Menu

Blog

Archive for the ‘security’ category: Page 58

May 18, 2022

New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack

Posted by in category: security

A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.

The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.

Continue reading “New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack” »

May 13, 2022

NVIDIA has open-sourced its Linux GPU kernel drivers

Posted by in categories: computing, security, sustainability, transportation

NVIDIA has published the source code of its Linux kernel modules for the R515 driver, allowing developers to provide greater integration, stability, and security for Linux distributions.

The source code has been published to NVIDIA’s GitHub repository under a dual licensing model that combines the GPL and MIT licenses, making the modules legally re-distributable.

The products supported by these drivers include all models built on the Turing and Ampere architecture, released after 2018, including the GeForce 30 and GeForce 20 series, the GTX 1,650 and 1,660, and data center-grade A series, Tesla, and Quadro RTX.

May 11, 2022

How Austin Lured the Most Workers Back to Offices

Posted by in category: security

AUSTIN, Texas—Companies nationwide are struggling to get employees back in the office, but not in Austin.

These days, the city’s workforce is putting in more face time at offices than those in any other major U.S. metro area.

Austin offices are 59%-occupied—and cracked the 60% threshold last month—according to data from Kastle Systems, an office-security firm that records workers’ comings and goings by measuring badge swipes into skyscrapers and corporate campuses.

Continue reading “How Austin Lured the Most Workers Back to Offices” »

May 10, 2022

See how a huge 3D printer is going to build 200 concrete homes in Virginia’s tech hub within the next 5 years

Posted by in categories: security, transportation

Zack Mannheimer, the CEO of Alquist, predicts more US homes will be 3D printed than built “traditionally” within the next five years.


Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.

May 10, 2022

Automated threat recognition software could speed airport security

Posted by in categories: security, transportation

Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.

This is the challenge tackled by a team including researchers from Sandia National Laboratories—a challenge that led to development of the Open Threat Assessment Platform, which allows the Transportation Security Administration to respond more quickly and easily to threats to air travel safety.

“When we wanted to change how we screen in response to new threats,” said Andrew Cox, a Sandia R&D systems analyst who leads the OTAP project. “The technology was too rigid. TSA compensated by adding procedures. There’s a shoe bomber and you have to take your shoes off; liquid explosives arrived, and TSA had to limit liquids and gels.”

May 7, 2022

Google Releases Android Update to Patch Actively Exploited Vulnerability

Posted by in categories: mobile phones, security

Google releases monthly security patches for Android with fixes for 37 vulnerabilities in various components.

May 6, 2022

Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst

Posted by in categories: biotech/medical, security

NASA’s Swift Observatory Tracks Potential Magnetic Flip of Monster Black Hole A rare and enigmatic outburst from an active galaxy 236 million light-years away may have been sparked by a magnetic reversal, a spontaneous flip of the magnetic field surrounding its central black hole. In a comprehen.


A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

Continue reading “Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst” »

May 6, 2022

Bye, bye, biopsy? Handheld device could painlessly identify skin cancers

Posted by in categories: biotech/medical, security

A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

May 2, 2022

First Dream Chaser vehicle takes shape

Posted by in categories: security, space travel

WASHINGTON — Sierra Space says it is making good progress on its first Dream Chaser spaceplane as the company looks ahead to versions of the vehicle that can carry crews and perform national security missions.

The company provided SpaceNews with images of the first Dream Chaser, named Tenacity, being assembled at its Colorado headquarters. The vehicle’s structure is now largely complete, but there is still more work to install its thermal protection system and other components.

“We have the wings on now. It really looks like a spaceplane,” said Janet Kavandi, president of Sierra Space, during a panel at the AIAA ASCENDx Texas conference in Houston April 28, where she played a video showing work building the vehicle.

May 1, 2022

It’s not rocket science: Why Elon Musk’s Twitter takeover could be bad for privacy

Posted by in categories: Elon Musk, science, security

Page 58 of 148First5556575859606162Last