Normal view

There are new articles available, click to refresh the page.
Today — 3 July 2024Main stream

USENIX Security ’23 – Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference

2 July 2024 at 15:00

Authors/Presenters:Yun Li, Tsinghua University, Ant Group; Yufei Duan, Tsinghua University; Zhicong Huang, Alibaba Group; Cheng Hong, Ant Group; Chao Zhang and Yifan Song, Tsinghua University

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference appeared first on Security Boulevard.

Yesterday — 2 July 2024Main stream

Latest OpenSSH Vulnerability Might Impact 14M Linux Systems

2 July 2024 at 13:53
servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Qualys this week reported the discovery of a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH servers (sshd) that could potentially impact more than 14 million Linux systems.

The post Latest OpenSSH Vulnerability Might Impact 14M Linux Systems appeared first on Security Boulevard.

‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE

2 July 2024 at 12:30
Apple CEO Tim Cook, looking grim

Tim looks grim: 10 year old vulnerabilities in widely used dev tool include a CVSS 10.0 remote code execution bug.

The post ‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE appeared first on Security Boulevard.

‘Our first sexual encounter was a mess. We were so anxious, neither of us could get an erection’: This is how we do it in Nigeria

2 July 2024 at 10:00

In Lagos, where homosexuality is illegal, Chibuzo and Ekele reveal how risky it is for them to get together

We only touch behind closed doors

I miss the intimacy of sharing living space, and being together, day and night

Continue reading...

💾

© Illustration: Ryan Gillett/The Guardian

💾

© Illustration: Ryan Gillett/The Guardian

Building Resilience in the Chip Supply Chain

2 July 2024 at 08:00
supply chain, chip, security, chip supply chain

To bolster digital security and resilience across the semiconductor supply chain, a critical first step is that organizations across the supply chain must re-orient their cybersecurity strategies.

The post Building Resilience in the Chip Supply Chain appeared first on Security Boulevard.

Jimmy Anderson takes seven wickets, Surrey v Essex and more: county cricket – live

2 July 2024 at 12:39
  • Latest news from day three in the County Championship
  • And you can email Tanya or comment below the line

And while Anderson performs ball-polishing duties for Tom Bailey at mid-on, poor Tom Bruce is turning out for Lancashire seconds at Barnsley. And the first drop of the day as Chris Green lets HH through his fingers at midwicket.

HH survives the over, Anderson’s first over of the summer is a maiden and off we go.

Continue reading...

💾

© Photograph: Lancashire Cricket Club

💾

© Photograph: Lancashire Cricket Club

Here’s how bad it is for Sunak: I went to the most Tory seat in Britain – and the word on people’s lips was Reform | Owen Jones

2 July 2024 at 05:00

On Canvey Island in Essex, I found hard-up, demoralised voters taking refuge in rightwing half-truths

If politics is a soap opera, the people of Canvey Island switched off a few years ago. This is England at its most Conservative, literally: the island is in the constituency of Castle Point, which delivered the highest vote share (76.7%) in Britain for the party at the 2019 election.

The Tories’ looming appointment with electoral calamity is evident from the responses I receive when visiting this Essex coastal town, which range from indifference to contempt. There are plenty of older folk (a quarter of the residents in the constituency are aged over 65) but also a sprinkling of families, as well as shirtless young lads bombing down the high street on bikes, passing union flag bunting on the railings. Ask about the election, and some respond as if it’s the first they’ve heard of it, others like it’s a mild trauma they’d rather forget.

Continue reading...

💾

© Photograph: Jill Mead/The Guardian

💾

© Photograph: Jill Mead/The Guardian

7 Steps To Secure Critical Infrastructure 

2 July 2024 at 04:41
infrastructure, threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Critical infrastructure and public sector organizations such as government and municipalities, manufacturing units, communication networks, transportation services, power and water treatment plants, et. al, have been battling a growing wave of breaches and cyberattacks.

The post 7 Steps To Secure Critical Infrastructure  appeared first on Security Boulevard.

The secret lives of porn addicts: ‘I am meticulous about covering my tracks’

2 July 2024 at 00:00

As pornography use soars, some men feel their behaviour is moving from a compulsion to an addiction. They describe how this affects their health, happiness and relationships

Tony is in his 50s and recently did a rough calculation of how much of his life he has spent looking at pornography. “The result was horrifying,” he says. It was eight years. “I can barely think about it. The sense of failure is intense.”

Tony saw his first “hardcore” film on VHS in the 1980s when he was 12. In his 20s, he connected to the internet for the first time, which turned his habit into a “full-blown addiction”. Over the past 30 years, he has just about managed to maintain a double life: he works in a caring profession, is friends with men and women, has had relationships. But there is a part of him he keeps entirely hidden.

Continue reading...

💾

© Illustration: Lehel Kovács/The Guardian

💾

© Illustration: Lehel Kovács/The Guardian

USENIX Security ’23 – WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT

1 July 2024 at 15:00

Authors/Presenters:Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT appeared first on Security Boulevard.

Before yesterdayMain stream

The Lost Island

1 July 2024 at 17:01
Bermeja Island, north of Yucatan, disappeared. Or else it never existed.

Although appearing on maps well into the 20th century, it could not be located when Mexico sought to use its presence to extend its oil-drilling rights. Theories for its disappearance include erosion, sea-level rising, and the CIA. It does appear on Google Maps as a pointer and has 700 reviews including 49 for its mermaids.

Booting Linux off of Google Drive

1 July 2024 at 15:22

On the brink of insanity, my tattered mind unable to comprehend the twisted interplay of millennia of arcane programmer-time and the ragged screech of madness, I reached into the Mass and steeled myself to the ground lest I be pulled in, and found my magnum opus.

Booting Linux off of a Google Drive root.

↫ Ersei

That’s not… You shouldn’t… Why would…

‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk

1 July 2024 at 12:48
Vladimir Vladimirovich Putin (or possibly a very good lookalike)

SolarWinds hackers strike again: Remote access service hacked—by APT29, says TeamViewer.

The post ‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk appeared first on Security Boulevard.

Chinese space firm unintentionally launches its new rocket

1 July 2024 at 08:52
The Tianlong-3 rocket as seen on its test stand before the anomaly.

Enlarge / The Tianlong-3 rocket as seen on its test stand before the anomaly. (credit: Space Pioneer)

One of the most promising Chinese space startups, Space Pioneer, experienced a serious anomaly this weekend while testing the first stage of its Tianlong-3 rocket near the city of Gongyi.

The rocket was undergoing a static fire test of the stage, in which a vehicle is clamped to a test stand while its engines are ignited, when the booster broke free. According to a statement from the company, the rocket was not sufficiently clamped down and blasted off from the test stand "due to a structural failure."

Video of the accidental ascent showed the rocket rising several hundred meters into the sky before it crashed explosively into a mountain 1.5 km away from the test site. (See various angles of the accident here, on the social media site X, or on Weibo.) The statement from Space Pioneer sought to downplay the incident, saying it had implemented safety measures before the test, and there were no casualties as a result of the accident. "The test site is far away from the urban area of ​​Gongyi," the company said.

Read 7 remaining paragraphs | Comments

Cyber Trust Mark: The Impacts and Incentives of Early Adoption

1 July 2024 at 06:00
IoT, devices, cyber trust mark, trade-offs, users, deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

The Cyber Trust Mark is a labeling initiative for consumer IoT devices in the United States that builds on work undertaken by the FCC and NIST, establishing data privacy and cybersecurity standards for connected devices.

The post Cyber Trust Mark: The Impacts and Incentives of Early Adoption appeared first on Security Boulevard.

A European wild cat was nearly extinct. Now, it is making a comeback

30 June 2024 at 21:47
A European wild cat was nearly extinct. Now, it is making a comeback. The Iberian lynx is no longer classified as endangered, with one group calling it the "greatest recovery of a cat species ever achieved through conservation."

In 2002 there were only about 60 adult Iberian lynx in Portugal and Spain, and the species was labeled "critically endangered." After a lot of hard work, there are now more than 2000 young and adult Iberian lynx on the Iberian Peninsula.

New Linux 'Screen of Death' Options: Black - or a Monochrome Tux Logo

30 June 2024 at 11:34
It was analgous to the "Blue Screen of Death" that Windows gives for critical errors, Phoronix wrote. To enable error messages for things like a kernel panic, Linux 6.10 introduced a new panic handler infrastructure for "Direct Rendering Manager" (or DRM) drivers. Phoronix also published a follow-up from Red Hat engineer Javier Martinez Canillas (who was involved in the new DRM Panic infrastructure). Given complaints about being too like Microsoft Windows following his recent Linux "Blue Screen of Death" showcase... Javier showed that a black screen of death is possible if so desired... After all, it's all open-source and thus can customize to your heart's content. And now the panic handler is getting even more new features, Phoronix reported Friday: With the code in Linux 6.10 when DRM Panic is triggered, an ASCII art version of Linux's mascot, Tux the penguin, is rendered as part of the display. With Linux 6.11 it will also be able to handle displaying a monochrome image as the logo. If ASCII art on error messages doesn't satisfy your tastes in 2024+, the DRM Panic code will be able to support a monochrome graphical logo that leverages the Linux kernel's boot-up logo support. The ASCII art penguin will still be used when no graphical logo is found or when the existing "LOGO" Kconfig option is disabled. (Those Tux logo assets being here.) This monochrome logo support in the DRM Panic handler was sent out as part of this week's drm-misc-next pull request ahead of the Linux 6.11 merge window in July. This week's drm-misc-next material also includes TTM memory management improvements, various fixes to the smaller Direct Rendering Manager drivers, and also the previously talked about monochrome TV support for the Raspberry Pi. Long-time Slashdot reader unixbhaskar thinks the new option "will certainly satisfy the modern people... But it is not as eye candy as people think... Moreover, it is monochrome, so certainly not resource-hungry. Plus, if all else fails, the ASCII art logo is still there to show!"

Read more of this story at Slashdot.

USENIX Security ’23 – Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators

30 June 2024 at 11:00

Authors/Presenters:Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators appeared first on Security Boulevard.

USENIX Security ’23 – A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots

29 June 2024 at 11:00

Authors/Presenters:Boyang Zhang and Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots appeared first on Security Boulevard.

"But the entire tale – sausages and all – was made up by Wise."

By: Kattullus
29 June 2024 at 20:06
Gill Partington recounts the story of Thomas James Wise in the London Review of Books and the LRB Podcast. Wise was the doyen of Victorian bibliophiles, and might the most prolific literary forger in history. Thomas J. Gearty jr. wrote a brief survey of his forgeries in 1973. You can see images from Wise's work, with explanations by librarian Alexander Johnston, on the University of Delaware Library website.

Netflix’s Finest: 7 Must-Watch Cybersecurity Shows That Redefine Thrill

By: Editorial
29 June 2024 at 05:07

Cybersecurity Shows

Netflix is renowned for its diverse and engaging lineup of drama-filled shows that cater to a wide array of audiences. Among its extensive catalog, Netflix has also produced and curated a significant number of series that delve into the complex and often thrilling world of technology and cybersecurity. These shows not only entertain but also shed light on the intricate issues and challenges that define the digital age. In this article, we highlight some of the best cybersecurity-themed shows available on Netflix. These selections range from riveting docuseries that explore real-life cybercrimes and the people behind them, to fictional dramas that imagine high-stakes scenarios involving hacking, data breaches, and digital espionage. Whether you are a tech enthusiast, a cybersecurity professional, or simply someone who enjoys a good thriller, these shows offer a fascinating look at the digital world's darker side. Join us as we explore these top-notch series that bring the exciting and often perilous world of cybersecurity to your screen.

Best Cybersecurity Shows on Netflix

 7. The Great Hack 

The Great Hack is a 2019 Netflix documentary that explores the Cambridge Analytica scandal and its impact on privacy and democracy. The film discloses how the political consulting firm used personal data derived from Facebook to influence voter behaviors in various elections like the 2016 U.S. presidential election and the Brexit referendum. There are key figures from the actual events like data scientists and former Cambridge Analytica employees who share their thoughts on the ethical implications and societal impact of data exploitation.   This is one of those cybersecurity shows on Netflix that is a particularly great watch as it aims to share with the public the extent to which personal data can be manipulated to sway public opinion.  It also helps the audience critically evaluate the security and political climate of the world they’re living in as it raises questions about data privacy, corporate power, and the role of democracy in a digital world. 

6. The Billion Dollar Code 

The Billion Dollar Code is a 2021 German Netflix drama series that follows two young German computer enthusiasts who develop TerraVision in the 1990s. TerraVision was an innovative software that allowed users to virtually navigate the globe using satellite images, which is similar to what Google Earth does today. These initial idea and development phases lead to their eventual legal battle against Google, who accuse them of infringing on their creation of Google Earth.   This show consists of courtroom drama and flashbacks that cover the steps of innovation and the battles surrounding intellectual property in the tech industry. The movie provides insight into the moral dilemmas faced by inventors when working with or against powerful corporations. 

5. Connected 

Connected is a 2020 Netflix docuseries hosted by science journalist Latif Nasser, who explores the different ways in which aspects of our world are interconnected. Each episode dives into a different subject, ranging from surveillance to the human microbiome, and how they could be linked through hidden patterns and systems. Nasser meets with experts all over the globe and uncovers stories that reveal the science and history behind these connections. This is one of those cybersecurity shows that has a very broad concept, but there are specific episodes that explore technology-based matters. Weather forecasting devices, surveillance technology, and nuclear weapons are some of the topics they explore. It is a great educational show to look at how the cyberworld is intertwined with the physical world.

4. Cyber Hell: Exposing an Internet Horror 

Cyber Hell: Exposing an Internet Horror is a 2022 Netflix documentary that investigates the dark underbelly of the Internet. It focuses on a terrible case of digital exploitation in South Korea dubbed the "Nth Room" case. This case followed a network of online chat rooms where anonymous users exploited and blackmailed young women and minors into producing explicit content. These crimes utilised encrypted messaging apps which made it difficult for law enforcement to track down the perpetrators. This documentary follows victims’ advocates, journalists, and most notably, cybercrime experts, as they break down the web of digital abuse and try to successfully apprehend the offenders. It highlights the challenges of combating cybercrime in an age of increasing digital anonymity and highlights the dangerous need for stronger online protections. The film acts as a reminder of the real-world consequences of unchecked digital behavior. 

3. The Future Of 

The Future Of is a 2022 Netflix docuseries that explores how cutting-edge innovations and technologies might shape various aspects of our lives in the near future. Each episode focuses on a different topic, such as gaming, food, fashion, space exploration, and love. Through interviews with experts, futurists, and industry leaders, the series presents a blend of scientific predictions and creative speculation of where these topics may go.  It uses current advancements to create possible scenarios, highlighting the many possibilities but also the ethical dilemmas that come with extensive technological progress. This show inspires curiosity about what's to come but also probes viewers to think critically about the implications of technology on society. 

2. Love, Death + Robots. 

Love, Death + Robots is a Netflix animated anthology series that features a collection of short stories surrounding science fiction, fantasy, horror, and comedy. This show is known for its mix of animation styles, ranging from photorealistic CGI to traditional 2D animation. Each episode offers its own unique narratives that explore themes such as AI, dystopian futures, and extra-terrestrials. Love, Death + Robots differs from the other shows due to its fictional nature sports mature themes, and provides fresh and innovative takes on the development of technology through an animated form of storytelling.

1. Black Mirror 

"Black Mirror" is one of Netflix’s most popular series, it follows an anthology format where every episode explores a different dark and often dystopian side of technological advancements. Each standalone episode presents a story set in a near-future or alternate present, delving into the consequences of human beings’ relationship with technology. The series tackles themes like surveillance, virtual reality, social media, AI, and human consciousness.  Black Mirror forces viewers to confront the darker aspects of technological progress and its impact on human behavior and societal norms as it highlights the potential for misuse and ethical dilemmas. This show has garnered critical acclaim for its ability to provoke reflection on the potential future of humanity in an extensive digital world, even having an episode that criticizes its very own streaming service, Netflix.  We hope at least one of these may have triggered your interest. Especially as there’s a show in there for everybody. Whether you’re interested in learning about real-life cybersecurity events that have occurred, or curious about predictive storylines that address the dangers of advanced technology.  

With no Internet, algorithms will soon become humbled and lonely

By: chavenet
29 June 2024 at 04:34
So the aftermath of the Internet exploding is inevitably going to come with ambivalent, and even bittersweet, feelings. Many of us are probably going to miss the amazing sense of connection we have with people all around the globe and the book recommendations, free recipes and gardening tips, but, to no less an extent, are probably going to be extremely relieved to no longer be quite so pressured by corporations to be rampantly interested in our own surfaces or be beset by the constant lingering sense that we are arguing with people we've never met about a version of ourselves that doesn't exist. Yes, having go into the city to our bank to transfer some money, just like we did during the 20th Century, will be a pain. But I am looking forward to being able to relax while eating some salty snacks without worrying about the way their residue sticks to my thumb and makes my online banking app impossible to open. It's a case of swings and roundabouts. from What Will Life Really Be Like After The Internet Gets Incinerated? by Tom Cox [The Villager]

NASA and SpaceX misjudged the risks from reentering space junk

28 June 2024 at 20:22
A European ATV cargo freighter reenters the atmosphere over the Pacific Ocean in 2013.

Enlarge / A European ATV cargo freighter reenters the atmosphere over the Pacific Ocean in 2013.

Since the beginning of the year, landowners have discovered several pieces of space junk traced to missions supporting the International Space Station. On all of these occasions, engineers expected none of the disposable hardware would survive the scorching heat of reentry and make it to Earth's surface.

These incidents highlight an urgency for more research into what happens when a spacecraft makes an uncontrolled reentry into the atmosphere, according to engineers from the Aerospace Corporation, a federally funded research center based in El Segundo, California. More stuff is getting launched into space than ever before, and the trend will continue as companies deploy more satellite constellations and field heavier rockets.

"The biggest immediate need now is just to do some more work to really understand this whole process and to be in a position to be ready to accommodate new materials, new operational approaches as they happen more quickly," said Marlon Sorge, executive director of Aerospace's Center for Orbital and Reentry Debris Studies. "Clearly, that’s the direction that spaceflight is going.”

Read 15 remaining paragraphs | Comments

If your immutable Linux desktop uses Flatpak, I’m going to have a bad time

28 June 2024 at 20:08

The openSUSE project recently announced the second release candidate (RC2) of its Aeon Desktop, formerly known as MicroOS Desktop GNOME. Aside from the new coat of naming paint, Aeon breaks ground in a few other ways by dabbling with technologies not found in other openSUSE releases. The goal for Aeon is to provide automated system updates using snapshots that can be applied atomically, removing the burden of system maintenance for “lazy developers” who want to focus on their work rather than desktop administration. System-tinkerers need not apply.

The idea behind Aeon, as with other immutable (or image-based) Linux distributions, is to provide the core of the distribution as a read-only image or filesystem that is updated atomically and can be rolled back if needed. Google’s ChromeOS was the first popular Linux-based desktop operating system to follow this model. Since the release of ChromeOS a number of interesting immutable implementations have cropped up, such as Fedora Silverblue, Project Bluefin (covered here in December 2023), openSUSE’s MicroOS (covered here in March 2023), and Ubuntu Core.

↫ Joe Brockmeier at LWN

With the amount of attention immutable Linux desktops are getting, and how much work and experimentation that’s going into them, I’m getting the feeling that sooner or later all of the major, popular desktop Linux distributions will be going this route. Depending on implementation details, I actually like the concept of a defined base system that’s just an image that can be replaced easily using btrfs snapshots or something like that, while all the user’s files and customisations are kept elsewhere. It makes intuitive sense.

Where the current crop of immutable Linux desktops fall flat for me is their reliance on (usually) Flatpak. You know how there’s people who hate systemd and/or Wayland just a little too much, to the point it gets a little weird and worrying? That’s me whenever I have to deal with Flatpaks. Every experience I have with Flatpaks is riddled with trouble for me.

Even though I’m a KDE user, I’m currently testing out the latest GNOME release on my workstation (the one that I used to conclude Windows is simply not ready for the desktop), using Fedora of course, and on GNOME I use the Mastodon application Tuba. While I mostly write in English, I do occasionally write in Dutch, too, and would love for the spell check feature to work in my native tongue, too, instead of just in English. However, despite having all possible Dutch dictionaries installed – hunspell, aspell – and despite those dictionaries being picked up everywhere else in GNOME, Tuba only showed me a long list of variants of English.

After digging around to find out why this was happening, it took me far longer than I care to publicly admit to realise that since the latest version of Tuba is only really available as a Flatpak on Fedora, my problem probably had something to do with that – and it turns out I was right: Flatpak applications do not use the system-wide installed spellcheck dictionaries like normal applications do.

This eventually led me to this article by Daniel Aleksandersen, where he details what you need to do in order to add spellcheck dictionaries to Flatpak applications. You need to run the following commands:

$ flatpak config languages --set "en;nl;"
$ sudo flatpak update

The list of languages uses two-letter codes only, and the first language listed will serve as the display language for Flatpak applications, while the rest will be fallback languages – which happens to include downloading and installing the Flatpak-specific copies of the spellcheck libraries. Sadly, this method is not particularly granular. Since it only accepts the two-letter codes, you can’t, say, only install “nl-nl”; you’ll be getting “nl-be” as well. In the case of a widely spoken language like English, this means a massive list of 18 different varieties of English. The resulting menus are… Not elegant.

This is just an example, but using Flatpak, you’ll run into all kinds of issues like this, that then have to be solved by hacks or obscure terminal commands – not exactly the user-friendly image Flatpak is trying to convey to the world. This particular issue might not matter to the probably overwhelming English-speaking majority of Flatpak developers, but for anyone who has to deal with multiple languages on a daily basis – which is a massive number of people, probably well over 50% of computer users1 – having to mess around with obscure terminal commands hidden in blog posts just to be able to use the languages they use every day is terrible design on a multitude of levels, and will outright make Flatpak applications unusable for large numbers of people.

Whenever I run into these Flatpak problems, it makes it clear to me that Flatpak is designed not by users, for users – but by developers, for developers. I can totally understand and see why Flatpak is appealing to developers, but as a user, they bring me nothing but grief, issues, and weird bugs that all seem to stem from being made to make developers’ lives easier, instead of users’.

If immutable Linux distributions are really hellbent on using Flatpak as the the means of application installation – and it seams like they are – it will mean a massive regression in functionality, usability, and discoverability for users, and as long as Flatpak remains as broken and badly designed as it is, I really see no reason to recommend an immutable Linux desktop to anyone but the really curious among us.

  1. Even in a country like the United States, which we think of as an English-speaking country, there are currently 42 million Spanish-speaking people, who most likely also have to use English on a daily basis. The way multilingual features are treated as afterthoughts by the tech industry – even the open source one – is baffling. ↩

Unfurling Hemlock Tossing ‘Cluster Bombs’ of Malware

28 June 2024 at 17:08
Unfurling Hemlock malware

A threat group dubbed Unfurling Hemlock infects targeted campaign with a single compressed file that, once executed, launches a 'cluster bomb' of as many as 10 pieces of malware that include loaders, stealers, and backdoors.

The post Unfurling Hemlock Tossing ‘Cluster Bombs’ of Malware appeared first on Security Boulevard.

USENIX Security ’23 – PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack

28 June 2024 at 15:00

Authors/Presenters:Xinben Gao, Lan Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

The post USENIX Security ’23 – PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack appeared first on Security Boulevard.

USENIX Security ’23 – Extracting Training Data from Diffusion Models

28 June 2024 at 11:00

Authors/Presenters:Nicholas Carlini, Jamie Hayes, DeepMind; Milad Nasr Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Extracting Training Data from Diffusion Models appeared first on Security Boulevard.

Skeleton Key the Latest Jailbreak Threat to AI Models: Microsoft

28 June 2024 at 12:57
Microsoft Skeleton Key AI jailbreak

Microsoft details Skeleton Key, a new jailbreak technique in which a threat actor can convince an AI model to ignore its built-in safeguards and respond to requests for harmful, illegal, or offensive requests that might otherwise have been refused.

The post Skeleton Key the Latest Jailbreak Threat to AI Models: Microsoft appeared first on Security Boulevard.

Rocket Report: China flies reusable rocket hopper; Falcon Heavy dazzles

28 June 2024 at 07:00
SpaceX's 10th Falcon Heavy rocket climbs into orbit with a new US government weather satellite.

Enlarge / SpaceX's 10th Falcon Heavy rocket climbs into orbit with a new US government weather satellite. (credit: SpaceX)

Welcome to Edition 6.50 of the Rocket Report! SpaceX launched its 10th Falcon Heavy rocket this week with the GOES-U weather satellite for NOAA, and this one was a beauty. The late afternoon timing of the launch and atmospheric conditions made for great photography. Falcon Heavy has become a trusted rocket for the US government, and its next flight in October will deploy NASA's Europa Clipper spacecraft on the way to explore one of Jupiter's enigmatic icy moons.

As always, we welcome reader submissions, and if you don't want to miss an issue, please subscribe using the box below (the form will not appear on AMP-enabled versions of the site). Each report will include information on small-, medium-, and heavy-lift rockets as well as a quick look ahead at the next three launches on the calendar.

Sir Peter Beck dishes on launch business. Ars spoke with the recently knighted Peter Beck, founder and CEO of Rocket Lab, on where his scrappy company fits in a global launch marketplace dominated by SpaceX. Rocket Lab racked up the third-most number of orbital launches by any US launch company (it's headquartered in California but primarily assembles and launches rockets in New Zealand). SpaceX's rideshare launch business with the Falcon 9 rocket is putting immense pressure on small launch companies like Rocket Lab. However, Beck argues his Electron rocket is a bespoke solution for customers desiring to put their satellite in a specific place at a specific time, a luxury they can't count on with a SpaceX rideshare.

Read 22 remaining paragraphs | Comments

How to Enhance Security Without Affecting the Customer Experience

28 June 2024 at 06:25
customer, experience, security

Navigating the landscape of customer interactions is a delicate balancing act that requires constant calibration between security and operability (or usability, if speaking from a customer’s perspective).

The post How to Enhance Security Without Affecting the Customer Experience appeared first on Security Boulevard.

NASA will pay SpaceX nearly $1 billion to deorbit the International Space Station

27 June 2024 at 12:54
Illustration of the SpaceX Dragon XL as it is deployed from the Falcon Heavy's second stage in high Earth orbit on its way to the Gateway in lunar orbit.

Enlarge / Illustration of the SpaceX Dragon XL as it is deployed from the Falcon Heavy's second stage in high Earth orbit on its way to the Gateway in lunar orbit. (credit: SpaceX)

NASA has awarded an $843 million contract to SpaceX to develop a "US Deorbit Vehicle." This spacecraft will dock to the International Space Station in 2029 and then ensure the large facility makes a controlled reentry through Earth's atmosphere before splashing into the ocean in 2030.

"Selecting a US Deorbit Vehicle for the International Space Station will help NASA and its international partners ensure a safe and responsible transition in low Earth orbit at the end of station operations," said Ken Bowersox, NASA's associate administrator for Space Operations, in a statement. "This decision also supports NASA’s plans for future commercial destinations and allows for the continued use of space near Earth."

NASA has a couple of reasons for bringing the space station's life to a close in 2030. Foremost among these is that the station is aging. Parts of it are now a quarter of a century old. There are cracks on the Russian segment of the space station that are spreading. Although the station could likely be maintained beyond 2030, it would require increasing amounts of crew time to keep flying the station safely.

Read 11 remaining paragraphs | Comments

Driving licences and other official documents leaked by authentication service used by Uber, TikTok, X, and more

27 June 2024 at 12:21

A company that helps to authenticate users for big brands had a set of administration credentials exposed online for over a year, potentially allowing access to user identity documents such as driving licenses.

As more and more legislation emerges requiring websites and platforms—like gambling services, social networks, and porn sites—to verify their users’ age, the requirement for authentication companies offering that service rises.

You may never have heard of the Israeli based authentication company, AU10TIX, but you will certainly recognize some of its major customers, like Uber, TikTok, X, Fiverr, Coinbase, LinkedIn, and Saxo Bank.

Au10tix advertising the authentication and age verification for the world's leading brands

AU10TIX checks users’ identities via the upload of a photo of an official document.

A researcher found that AU10TIX had left the credentials exposed, providing 404 Media with screenshots and data to demonstrate their findings. The credentials led to a logging platform containing data about people that had uploaded documents to prove their identity.

Whoever accessed the platform could peruse information about those people, including name, date of birth, nationality, identification number, and the type of uploaded document such as a drivers’ license, linking to an image of the identity document itself.

Research showed that the likely source of the credentials was an infostealer on a computer of a Network Operations Center Manager at AU10TIX.

Stolen credentials have shown to be a major source of breaches like those recently associated with Snowflake. Snowflake pointed to research which found that one cybercriminal obtained access to multiple organizations’ Snowflake customer instances using stolen customer credentials.

Another major problem is that these sets of credentials get traded and sold all the time. And it’s not as if when you sold them once, that’s it. Digital information can be copied and combined endlessly, leading to huge data sets that criminals can use as they see fit.

We’ve talked about the dangers of data brokers in the past. The California Privacy Protection Agency (CPPA) defines data brokers as businesses that consumers don’t directly interact with, but that buy and sell information about consumers from and to other businesses. There are around 480 data brokers registered with the CPPA. However, that might be just the tip of the iceberg, because there are a host of smaller players active that try to keep a low profile.

Either way, for any company and particularly an authentication company working with sensitive data, having such an account accessible with just login credentials should be grounds for serious penalties.

In a statement given to 404 Media, AU10TIX said it was no longer using the system and had no evidence the data had been used:

“While PII data was potentially accessible, based on our current findings, we see no evidence that such data has been exploited. Our customers’ security is of the utmost importance, and they have been notified.”

For now, there’s not much that individual users of the brands can do apart from keep an eye out for any official statements, and consider an ongoing identity monitoring solution. Below are some general tips on what to do if your data has been part of a data breach:

Protecting yourself after a data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

Check your personal data exposure

You can check what personal information of yours has been exposed on our Digital Footprint portal. Just enter your email address (it’s best to submit the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report.

Paging Gen-X

By: bq
27 June 2024 at 11:07
Schoolhouse Rock! Rocks is a tribute album released in 1995 containing cover tracks by major local bands, including one of the last recordings made by Blind Melon's Shannon Hoon before his death (3 is a Magic Number).

Track listing "Schoolhouse Rocky" - Bob Dorough and Friends "I'm Just A Bill" - Deluxx Folk Implosion "Three Is a Magic Number" - Blind Melon "Conjunction Junction" - Better Than Ezra "Electricity, Electricity" - Goodness "No More Kings" - Pavement "The Shot Heard 'Round the World" - Ween "My Hero, Zero" - The Lemonheads "The Energy Blues" - Biz Markie "Little Twelvetoes" - Chavez "Verb: That's What's Happening" - Moby "Interplanet Janet" - Man or Astro-man? "Lolly, Lolly, Lolly, Get Your Adverbs Here" - Buffalo Tom "Unpack Your Adjectives" - Daniel Johnston "The Tale of Mr. Morton" - Skee-Lo

Cloud Security Tops Priority List for Organizations Globally

27 June 2024 at 06:57
cloud security, organizations, endpoint data Trend Micro

Cloud security has become a major focus for organizations worldwide as they battle with a growing number of data breaches and application sprawl that makes defense more complicated.

The post Cloud Security Tops Priority List for Organizations Globally appeared first on Security Boulevard.

USENIX Security ’23 – Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment

26 June 2024 at 15:00

Authors/Presenters:Dominic Deuber, Michael Keuchen, Nicolas Christin

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment appeared first on Security Boulevard.

May and June 2024 in space

26 June 2024 at 16:32
Around the sun, into orbit, towards the asteroids, to the moon and back again It's been too long since an update on humanity's space exploration. Let's catch up. There's a lot going on:

Sun NASA's Solar Dynamics Observatory imaged Sol firing off two strong solar flares. The European Space Agency (ESA) published close-up footage of the Sun taken by the Solar Orbiter. Venus Researchers used Magellan spacecraft data from the early 1990s to determine that Venus probably has some ongoing volcanic activity. On Earth's surface Construction on the Vera C. Rubin Observatory in Chile is nearly finished. In Texas SpaceX wants to produce one Starship rocket per day in their impending StarFactory. From Earth to orbit Successes: after months of delays, Boeing's Starliner finally launched and carried two astronauts to dock with the International Space Station (ISS), albeit with persistent helium leaks and thruster problems (previously). SpaceX launched and for the first time successfully splashed down a Starship. SpaceX reports it now carries 87% of orbital tonnage. A Long March 2C rocket carried a Franco-Chinese satellite, the Space Variable Objects Monitor (SVOM), into orbit to study gamma ray bursts. NASA's first Polar Radiant Energy in the Far-InfraRed Experiment (PREFIRE) cubesat rode a Rocket Lab Electron rocket from Māhia, New Zealand into orbit, followed by another. Rocket Lab also orbited a South Korean Earth observing satellite as well as a solar sail experiment. GOES-U, the fourth and final satellite in the Operational Environmental Satellites (GOES) – R Series, rode a Falcon Heavy into orbit. South Korea confirmed a North Korean launch failed to reach orbit. In Earth orbit "For the first time in history, three different crewed vehicles, Starliner, SpaceX's Dragon, and Russia's Soyuz, were all simultaneously docked" at the ISS. Zebrafish on the Tiangong space station are "showing directional behavior anomalies, such as inverted swimming and rotary movement." (video) NASA has delayed Starliner's return indefinitely. Leaks on the ISS are a persistent problem. The Hubble space telescope lost another gyroscope. An astronaut wants to help. Back down to Earth The Indian Space Research Organisation (ISRO) is working on making its space missions free of debris. A video clip shows a Chinese rocket falling near a village. NASA confirmed that SpaceX debris fell on North Carolina. Earth's moon Chang'e-6 (嫦娥六号) blasted off from Earth, traveled to the moon, then landed in the South Pole–Aitken basin, taking a selfie, and planting a flag made of stone. Two days later its ascender lifted off, carrying two kilograms of lunar material, which it delivered to its orbiter, which then transported the stuff successfully to the Earth's surface. (mix of official video footage and animation) Lunar plans: Roscosmos and the China National Space Administration (CNSA) announced their intention to build a nuclear power plant on the moon by 2035. A Japanese billionaire canceled his planned lunar trip. Mars The ESA and NASA agreed on a shared Martian rover project. NASA awarded nine companies grants to develop feasibility studies for Martian missions. To the asteroids Beyond the orbit of Mars, heading to its first asteroid, NASA's Psyche spacecraft fired up its electric thrusters. A research team applied AI to Hubble data and found more than 1,000 new asteroids. Saturn NASA approved funding for the Dragonfly mission to Titan. In the Kuiper belt Voyager 1 restarted sending data all the way back to Earth. (previously) Way, way beyond the solar system The James Webb space telescope imaged the farthest known galaxy, JADES-GS-z14-0.
❌
❌