Archive for the ‘security’ category: Page 56
May 28, 2022
‘Privacy’ Search Engine DuckDuckGo Smoked Over Hidden Tracking Agreement With Microsoft
Posted by Saúl Morales Rodriguéz in category: security
ZeroHedge — On a long enough timeline, the survival rate for everyone drops to zero.
DuckDuckGo, the search engine which claims to offer ‘real privacy’ because it doesn’t track searches or store users’ history, has come under fire after a security researcher discovered that the mobile DuckDuckGo browser app contains a third-party tracker from Microsoft.
Researcher Zach Edwards found that while Google and Facebook’s trackers are blocked, trackers related to bing.com and linkedin.com were also being allowed through.
May 28, 2022
Neural network-based prediction of the secret-key rate of quantum key distribution
Posted by Dan Kummer in categories: quantum physics, robotics/AI, security
For instance, continuous-variable (CV) QKD has its own distinct advantages at a metropolitan distance36,37 due to the use of common components of coherent optical communication technology. In addition, the homodyne38 or heterodyne39 measurements used by CV-QKD have inherent extraordinary spectral filtering capabilities, which allows the crosstalk in wavelength division multiplexing (WDM) channels to be effectively suppressed. Therefore, hundreds of QKD channels may be integrated into a single optical fiber and can be cotransmitted with classic data channels. This allows QKD channels to be more effectively integrated into existing communication networks. In CV-QKD, discrete modulation technology has attracted much attention31,40,41,42,43,44,45,46,47,48,49,50 because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods43,44,45,46,47,48,51.
Unfortunately, calculating a secure key rate by numerical methods requires minimizing a convex function over all eavesdropping attacks related with the experimental data52,53. The efficiency of this optimization depends on the number of parameters of the QKD protocol. For example, in discrete modulation CV-QKD, the number of parameters is generally \(1000–3000\) depending on the different choices of cutoff photon numbers44. This leads to the corresponding optimization possibly taking minutes or even hours51. Therefore, it is especially important to develop tools for calculating the key rate that are more efficient than numerical methods.
In this work, we take the homodyne detection discrete-modulated CV-QKD44 as an example to construct a neural network capable of predicting the secure key rate for the purpose of saving time and resource consumption. We apply our neural network to a test set obtained at different excess noises and distances. Excellent accuracy and time savings are observed after adjusting the hyperparameters. Importantly, the predicted key rates are highly likely to be secure. Note that our method is versatile and can be extended to quickly calculate the complex secure key rates of various other unstructured quantum key distribution protocols. Through some open source deep learning frameworks for on-device inference, such as TensorFlow Lite54, our model can also be easily deployed on devices at the edge of the network, such as mobile devices, embedded Linux or microcontrollers.
May 28, 2022
Microsoft finds severe bugs in Android apps from large mobile providers
Posted by Genevieve Klien in category: security
Microsoft security researchers have found high severity vulnerabilities in a framework used by Android apps from multiple large international mobile service providers.
The researchers found these vulnerabilities (tracked as CVE-2021–42598, CVE-2021–42599, CVE-2021–42600, and CVE-2021–42601) in a mobile framework owned by mce Systems exposing users to command injection and privilege escalation attacks.
The vulnerable apps have millions of downloads on Google’s Play Store and come pre-installed as system applications on devices bought from affected telecommunications operators, including AT&T, TELUS, Rogers Communications, Bell Canada, and Freedom Mobile.
May 28, 2022
Taiwan is worried about the security of its chip industry
Posted by Kelvin Dafiaghor in categories: computing, security
May 25, 2022
Screencastify Chrome extension flaws allow webcam hijacks
Posted by Genevieve Klien in category: security
The popular Screencastify Chrome extension has fixed a vulnerability that allowed malicious sites to hijack users’ webcams and steal recorded videos. However, security flaws still exist that could be exploited by unscrupulous insiders.
The vendor acknowledged the cross-site scripting (XSS) vulnerability and promptly fixed it after security researcher Wladimir Palant reported it responsibly on February 14, 2022.
However, the same privacy and security-related risks remain unaddressed, keeping users at potential risk from websites that partner with the Screencastify platform.
May 19, 2022
Holographic Chocolates Look As Beautiful As They Taste
Posted by Quinn Sena in categories: holograms, security
Circa 2014
For most of us, even one bite of chocolate is enough to send our taste buds into ecstasy. Now, scientists have concocted a process to make these dark, dulcet morsels look as decadent as they taste.
Switzerland-based company Morphotonix has given traditional Swiss chocolate-making a colorful twist: It’s devised a method to imprint shiny holograms onto the sweet surfaces — sans harmful additives. Which means when you tilt the goodies from side to side, rainbow stars and swirly patterns on the chocolate’s surface dance and shimmer in the light.
Continue reading “Holographic Chocolates Look As Beautiful As They Taste” »
May 19, 2022
Canada to ban China’s Huawei, ZTE from 5G networks
Posted by Muhammad Furqan in categories: government, internet, security
Canada’s government said it would ban the use of the two Chinese telecommunications giants’ 5G gear due to national security concerns. The move follows similar bans in other Western countries.
May 18, 2022
New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack
Posted by Saúl Morales Rodriguéz in category: security
A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.
The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.
May 13, 2022
NVIDIA has open-sourced its Linux GPU kernel drivers
Posted by Genevieve Klien in categories: computing, security, sustainability, transportation
NVIDIA has published the source code of its Linux kernel modules for the R515 driver, allowing developers to provide greater integration, stability, and security for Linux distributions.
The source code has been published to NVIDIA’s GitHub repository under a dual licensing model that combines the GPL and MIT licenses, making the modules legally re-distributable.
The products supported by these drivers include all models built on the Turing and Ampere architecture, released after 2018, including the GeForce 30 and GeForce 20 series, the GTX 1,650 and 1,660, and data center-grade A series, Tesla, and Quadro RTX.