Advertisements


Serious vulnerabilities in Matrix’s end-to-end encryption are being patched

Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages. Enlarge (credit: matrix.org) Developers of the open source Matrix messenger protocol are releasing an update on Thursday to fix critical en.....»»

Category: topSource:  arstechnicaSep 28th, 2022

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews......»»

Category: topSource:  marketingvoxRelated NewsJul 8th, 2024

ChatGPT for Mac app logged queries in an unencrypted file before getting caught

Apple has strict guidelines about protecting user data with sandboxing, but ChatGPT for Mac bypassed all of this by storing conversations in plain text until it was patched on June 28.ChatGPT for MacWhen everything is working the way it should on Mac.....»»

Category: appleSource:  appleinsiderRelated NewsJul 3rd, 2024

Proton Docs brings end-to-end encryption to online document editing

If you’ve been dreaming about an end-to-end encrypted alternative to Google Docs and Microsoft 365, your wish has just been granted. Swiss software developer Proton … The post Proton Docs brings end-to-end encryption to online document ed.....»»

Category: gadgetSource:  bgrRelated NewsJul 3rd, 2024

Proton Drive gets collaborative Docs with end-to-end encryption and no AI training

After gaining private and secure photo backup in iOS and advanced file sharing earlier this year, Proton Drive is gaining its latest capability. Collaborative Docs brings all the handy features you want while retaining end-to-end encryption and preve.....»»

Category: gadgetSource:  9to5macRelated NewsJul 3rd, 2024

Vulnerabilities found in Swift repository left millions of iPhone apps exposed

The open-source Swift and Objective-C repository, CocoaPods, had multiple vulnerabilities that left millions of iOS and macOS apps exposed to potential attacks for a decade, but it is now patched.CocoaPods leave millions of iOS and macOS apps vulnera.....»»

Category: appleSource:  appleinsiderRelated NewsJul 3rd, 2024

Scientists achieve first intercity quantum key distribution with deterministic single-photon source

Conventional encryption methods rely on complex mathematical algorithms and the limits of current computing power. However, with the rise of quantum computers, these methods are becoming increasingly vulnerable, necessitating quantum key distribution.....»»

Category: topSource:  physorgRelated NewsJul 3rd, 2024

Cryptographers Are Discovering New Rules for Quantum Encryption

Researchers have proved that secure quantum encryption is possible in a world without hard problems, establishing a new foundation for what is needed to keep information secure......»»

Category: gadgetSource:  wiredRelated NewsJul 3rd, 2024

3 million iOS and macOS apps were exposed to potent supply-chain attacks

Apps that used code libraries hosted on CocoaPods were vulnerable for about 10 years. Enlarge (credit: Aurich Lawson) Vulnerabilities that went undetected for a decade left thousands of macOS and iOS apps susceptible to.....»»

Category: topSource:  arstechnicaRelated NewsJul 3rd, 2024

Lack of skills and budget slow zero-trust implementation

The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study surveyed over 4,000 IT security practitioners worldwide. The survey shows that pe.....»»

Category: securitySource:  netsecurityRelated NewsMay 31st, 2024

Using entangled particles to create unbreakable encryption

The discovery of quantum mechanics opened the door to fundamentally new ways of communicating, processing, and protecting data. With a quantum revolution well underway, long unimaginable opportunities are coming within our reach......»»

Category: topSource:  physorgRelated NewsMay 30th, 2024

NIST says NVD will be back on track by September 2024

The National Institute of Standards and Technology (NIST) has awarded a contract for an unnamed company/organization to help them process incoming Common Vulnerabilities and Exposures (CVEs) for inclusion in the National Vulnerability Database (NVD),.....»»

Category: securitySource:  netsecurityRelated NewsMay 30th, 2024

PoC exploits for critical FortiSIEM command execution flaws released (CVE-2024-23108, CVE-2023-34992)

Horizon3.ai researches have released proof-of-concept (PoC) exploits for CVE-2024-23108 and CVE-2023-34992, vulnerabilities that allow remote, unauthenticated command execution as root on certain Fortinet FortiSIEM appliances. CVE confusion FortiSIEM.....»»

Category: securitySource:  netsecurityRelated NewsMay 29th, 2024

RansomLord: Open-source anti-ransomware exploit tool

RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I created RansomLord to demonstrate ransomware is not invincible, has vulnerabilities and its developers make mista.....»»

Category: securitySource:  netsecurityRelated NewsMay 29th, 2024

The evolution of security metrics for NIST CSF 2.0

CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities.....»»

Category: securitySource:  netsecurityRelated NewsMay 28th, 2024

Cybersecurity teams gear up for tougher challenges in 2024

In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored.....»»

Category: securitySource:  netsecurityRelated NewsMay 28th, 2024

This shark self-emptying robot vacuum is $100 off for Memorial Day

Self-emptying robot vacuums are great, and this early Memorial Day deal on the Shark Matrix knocks $100 off the usual price......»»

Category: topSource:  digitaltrendsRelated NewsMay 26th, 2024

Newly discovered ransomware uses BitLocker to encrypt victim data

ShrinkLocker is the latest ransomware to use Windows' full-disk encryption. A previously unknown piece of ransomware, dubbed ShrinkLocker, encrypts victim data using the BitLocker feature built into the Windows operating system. BitL.....»»

Category: topSource:  arstechnicaRelated NewsMay 25th, 2024

The Artificial Intelligence Era Faces a Threat from Directed Energy Weapons

Autonomous and AI-enabled systems increasingly rely on optical and radio frequency sensors and significant computer power. They face growing vulnerabilities from directed-energy laser and microwave weapons.....»»

Category: scienceSource:  sciamRelated NewsMay 24th, 2024

Little Snitch visualization makes it easier to monitor Mac network traffic

The popular security utility Little Snitch, which monitors Mac network traffic for suspicious activity, has been updated to a much more modern interface, with a whole range of new features. Key among these is DNS encryption, which shields server n.....»»

Category: gadgetSource:  9to5macRelated NewsMay 23rd, 2024

Proteins modified in lungs offer clues to biological functions of bromine

Researchers at the Center for Research on Redox Processes in Biomedicine (Redoxome) in Brazil have identified extracellular matrix proteins modified by the action of hypobromous acid in normal and fibrotic lung tissues, suggesting a possible physiolo.....»»

Category: topSource:  physorgRelated NewsMay 22nd, 2024