Toggle light / dark theme

Researchers at Duke University have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensors into believing nearby objects are closer (or further) than they appear without being detected.

The research suggests that adding optical 3D capabilities or the ability to share data with nearby cars may be necessary to fully protect from attacks.

The results will be presented Aug. 10–12 at the 2022 USENIX Security Symposium, a top venue in the field.

Applying machine learning techniques to its rule-based security code scanning capabilities, GitHub hopes to be able to extend them to less common vulnerability patterns by automatically inferring new rules from the existing ones.

GitHub Code Scanning uses carefully defined CodeQL analysis rules to identify potential security vulnerabilities lurking in source code.

A report specialized in WordPress security points to a 150% increase in reported flaws during 2021 compared to the previous year, in addition to establishing that almost 30% of the vulnerabilities detected in plugins for WordPress do not receive updates.

Since this is the most widely used content management system (CMS) in the world, this should be a worrisome issue for tens of millions of website administrators.

According to Patchstack specialists, of all the flaws reported in 2021, only 0.58% resided in the WordPress core, while the rest affect themes and plugins created by dozens of developers. In addition, about 92% of these flaws are in free plugins, while paid plugins were affected by 8.6% of the failures reported last year.

Microsoft’s Patch Tuesday update for the month of March has been made officially available with 71 fixes spanning across its software products such as Windows, Office, Exchange, and Defender, among others.

Of the total 71 patches, three are rated Critical and 68 are rated Important in severity. While none of the vulnerabilities are listed as actively exploited, three of them are publicly known at the time of release.

It’s worth pointing out that Microsoft separately addressed 21 flaws in the Chromium-based Microsoft Edge browser earlier this month.

Details have been disclosed about a now-addressed critical vulnerability in Microsoft’s Azure Automation service that could have permitted unauthorized access to other Azure customer accounts and take over control.

“This attack could mean full control over resources and data belonging to the targeted account, depending on the permissions assigned by the customer,” Orca Security researcher Yanir Tsarimi said in a report published Monday.

The flaw potentially put several entities at risk, including an unnamed telecommunications company, two car manufacturers, a banking conglomerate, and big four accounting firms, among others, the Israeli cloud infrastructure security company added.

Following November’s catastrophic flooding events, roughly 600 Merritt residents still haven’t returned to their homes, but a 3D printer may speed up the process. Greg Solecki, the Merritt’s recovery manag.


“Our biggest priority is getting people back to Merritt and into homes and this 3D-printed option is looking like the most viable one right now,” Solecki said.

READ MORE: 3D printing’s new challenge: Solving the US housing shortage

With funding from the province, security guards are also patrolling evacuated homes as of March 4 with the Merritt RCMP reporting a rise in the break and enters, especially in the currently evacuated Phase 4 portion of the city.

Homomorphic encryption is considered a next generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it is being encrypted.

“We weren’t able to crack using mathematical tools,” says Aydin Aysu, senior author of a paper on the work and an assistant professor of computer engineering at North Carolina State University. “Instead, we used . Basically, by monitoring in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted. This demonstrates that even next generation encryption technologies need protection against side-channel attacks.”

Homomorphic encryption is a way of encrypting data so that third parties cannot read it. However, homomorphic encryption still allows third parties and third-party technologies to conduct operations using the data. For example, a user could use homomorphic encryption to upload sensitive data to a cloud computing system in order to perform analyses of the data. Programs in the cloud could perform the analyses and send the resulting information back to the user, but those programs would never actually be able to read the .

India will invest 120 billion rupees ($1.6 billion) to add new lines to transmit electricity from renewable plants as it seeks to draw half of its energy requirement from greener sources by 2030.

Dedicated transmission lines of 10,750 circuit kilometers will be built across seven provinces under the second phase of the so-called green energy corridor project, Information and Broadcasting Minister Anurag Thakur said in New Delhi. The project, approved by Prime Minister Narendra Modi’s cabinet on Thursday, will be completed by 2026 and transmit 20 gigawatts of renewable energy capacity, he said.

India is targeting to build 500 gigawatts of installed power capacity from non-fossil sources by 2030, which would require a transmission network to enable clean electricity to flow from plants to consumers. The new lines will also help integrate renewable energy into the national grid and contribute to long-term energy security, according to the government.