Menu

Blog

Archive for the ‘security’ category: Page 48

Oct 14, 2022

New npm timing attack could lead to supply chain attacks

Posted by in category: security

Security researchers have discovered an npm timing attack that reveals the names of private packages so threat actors can release malicious clones publicly to trick developers into using them instead.

The attack relies on a small time difference in the return of a “404 Not Found” error when searching for a private compared to a non-existent package in the repository.

While the response time difference is only a few hundred milliseconds, it is enough to determine whether a private package exists to perform package impersonation attacks.

Oct 13, 2022

Signal will remove support for SMS text messages on Android

Posted by in categories: robotics/AI, security

Signal says it will start to phase out SMS and MMS message support from its Android app to streamline the user experience and prioritize security and privacy.

While this announcement may surprise those who don’t know Signal can also be used to manage this type of text message, the Signal for Android app could be configured as the default SMS/MMS app since its beginning as TextSecure, an app that used the Axolotl Ratchet protocol.

“We have now reached the point where SMS support no longer makes sense. In order to enable a more streamlined Signal experience, we are starting to phase out SMS support from the Android app,” the company said in a blog post published today.

Oct 10, 2022

World’s first AI-backed swing will provide top security to a retreat in the Himalayas

Posted by in categories: robotics/AI, security

Providing “impeccable” security at the intersection of innovation, technology, and adventure sports.

Adrenaline junkies, thrill seekers, and newbies, you might want to add experiencing a first-of-its-kind giant swing backed by Artificial Intelligence (AI) to your bucket list.


IStock/Adventure_Photo.

Continue reading “World’s first AI-backed swing will provide top security to a retreat in the Himalayas” »

Oct 8, 2022

Passwordless logins boost security for device and account access

Posted by in categories: robotics/AI, security

Learn how your company can create applications to automate tasks and generate further efficiencies through low-code/no-code tools on November 9 at the virtual Low-Code/No-Code Summit. Register here.

With the increasing digitization of services across multiple industries, large corporations are pushing for new security measures to keep their customers’ documents and sensitive information secure. Among these measures are passwordless logins, with new authentication methods adding an extra layer of data protection.

The transition to passwordless logins is undeniable, with approximately 60% of large and global enterprises and 90% of midsize enterprises predicted to adopt passwordless methods in at least 50% of use cases, according to a recent Gartner study. This comes as no surprise, as security problems associated with password-only authentication are among the digital world’s biggest vulnerabilities. Consumers are often tempted to reuse passwords across different services due to the difficulty of managing so many passwords.

Oct 7, 2022

Facebook Detects 400 Android and iOS Apps Stealing Users Log-in Credentials

Posted by in categories: robotics/AI, security

Meta security team has identified more than 400 malicious Android and iOS apps that have stolen users’ Facebook login credentials.

Oct 6, 2022

2 critical Remote code execution flaws in Qualcomm Chipsets affect billions of smartphones

Posted by in categories: mobile phones, security

Twelve new security flaws impacting various chipsets were disclosed in this month’s security advisory for Qualcomm’s devices, two of which have been given a critical severity rating. Two significant flaws in Qualcomm chipsets have been identified that might allow malicious payloads to installed remotely on the Android devices.

The first vulnerability, identified as CVE-2022–25748 (CVSS score 9.8), affects Qualcomm’s WLAN component and is described as a “Integer Overflow to Buffer Overflow during parsing GTK frames”. If exploited, this issue might result in memory corruption and remote code execution. This vulnerability impact all smart devices that use the Qualcomm Snapdragon APQ, CSRA, IPQ, MDM, MSM, QCA, WSA, WCN, WCD, SW, SM, SDX, SD, SA, QRB, QCS, QCN, and more series.

Continue reading “2 critical Remote code execution flaws in Qualcomm Chipsets affect billions of smartphones” »

Oct 6, 2022

3 critical malicious code execution vulnerabilities in Linux kernel

Posted by in categories: computing, security

A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerable computers and run arbitrary code. The roccat_report_event function in drivers/hid/hid-roccat.c has a use-after-free vulnerability identified as CVE-2022–41850 (CVSS score: 8.4). A local attacker might exploit this flaw to run malicious script on the system by submitting a report while copying a report->value. Patch has be released to addresses the Linux Kernel 5.19.12 vulnerability CVE-2022–41850.

The second flaw tracked as CVE-2022–41848 (CVSS score: 6.8), is also a use-after-free flaw due to a race condition between mgslpc_ioctl and mgslpc_detach in drivers/char/pcmcia/synclink_cs.c. By removing a PCMCIA device while calling ioctl, an attacker could exploit this vulnerability to execute arbitrary code on the system. The bug affects Linux Kernel 5.19.12 and was fixed via this patch.

Continue reading “3 critical malicious code execution vulnerabilities in Linux kernel” »

Oct 6, 2022

Achieving greater entanglement: Milestones on the path to useful quantum technologies

Posted by in categories: computing, information science, particle physics, quantum physics, security

Tiny particles are interconnected despite sometimes being thousands of kilometers apart—Albert Einstein called this “spooky action at a distance.” Something that would be inexplicable by the laws of classical physics is a fundamental part of quantum physics. Entanglement like this can occur between multiple quantum particles, meaning that certain properties of the particles are intimately linked with each other.

Entangled systems containing multiple offer significant benefits in implementing quantum algorithms, which have the potential to be used in communications, or quantum computing. Researchers from Paderborn University have been working with colleagues from Ulm University to develop the first programmable optical quantum memory. The study was published as an “Editor’s suggestion” in the Physical Review Letters journal.

Oct 4, 2022

Linux 6.0 kernel enhances security with Runtime Verification, improves CPU energy efficiency

Posted by in categories: business, computing, internet, security

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

The open-source Linux operating system is an essential component of the cloud and enterprise application delivery. In fact, every cloud service, even Microsoft, offers Linux-based compute resources and Linux is often the default choice for embedded and internet of things (IoT) devices. Among the major Linux distribution vendors today are IBM’s Red Hat business unit, German vendor SUSE and Canonical, which develops the Ubuntu Linux distribution.

The market for Linux is forecast to grow to $22.15 billion by 2029, according to Fortune Business Insights, up from $6.27 billion in 2022.

Oct 3, 2022

What Can Brain Scans Really Tell Us?

Posted by in categories: biotech/medical, finance, genetics, neuroscience, robotics/AI, security

Since the infancy of functional magnetic resonance imaging (fMRI) in 1990, people have been fascinated by the potential for brain scans to unlock the mysteries of the human mind, our behaviors and beliefs. Many breathtaking applications for brain scans have been devised, but hype often exceeds what empirical science can deliver. It’s time to ask: What’s the big picture of neuroscience and what are the limitations of brain scans?

The specific aims of any research endeavor depend on who you ask and what funding agency is involved, says Michael Spezio, associate professor of psychology, data science and neuroscience at Scripps College. Some people believe neuroscience has the potential to explain human cognition and behavior as a fully mechanistic process, ultimately debunking an “illusion of free will.” Not all neuroscientists agree that free will is a myth, but it’s a strong current these days. Neuroscience also has applications in finance, artificial intelligence, weapons research and national security.

For other researchers and funders, the specific aim of neuroscience involves focusing on medical imaging, genetics, the study of proteins (proteomics) and the study of neural connections (connectomics). As caring persons who are biological, neurological, physical, social and spiritual, we can use neuroscience to think carefully and understand our humanity and possible ways to escape some of the traps we’ve built for ourselves, says Spezio. Also, brain scans can enhance research into spirituality, mindfulness and theory of mind – the awareness of emotions, values, empathy, beliefs, intentions and mental states to explain or predict others’ behavior.

Page 48 of 146First4546474849505152Last