Menu

Blog

Archive for the ‘security’ category: Page 5

May 7, 2022

Google Releases Android Update to Patch Actively Exploited Vulnerability

Posted by in categories: mobile phones, security

Google releases monthly security patches for Android with fixes for 37 vulnerabilities in various components.

May 6, 2022

Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst

Posted by in categories: biotech/medical, security

NASA’s Swift Observatory Tracks Potential Magnetic Flip of Monster Black Hole A rare and enigmatic outburst from an active galaxy 236 million light-years away may have been sparked by a magnetic reversal, a spontaneous flip of the magnetic field surrounding its central black hole. In a comprehen.


A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

Continue reading “Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst” »

May 6, 2022

Bye, bye, biopsy? Handheld device could painlessly identify skin cancers

Posted by in categories: biotech/medical, security

A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

May 2, 2022

First Dream Chaser vehicle takes shape

Posted by in categories: security, space travel

WASHINGTON — Sierra Space says it is making good progress on its first Dream Chaser spaceplane as the company looks ahead to versions of the vehicle that can carry crews and perform national security missions.

The company provided SpaceNews with images of the first Dream Chaser, named Tenacity, being assembled at its Colorado headquarters. The vehicle’s structure is now largely complete, but there is still more work to install its thermal protection system and other components.

“We have the wings on now. It really looks like a spaceplane,” said Janet Kavandi, president of Sierra Space, during a panel at the AIAA ASCENDx Texas conference in Houston April 28, where she played a video showing work building the vehicle.

May 1, 2022

It’s not rocket science: Why Elon Musk’s Twitter takeover could be bad for privacy

Posted by in categories: Elon Musk, science, security

Apr 26, 2022

Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis

Posted by in categories: drones, security

Builder of infrastructure for drone delivery and eVTOL air taxi vehicles, Urban-Air Port opens its first fully functional vertiport.


Urban-Air Port, the London-based developer of vertiports for delivery drones and electronic takeoff and landing (eVTOL) vehicles like air taxis, has opened the doors of its first functional aerial hub – one of 200 terminals it plans to build around the globe in the near future.

Continue reading “Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis” »

Apr 11, 2022

Cloud server leasing can leave sensitive data up for grabs

Posted by in categories: business, computing, engineering, security, space

Renting space and IP addresses on a public server has become standard business practice, but according to a team of Penn State computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private.

Cloud squatting occurs when a company, such as your bank, leases space and IP addresses—unique addresses that identify individual computers or computer networks—on a public server, uses them, and then releases the space and addresses back to the public server company, a standard pattern seen every day. The public server company, such as Amazon, Google, or Microsoft, then assigns the same addresses to a second company. If this second company is a bad actor, it can receive information coming into the address intended for the original company—for example, when you as a customer unknowingly use an outdated link when interacting with your bank—and use it to its advantage—cloud squatting.

“There are two advantages to leasing server space,” said Eric Pauley, doctoral candidate in computer science and engineering. “One is a cost advantage, saving on equipment and management. The other is scalability. Leasing server space offers an unlimited pool of computing resources so, as workload changes, companies can quickly adapt.” As a result, the use of clouds has grown exponentially, meaning almost every website a user visits takes advantage of cloud computing.

Apr 11, 2022

GitHub can now alert of supply-chain bugs in new dependencies

Posted by in category: security

GitHub can now block and alert you of pull requests that introduce new dependencies impacted by known supply chain vulnerabilities.

This is achieved by adding the new Dependency Review GitHub Action to an existing workflow in one of your projects. You can do it through your repository’s Actions tab under Security or straight from the GitHub Marketplace.

It works with the help of an API endpoint that will help you understand the security impact of dependency changes before adding them to your repository at every pull request.

Continue reading “GitHub can now alert of supply-chain bugs in new dependencies” »

Apr 10, 2022

Responsible AI in a Global Context

Posted by in categories: business, economics, governance, policy, robotics/AI, security

CSIS will host a public event on responsible AI in a global context, featuring a moderated discussion with Julie Sweet, Chair and CEO of Accenture, and Brad Smith, President and Vice Chair of the Microsoft Corporation, on the business perspective, followed by a conversation among a panel of experts on the best way forward for AI regulation. Dr. John J. Hamre, President and CEO of CSIS, will provide welcoming remarks.

Keynote Speakers:
Brad Smith, President and Vice Chair, Microsoft Corporation.
Julie Sweet, Chair and Chief Executive Officer, Accenture.

Continue reading “Responsible AI in a Global Context” »

Apr 10, 2022

Warning for Samsung users as pre-installed app could let hacker control phone

Posted by in categories: mobile phones, security

MILLIONS of owners of the Samsung Galaxy smartphone face a security threat.

Those with an Android version 9 through 12 are at risk.

Researchers at Kryptowire published a report detailing how they discovered a serious vulnerability in the pre-installed Phone app across multiple models that could enable a hacker to take control of someone’s phone, Forbes reported.

Page 5 of 95First23456789Last