Blog

Archive for the ‘security’ category: Page 58

Apr 11, 2022

GitHub can now alert of supply-chain bugs in new dependencies

Posted by in category: security

GitHub can now block and alert you of pull requests that introduce new dependencies impacted by known supply chain vulnerabilities.

This is achieved by adding the new Dependency Review GitHub Action to an existing workflow in one of your projects. You can do it through your repository’s Actions tab under Security or straight from the GitHub Marketplace.

It works with the help of an API endpoint that will help you understand the security impact of dependency changes before adding them to your repository at every pull request.

Apr 10, 2022

Responsible AI in a Global Context

Posted by in categories: business, economics, governance, policy, robotics/AI, security

CSIS will host a public event on responsible AI in a global context, featuring a moderated discussion with Julie Sweet, Chair and CEO of Accenture, and Brad Smith, President and Vice Chair of the Microsoft Corporation, on the business perspective, followed by a conversation among a panel of experts on the best way forward for AI regulation. Dr. John J. Hamre, President and CEO of CSIS, will provide welcoming remarks.

Keynote Speakers:
Brad Smith, President and Vice Chair, Microsoft Corporation.
Julie Sweet, Chair and Chief Executive Officer, Accenture.

Continue reading “Responsible AI in a Global Context” »

Apr 10, 2022

Warning for Samsung users as pre-installed app could let hacker control phone

Posted by in categories: mobile phones, security

MILLIONS of owners of the Samsung Galaxy smartphone face a security threat.

Those with an Android version 9 through 12 are at risk.

Researchers at Kryptowire published a report detailing how they discovered a serious vulnerability in the pre-installed Phone app across multiple models that could enable a hacker to take control of someone’s phone, Forbes reported.

Apr 10, 2022

Artificial intelligence is already upending geopolitics

Posted by in categories: biotech/medical, ethics, law, nanotechnology, robotics/AI, security

The TechCrunch Global Affairs Project examines the increasingly intertwined relationship between the tech sector and global politics.

Geopolitical actors have always used technology to further their goals. Unlike other technologies, artificial intelligence (AI) is far more than a mere tool. We do not want to anthropomorphize AI or suggest that it has intentions of its own. It is not — yet — a moral agent. But it is fast becoming a primary determinant of our collective destiny. We believe that because of AI’s unique characteristics — and its impact on other fields, from biotechnologies to nanotechnologies — it is already threatening the foundations of global peace and security.

The rapid rate of AI technological development, paired with the breadth of new applications (the global AI market size is expected to grow more than ninefold from 2020 to 2028) means AI systems are being widely deployed without sufficient legal oversight or full consideration of their ethical impacts. This gap, often referred to as the pacing problem, has left legislatures and executive branches simply unable to cope.

Mar 29, 2022

VPNs are digital ‘snake oil,’ expert claims — here’s why

Posted by in category: security

Here’s the true pros and cons of VPNs.


Don’t believe all the exaggerated claims that VPNs make about protecting your privacy and security, experts say.

Mar 24, 2022

Using just a laptop, an encryption code designed to prevent a quantum computer attack was cracked in just 53 hours

Posted by in categories: computing, encryption, quantum physics, security

Tech institutions are trying to find ways to guarantee security as new processing systems becoming increasingly sophisticated.

Mar 18, 2022

Dozens of budget Android phones are at risk due to a critical security flaw

Posted by in categories: mobile phones, security

The vulnerability could provide hackers with an easy method to take over your phone.

Mar 15, 2022

New Linux Bug in Netfilter Firewall Module Lets Attackers Gain Root Access

Posted by in categories: computing, security

A newly disclosed security flaw in the Linux kernel could be leveraged by a local adversary to gain elevated privileges on vulnerable systems to execute arbitrary code, escape containers, or induce a kernel panic.

Tracked as CVE-2022–25636 (CVSS score: 7.8), the vulnerability impacts Linux kernel versions 5.4 through 5.6.10 and is a result of a heap out-of-bounds write in the netfilter subcomponent in the kernel. The issue was discovered by Nick Gregory, a senior threat researcher at Sophos.

Mar 14, 2022

Warning: Objects in driverless car sensors may be closer than they appear

Posted by in categories: robotics/AI, security, transportation

Researchers at Duke University have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensors into believing nearby objects are closer (or further) than they appear without being detected.

The research suggests that adding optical 3D capabilities or the ability to share data with nearby cars may be necessary to fully protect from attacks.

The results will be presented Aug. 10–12 at the 2022 USENIX Security Symposium, a top venue in the field.

Mar 13, 2022

How GitHub Uses Machine Learning to Extend Vulnerability Code Scanning

Posted by in categories: robotics/AI, security

Applying machine learning techniques to its rule-based security code scanning capabilities, GitHub hopes to be able to extend them to less common vulnerability patterns by automatically inferring new rules from the existing ones.

GitHub Code Scanning uses carefully defined CodeQL analysis rules to identify potential security vulnerabilities lurking in source code.

Page 58 of 146First5556575859606162Last