Menu

Blog

Page 1176

Oct 17, 2023

How Google Chrome Vulnerability can Put Millions of Users in Danger — Safeguard Your Data Now!

Posted by in categories: cybercrime/malcode, space

The digital realm, while offering boundless possibilities, is also a fertile ground for myriad cybersecurity threats. One such peril that has recently come to light is the User-After-Free vulnerability in Google Chrome, specifically identified as CVE-2023–5218. This vulnerability not only poses a significant threat to user data and system integrity but also opens a Pandora’s box of potential cyber-attacks and exploitations.

The User-After-Free vulnerability is a type of cybersecurity flaw that surfaces when a program continues to utilize memory space after it has been freed or deleted. This flaw allows attackers to execute arbitrary code or potentially gain unauthorized access to a system. CVE-2023–5218, identified within Google Chrome, was noted to be potentially exploitable to perform such malicious actions, thereby putting users’ data and privacy at substantial risk.

CVE-2023–5218 was unveiled to the public through various cybersecurity platforms and researchers who detected unusual activities and potential exploitation trails leading back to this particular flaw. This vulnerability was identified to be present in a specific Chrome component, prompting Google to release a flurry of updates and patches to mitigate the associated risks.

Oct 17, 2023

Silent Predator Unveiled: Decoding WebWyrm Stealthy Malware affecting 50 countries

Posted by in categories: cryptocurrencies, cybercrime/malcode, employment, evolution, finance, military

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”

Oct 17, 2023

Webb detects quartz crystals in clouds of hot gas giant

Posted by in categories: particle physics, space

Researchers using NASA’s James Webb Space Telescope have detected evidence for quartz nanocrystals in the high-altitude clouds of WASP-17 b, a hot Jupiter exoplanet 1,300 light-years from Earth.

The detection, which was uniquely possible with MIRI (Webb’s Mid-Infrared Instrument), marks the first time that silica (SiO2) particles have been spotted in an .

The are only about 10 nanometers across, so small that 10,000 could fit side-by-side across a human hair. Their size and composition of pure silica were reported in “JWST-TST DREAMS: Quartz Clouds in the Atmosphere of WASP-17b,” published in Astrophysical Journal Letters.

Oct 17, 2023

Study: Deep neural networks don’t see the world the way we do

Posted by in category: robotics/AI

Human sensory systems are very good at recognizing objects that we see or words that we hear, even if the object is upside down or the word is spoken by a voice we’ve never heard.

Computational models known as deep neural networks can be trained to do the same thing, correctly identifying an image of a dog regardless of what color its fur is, or a word regardless of the pitch of the speaker’s voice. However, a new study from MIT neuroscientists has found that these models often also respond the same way to images or words that have no resemblance to the target.

When these neural networks were used to generate an image or a word that they responded to in the same way as a specific natural input, such as a picture of a bear, most of them generated images or sounds that were unrecognizable to human observers. This suggests that these models build up their own idiosyncratic “invariances”—meaning that they respond the same way to stimuli with very different features.

Oct 17, 2023

SpaceX details Starlink-for-phones plan, launching in 2024

Posted by in categories: mobile phones, satellites

Starlink’s website update is revealing a bit more about its plans for a satellite-delivered cell phone service. The new page for “Starlink Direct to Cell” promises “ubiquitous coverage” from “cellphone towers in space” that will work over bog-standard LTE. The current timeline claims there will be text service starting in 2024, voice and data in 2025, and “IoT” service in 2025.

Today satellite phone connectivity still requires giant, purpose-built hardware, like the old-school Iridium network phones. If you’re only looking for emergency texting, you can also make do with Apple’s introduction of the barely there connectivity paradigm, requiring being inside a connectivity window, holding up a phone, and following a signal-targeting app. Starlink wants to bring full-blown space connectivity to normal smartphone hardware.

Oct 17, 2023

Ghosts and goblins aren’t the only scary things your children might encounter this Halloween

Posted by in category: health

For parents of kids with food allergies, Halloween treats—from candy to cookies—can be frightening too. Be cautious of “fun size” candy, which may contain different ingredients than regular size packages.


The AAAAI offers tips written and reviewed by experts on allergies on avoiding the danger of anaphylaxis this Halloween.

Oct 17, 2023

Microsoft’s HoloAssist dataset brings AI assistants closer to our daily lives

Posted by in category: robotics/AI

Microsoft has unveiled a new dataset to help build interactive AI assistants for everyday tasks.

Extensive dataset of egocentric videos

According to Microsoft researchers Xin Wang and Neel Joshi, the dataset, called “HoloAssist,” is the first of its kind to include egocentric videos of humans performing physical tasks, as well as associated instructions from a human tutor.

Oct 16, 2023

Genes: All articles in Genes (ISSN 2073–4425) Vol 14, Issue 9, are now freely available to access, read and download:

Posted by in categories: biotech/medical, genetics

COVER STORY: The epigenetic clock uses DNA methylation to calculate the metric of “epigenetic age”. Epigenetic age acceleration (epigenetic > chronological age) has been repeatedly linked to pediatric asthma and allergic disease, demonstrating its potential as a diagnostic biomarker. However, questions remain about the accuracy and utility of epigenetic clocks in children.

This review by researchers at University of British Columbia examines the most used current epigenetic clocks and details the associations between epigenetic age acceleration and asthma/allergic disease. They explore the potential of the epigenetic clock as a biomarker for asthma and discuss the need for a pediatric epigenetic clock that is accurate in blood samples in order to maximize the utility of this powerful tool.

Oct 16, 2023

The science of ergonomics: optimizing spine health in the workplace

Posted by in categories: health, science

Dr. Cyrus King describes challenges individuals face pertaining to ergonomics in the workplace and provides suggestions for support.

Oct 16, 2023

Reading the Invisible Library: the Herculaneum Papyrus Scrolls

Posted by in category: computing

Computer scientist Brent Seales and a team of researchers at the University of Kentucky are working to “digitally unwrap” ancient papyri from the Herculaneum library that were carbonized by the eruption of Mount Vesuvius in 79 CE.

Read about it here:


Since 2019, NEH has supported work by computer scientist Brent Seales and a team of researchers at the University of Kentucky in efforts to “digitally unwrap” ancient papyri from the Herculaneum library that were carbonized by the eruption of Mount Vesuvius in 79 A.D.

Continue reading “Reading the Invisible Library: the Herculaneum Papyrus Scrolls” »