Menu

Blog

Archive for the ‘security’ category: Page 3

Oct 16, 2024

Janus-like metasurface technology shows different optical responses according to the direction of light

Posted by in categories: innovation, security

Metasurface technology is an advanced optical technology that is thinner, lighter, and more capable of precisely controlling light through nanometer-sized artificial structures than conventional technologies. KAIST researchers have overcome the limitations of existing metasurface technologies and successfully designed a Janus metasurface capable of perfectly controlling asymmetric light transmission. By applying this technology, they have also proposed an innovative method to significantly enhance security by only decoding information under specific conditions.

Oct 15, 2024

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

Posted by in category: security

Jetpack releases a critical security update to fix a vulnerability affecting 27 million WordPress sites.

Oct 15, 2024

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

Posted by in category: security

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions.

That’s according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the credentials of those users.

“The advanced adversaries were observed exploiting and chaining zero-day vulnerabilities to establish beachhead access in the victim’s network,” security researchers Faisal Abdul Malik Qureshi, John Simmons, Jared Betts, Luca Pugliese, Trent Healy, Ken Evans, and Robert Reyes said.

Oct 12, 2024

The Next Frontier: DNA Emerges as a Powerhouse for Data Storage and Computing

Posted by in categories: biotech/medical, computing, security

Researchers from NC State and Johns Hopkins have developed a breakthrough technology that leverages DNA for data storage and computing, offering capabilities such as storing, retrieving, computing, and rewriting data.

This technology is made viable by innovative polymer structures called dendricolloids, enhancing data density and preservation. It enables functions similar to electronic devices and could potentially secure data for millennia, providing a promising foundation for the future of molecular computing.

DNA Data Storage and Computing.

Oct 11, 2024

Intel Introduces Hala Point, the Most Advanced Neuromorphic System

Posted by in categories: robotics/AI, security, sustainability

Intel utilizes neuromorphic computing, a hyper-efficient solution inspired by the human brain, to address the need for fundamentally new approaches to sustainable artificial intelligence.

About Intel Newsroom.
Intel Newsroom brings you the latest news and updates on world-changing technology that enriches the lives of everyone on Earth. Catch up on the latest innovations in client computing, artificial intelligence, security, data centers, international news and more. Watch recaps and replays from industry events where Intel has a major role, such as Mobile World Congress (MWC), Intel Innovation, the Consumer Electronics Show (CES) and others.

Continue reading “Intel Introduces Hala Point, the Most Advanced Neuromorphic System” »

Oct 10, 2024

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

Posted by in category: security

Palo Alto Networks Discloses Critical Bugs in Expedition

The development comes as Palo Alto Networks disclosed multiple security flaws in Expedition that could allow an attacker to read database contents and arbitrary files, in addition to writing arbitrary files to temporary storage locations on the system.

“Combined, these include information such as usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls,” Palo Alto Networks said in a Wednesday alert.

Oct 10, 2024

Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild

Posted by in category: security

Microsoft’s October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.

Oct 10, 2024

Social Media Accounts: The Weak Link in Organizational SaaS Security

Posted by in category: security

The digital landscape is constantly changing, and with it, the nature of threats. Social media now plays a crucial role in an organization’s brand and reputation, making it imperative to secure these accounts as part of a comprehensive SaaS security strategy. SSPM social media integrations offer the visibility, control, and protection required to safeguard these essential assets.

Learn how to secure your social accounts now

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.

Oct 10, 2024

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

Posted by in category: security

Multiple MMS protocol vulnerabilities expose industrial systems to remote code execution, crashes, and DoS attacks.

Oct 9, 2024

Unlocking Quantum Communication: The Power of Diamond-Based Qubits

Posted by in categories: computing, quantum physics, security

Quantum computers and quantum communication are groundbreaking technologies that enable faster and more secure data processing and transmission compared to traditional computers. In quantum computers, qubits serve as the fundamental units of information, functioning as the quantum mechanical equivalent of bits in classical computing.

Where, for example, laser pulses in a glass fiber transport information from A to B in classical digital communication, quantum mechanics uses individual photons. In principle, this makes it impossible to intercept the transmitted data. Qubits that are optically addressable (can be controlled or read out with light) are suitable for storing the photons’ information and processing it in quantum computers. The qubits can store and process quantum states, and absorb and emit them in the form of photons.

Page 3 of 14612345678Last