Menu

Blog

Archive for the ‘security’ category: Page 2

Aug 15, 2024

Linux Kernel Vulnerabilities Expose Systems to Privilege Escalation: Flaws Detailed and Exploit Code Released

Posted by in categories: computing, security

Security researchers disclosed PoC exploit codes for three vulnerabilities (CVE-2023–4206, CVE-2023–4207, and CVE-2023–4208) in the Linux kernel, impacting versions v3.18-rc1 to v6.5-rc4. These “use-after-free” vulnerabilities within the net/sched component could allow local privilege escalation, enabling attackers to gain unauthorized control over affected systems. The vulnerabilities have been given a CVSS score of 7.8, indicating their high severity.

Aug 15, 2024

Novel light transport model improves X-ray phase contrast imaging

Posted by in categories: biotech/medical, security, transportation

Researchers at the University of Houston unveiled an advancement in X-ray imaging technology that could provide significant improvements in medical diagnostics, materials and industrial imaging, transportation security and other applications.

Aug 14, 2024

Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Days

Posted by in category: security

Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have come under active exploitation in the wild.

Of the 90 bugs, seven are rated Critical, 79 are rated Important, and one is rated Moderate in severity. This is also in addition to 36 vulnerabilities that the tech giant resolved in its Edge browser since last month.

The Patch Tuesday updates are notable for addressing six actively exploited zero-days.

Aug 14, 2024

Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

Posted by in categories: neuroscience, security

Ivanti releases critical security updates for vTM and Neurons for ITSM to fix vulnerabilities allowing unauthorized access. Update immediately.

Aug 12, 2024

Chip that entangles four photons opens up possibility of inviolable quantum encryption

Posted by in categories: computing, encryption, information science, mathematics, quantum physics, security

Unlike classical encryption, which relies on mathematical algorithms, quantum encryption assures security based on physical principles. Detection of espionage or interference is guaranteed by unavoidable alteration of the quantum states involved.

Aug 12, 2024

American Science is in Dangerous Decline while Chinese Research Surges, Experts Warn

Posted by in categories: economics, science, security

A very dangerous position to be in the world community of scientist should gather in agreement those friendly to the values and principles of democracy to advance science for the good humanity and freedom.


The U.S. sorely needs a coordinated national research strategy, says Marcia McNutt, president of the U.S. National Academy of Sciences.

By Saima S. Iqbal

Continue reading “American Science is in Dangerous Decline while Chinese Research Surges, Experts Warn” »

Aug 10, 2024

Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

Posted by in category: security

Researchers uncover 10 security flaws in Google’s Quick Share, potentially allowing remote code execution on Windows. Update to version 1.0.1724.0 or.

Aug 6, 2024

Riverlane Locks Up $75M As Quantum Funding Continues Strong Year

Posted by in categories: computing, quantum physics, security

Startup Riverlane helped continue what has been a strong year for venture funding in the quantum computing industry.

The U.K.-based firm — which specializes in quantum error correction technology — raised a $75 million Series C led by Planet First Partners. The round also includes participation from ETF Partners, EDBI, Cambridge Innovation Capital, Amadeus Capital Partners, the National Security Strategic Investment Fund and Altair

The company’s tech helps quantum computers perform without succumbing to eventual errors. Such computers typically can only perform a few hundred quantum operations before failure.

Aug 5, 2024

Sam Altman’s Brain Chips | Rain Neuromorphic Chips | UAE Funds and US National Security and Q*

Posted by in categories: computing, neuroscience, security

LINKS: https://www.wired.com/story/openai-buy-ai-chips-startup-sam-…i/https:/.

Aug 2, 2024

45-Year-Old Theory Confirmed: Physicists Shed New Light on the “Invisible” Energy States of Molecules

Posted by in categories: biotech/medical, security

Artistic representation of hyper-Raman optical activity: twisted light (red helices) incident on molecules arranged on a helical scaffold (white dots) produce hyper-Raman scattering spectra (multicoloured light patches) that express ‘chirality’ (patches in spiral patterns and broken mirror). Credit: Ventsislav Valev and Kylian ValevAn international team of scientists, led by physicists from the University of Bath, has demonstrated a new optical phenomenon that could significantly impact various fields, including pharmaceutical science, security, forensics, environmental science, art conservation, and medicine.

Molecules rotate and vibrate in very specific ways. When light shines on them it bounces and scatters. For every million light particles (photons), a single one changes colour. This change is the Raman effect. Collecting many of these color-changing photons paints a picture of the energy states of molecules and identifies them.

Yet some molecular features (energy states) are invisible to the Raman effect. To reveal them and paint a more complete picture, ‘hyper-Raman’ is needed.

Page 2 of 14212345678Last