Vulnerability in DJI drones may reveal pilot’s location
Serious security vulnerabilities have been identified in multiple DJI drones. These weaknesses had the potential to allow users to modify crucial drone identification details such as its serial number and even bypass security mechanisms that enable a.....»»
Vulnerability in Microsoft apps allowed hackers to spy on Mac users
A vulnerability found in Microsoft apps for macOS allowed hackers to spy on users. Security researchers from Cisco Talos reported in a blog post how the vulnerability could be exploited by attackers and what Microsoft has been doing to fix the explo.....»»
Windows 0-day was exploited by North Korea to install advanced rootkit
FudModule rootkit burrows deep into Windows, where it can bypass key security defenses. Enlarge (credit: Getty Images) A Windows zero-day vulnerability recently patched by Microsoft was exploited by hackers working on be.....»»
Common API security issues: From exposed secrets to unauthorized access
Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, wh.....»»
Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited.....»»
Critical Start helps organizations reduce cyber risk from vulnerabilities
Critical Start announced Critical Start Vulnerability Management Service (VMS) and Vulnerability Prioritization. These new offerings are a foundational pillar of Managed Cyber Risk Reduction, allowing organizations to assess, manage, prioritize, and.....»»
Pixel problems: Google"s security nightmare caused by hidden software
A vulnerability included in every version of Android for previous Google Pixel models will soon be patched, but Pixel 9 buyers don't need to worry.Google Pixel 9The majority of Google Pixel smartphones sold from September 2017 onward have included a.....»»
Physicists uncover new phenomena in fractional quantum Hall effects
Imagine a two-dimensional flatland, instead of our three-dimensional world, where the rules of physics are turned on their head and particles like electrons defy expectations to reveal new secrets. That's exactly what a team of researchers, including.....»»
Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
SolarWinds has fixed a critical vulnerability (CVE-2024-28986) in its Web Help Desk (WHD) solution that may allow attackers to run commands on the host machine. “While it was reported as an unauthenticated vulnerability, SolarWinds has been una.....»»
Rare butterfly only found on Pa. military base should be listed as endangered, feds say
The eastern subspecies of the regal fritillary butterfly, marked by orange forewings and dark hindwings, is found in only one location in North America and is threatened with extinction......»»
You’ve heard of NordVPN, but is it actually any good?
NordVPN is a popular solution to keep your location and privacy secure, so I went hands-on to test its speed, quality, and ease-of use......»»
Stonehenge"s Altar Stone origins reveal advanced ancient Britain
New research led by Curtin University has revealed Stonehenge's monumental six-ton Altar Stone, long believed to originate from Wales, actually hails from Scotland. The study titled "A Scottish Provenance for the Altar Stone of Stonehenge" was publis.....»»
AI, computation, and the folds of life: Supercomputers help train a software tool for the protein modeling community
Form follows function, and this is especially true for life's building blocks—proteins. The folds and shape of molecular proteins reveal their function in supporting life......»»
"Killer robots" are becoming a real threat in Africa
The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. In April, for example, Al Qaeda's affiliate in the Sahel, Jama'at Nusrat al Isl.....»»
Findings reveal eurypterids evolved giant size independently at least nine times
Sea scorpions, ancient predators that patrolled Earth's marine and freshwater habitats hundreds of millions of years ago, are the focus of a sizable scientific mystery......»»
Cricket physics: Wind tunnel experiments reveal why bowling with a near horizontal arm makes for tough batting
Key to winning a cricket match is tricking the other team's batters—no small feat, as bowlers bowl cricket balls nearly 100 miles per hour. In recent years, a bowling technique that has become popular involves keeping the arm almost entirely horizo.....»»
Chemical cocktail from plastics: Pilot study describes degradation and leaching process of plastic consumer products
Plastic waste in rivers and oceans is constantly releasing chemicals into the water. Until now, it was unknown how large these quantities are and which substances are released particularly strongly. In the large-scale P-LEACH project, experts from fo.....»»
Neutrons reveal the existence of local symmetry breaking in a Weyl semimetal
The first materials scientists might have been early humans who—through trial-and-error experiments—discovered the first "cutting-edge" technologies. They found that the best arrowheads and other tools could be made from certain types of natural,.....»»
Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited by attackers to grab users’ NTLM hashes, Microsoft has shared late last week. The vulnerability is exploitable remotely and requires no special privileges or user interact.....»»
Eco-conscious fashionistas hampered by geographical barriers to return clothing
Eco-conscious consumers are not well-served by clothing companies claiming green credentials, as shoppers' location has a major impact on the effectiveness of clothing return schemes, a new study reveals......»»
Apple Store Workers in Maryland reach ‘historic’ union contract with Apple [U: Approved]
After becoming the first Apple Store in the country to unionize back in June 2022, the retail employees at the Towson Town Center location have reached a “historic” union contract with Apple this week, providing numerous benefits to the workers......»»