM vulnerabilities and how to mitigate the associated risk
As large language models (LLMs) become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. But this uncertainty doesn’t mean progress should grind to a halt: Exploring AI is essential to staying competitive, m.....»»
Silex Technology AMC Protect improves cybersecurity for critical devices
Silex Technology announced their new protection service product offering called AMC Protect, a robust software management service designed to monitor and remedy vulnerabilities. AMC Protect targets customers utilizing Silex’s embedded wireless.....»»
Attackers could use vulnerabilities in Bosch Rexroth nutrunners to disrupt automotive production
Researchers have discovered over two dozen vulnerabilities in “smart” cordless nutrunners (i.e., pneumatic torque wrenches) manufactured by Bosch Rexroth that could be exploited to make the devices inoperable or their output unreliable. &.....»»
Microsoft fixes critical flaws in Windows Kerberos, Hyper-V (CVE-2024-20674, CVE-2024-20700)
For January 2024 Patch Tuesday, Microsoft has released fixes for 49 CVE-numbered vulnerabilities, two of which are critical: CVE-2024-20674 and CVE-2024-20700. None of the vulnerabilities fixed this time aroundare under active exploitation or have be.....»»
EcoFlow Delta Pro Ultra is a smart hybrid whole-house battery generator
The EcoFlow Delta Pro Ultra is billed as the world's first smart hybrid whole-home battery generator, making it perfect for sudden power outages.A residential power backup system, the EcoFlow Delta Pro Ultra is intended to handle both extended outage.....»»
Hackers can infect network-connected wrenches to install ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»