Archive for the ‘security’ category: Page 52
May 25, 2022
Screencastify Chrome extension flaws allow webcam hijacks
Posted by Genevieve Klien in category: security
The popular Screencastify Chrome extension has fixed a vulnerability that allowed malicious sites to hijack users’ webcams and steal recorded videos. However, security flaws still exist that could be exploited by unscrupulous insiders.
The vendor acknowledged the cross-site scripting (XSS) vulnerability and promptly fixed it after security researcher Wladimir Palant reported it responsibly on February 14, 2022.
However, the same privacy and security-related risks remain unaddressed, keeping users at potential risk from websites that partner with the Screencastify platform.
May 19, 2022
Holographic Chocolates Look As Beautiful As They Taste
Posted by Quinn Sena in categories: holograms, security
Circa 2014
For most of us, even one bite of chocolate is enough to send our taste buds into ecstasy. Now, scientists have concocted a process to make these dark, dulcet morsels look as decadent as they taste.
Switzerland-based company Morphotonix has given traditional Swiss chocolate-making a colorful twist: It’s devised a method to imprint shiny holograms onto the sweet surfaces — sans harmful additives. Which means when you tilt the goodies from side to side, rainbow stars and swirly patterns on the chocolate’s surface dance and shimmer in the light.
Continue reading “Holographic Chocolates Look As Beautiful As They Taste” »
May 19, 2022
Canada to ban China’s Huawei, ZTE from 5G networks
Posted by Muhammad Furqan in categories: government, internet, security
Canada’s government said it would ban the use of the two Chinese telecommunications giants’ 5G gear due to national security concerns. The move follows similar bans in other Western countries.
May 18, 2022
New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack
Posted by Saúl Morales Rodriguéz in category: security
A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.
The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.
May 13, 2022
NVIDIA has open-sourced its Linux GPU kernel drivers
Posted by Genevieve Klien in categories: computing, security, sustainability, transportation
NVIDIA has published the source code of its Linux kernel modules for the R515 driver, allowing developers to provide greater integration, stability, and security for Linux distributions.
The source code has been published to NVIDIA’s GitHub repository under a dual licensing model that combines the GPL and MIT licenses, making the modules legally re-distributable.
The products supported by these drivers include all models built on the Turing and Ampere architecture, released after 2018, including the GeForce 30 and GeForce 20 series, the GTX 1,650 and 1,660, and data center-grade A series, Tesla, and Quadro RTX.
May 11, 2022
How Austin Lured the Most Workers Back to Offices
Posted by Omuterema Akhahenda in category: security
AUSTIN, Texas—Companies nationwide are struggling to get employees back in the office, but not in Austin.
These days, the city’s workforce is putting in more face time at offices than those in any other major U.S. metro area.
Austin offices are 59%-occupied—and cracked the 60% threshold last month—according to data from Kastle Systems, an office-security firm that records workers’ comings and goings by measuring badge swipes into skyscrapers and corporate campuses.
Continue reading “How Austin Lured the Most Workers Back to Offices” »
May 10, 2022
See how a huge 3D printer is going to build 200 concrete homes in Virginia’s tech hub within the next 5 years
Posted by Genevieve Klien in categories: security, transportation
Zack Mannheimer, the CEO of Alquist, predicts more US homes will be 3D printed than built “traditionally” within the next five years.
Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.
May 10, 2022
Automated threat recognition software could speed airport security
Posted by Genevieve Klien in categories: security, transportation
Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.
This is the challenge tackled by a team including researchers from Sandia National Laboratories—a challenge that led to development of the Open Threat Assessment Platform, which allows the Transportation Security Administration to respond more quickly and easily to threats to air travel safety.
“When we wanted to change how we screen in response to new threats,” said Andrew Cox, a Sandia R&D systems analyst who leads the OTAP project. “The technology was too rigid. TSA compensated by adding procedures. There’s a shoe bomber and you have to take your shoes off; liquid explosives arrived, and TSA had to limit liquids and gels.”
May 7, 2022
Google Releases Android Update to Patch Actively Exploited Vulnerability
Posted by Saúl Morales Rodriguéz in categories: mobile phones, security
Google releases monthly security patches for Android with fixes for 37 vulnerabilities in various components.