ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Miscellaneous Tech News

    News
    83
    7.4k
    2.6m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • mlnewsM
      mlnews
      last edited by

      Coronavirus: UK contact-tracing app 'ready in two to three weeks'

      Building a coronavirus contact-tracing app that might help the UK emerge from lockdown has been a titanic effort - and it has largely taken place in private.
      But now the NHS chief responsible has told MPs he hopes the first version will be ready in a fortnight's time. Matthew Gould also disclosed plans to log the location of whenever two or more people are in close proximity for minutes at a time. That will disturb privacy campaigners. However, NHSX - the health service's digital innovation unit - has told BBC News this extra request will be "opt in" rather than the default setting.

      1 Reply Last reply Reply Quote 0
      • mlnewsM
        mlnews
        last edited by

        AI cannot be recognised as an inventor, US rules

        An artificial intelligence system has been refused the right to two patents in the US, after a ruling only "natural persons" could be inventors.
        The US Patent and Trademark Office rejected two patents where the AI system Dabus was listed as the inventor, in a ruling on Monday. US patent law had previously only specified eligible inventors had to be "individuals". And its creator, physicist and AI researcher Stephen Thaler, had argued that because he had not helped it with the inventions, it would be inaccurate to list himself as the inventor.

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @mlnews
          last edited by

          @mlnews said in Miscellaneous Tech News:

          AI cannot be recognised as an inventor, US rules

          An artificial intelligence system has been refused the right to two patents in the US, after a ruling only "natural persons" could be inventors.
          The US Patent and Trademark Office rejected two patents where the AI system Dabus was listed as the inventor, in a ruling on Monday. US patent law had previously only specified eligible inventors had to be "individuals". And its creator, physicist and AI researcher Stephen Thaler, had argued that because he had not helped it with the inventions, it would be inaccurate to list himself as the inventor.

          Probably best as AI can't sue you, either. It just means that the owner of the AI, not the AI, has to be listed.

          1 Reply Last reply Reply Quote 0
          • black3dynamiteB
            black3dynamite
            last edited by black3dynamite

            What’s New with Pop!_OS 20.04 LTS
            https://blog.system76.com/post/616861064165031936/whats-new-with-popos-2004-lts

            https://pop.system76.com/

            1 Reply Last reply Reply Quote 1
            • DanpD
              Danp
              last edited by

              Salt Bugs Allow Full RCE as Root on Cloud Servers

              The open-source Salt management framework contains high-severity security vulnerabilities that allow full remote code execution as root on servers in data centers and cloud environments. And in-the-wild attacks are expected imminently.

              DanpD 1 Reply Last reply Reply Quote 0
              • black3dynamiteB
                black3dynamite
                last edited by

                https://www.altaro.com/hyper-v/office-365-microsoft-365/

                1 Reply Last reply Reply Quote 0
                • DanpD
                  Danp @Danp
                  last edited by

                  @Danp said in Miscellaneous Tech News:

                  Salt Bugs Allow Full RCE as Root on Cloud Servers

                  The open-source Salt management framework contains high-severity security vulnerabilities that allow full remote code execution as root on servers in data centers and cloud environments. And in-the-wild attacks are expected imminently.

                  Looks like they weren't kidding...

                  https://www.zdnet.com/article/hackers-breach-lineageos-servers-via-unpatched-vulnerability/

                  1 Reply Last reply Reply Quote 0
                  • 1
                    1337
                    last edited by 1337

                    US govt updates O365 security best practices

                    https://www.us-cert.gov/ncas/alerts/aa20-120a

                    Summary

                    CISA encourages organizations to implement an organizational cloud strategy to protect their infrastructure assets by defending against attacks related to their O365 transition and better securing O365 services.

                    Specifically, CISA recommends that administrators implement the following mitigations and best practices:

                    • Use multi-factor authentication. This is the best mitigation technique to protect against credential theft for O365 administrators and users.
                    • Protect Global Admins from compromise and use the principle of “Least Privilege.”
                    • Enable unified audit logging in the Security and Compliance Center.
                    • Enable Alerting capabilities.
                    • Integrate with organizational SIEM solutions.
                    • Disable legacy email protocols, if not required, or limit their use to specific users.
                    EddieJenningsE 1 Reply Last reply Reply Quote 1
                    • EddieJenningsE
                      EddieJennings @1337
                      last edited by

                      @Pete-S said in Miscellaneous Tech News:

                      US govt updates O365 security best practices

                      https://www.us-cert.gov/ncas/alerts/aa20-120a

                      Summary

                      CISA encourages organizations to implement an organizational cloud strategy to protect their infrastructure assets by defending against attacks related to their O365 transition and better securing O365 services.

                      Specifically, CISA recommends that administrators implement the following mitigations and best practices:

                      • Use multi-factor authentication. This is the best mitigation technique to protect against credential theft for O365 administrators and users.
                      • Protect Global Admins from compromise and use the principle of “Least Privilege.”
                      • Enable unified audit logging in the Security and Compliance Center.
                      • Enable Alerting capabilities.
                      • Integrate with organizational SIEM solutions.
                      • Disable legacy email protocols, if not required, or limit their use to specific users.

                      They all read as common sense to me 🙂

                      scottalanmillerS 1 Reply Last reply Reply Quote 2
                      • scottalanmillerS
                        scottalanmiller @EddieJennings
                        last edited by

                        @EddieJennings said in Miscellaneous Tech News:

                        They all read as common sense to me

                        So not exactly expected from the US gov't.

                        1 Reply Last reply Reply Quote 2
                        • mlnewsM
                          mlnews
                          last edited by

                          Coronavirus: Far-right spreads Covid-19 'infodemic' on Facebook

                          "What if [they] are trying to kill off as many people as possible" reads one Facebook post.
                          "Eventually, these scum will release something truly nasty to wipe us all out, but first they have to train us to be obedient slaves" reads another. A third: "Coronavirus is the newest Islamist weapon." Many of us by now will have seen something of the "infodemic" the World Health Organization (WHO) warned is swirling across society. Whether popping into your online timeline or maybe forwarded by a relative, it would have been a rumour or revelation so eye-grabbing, so shockingly different from the norm, that they're hard to ignore.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            BackBlaze B2 now offers S3 API.

                            1 Reply Last reply Reply Quote 0
                            • black3dynamiteB
                              black3dynamite
                              last edited by

                              https://community.saltstack.com/blog/critical-vulnerabilities-update-cve-2020-11651-and-cve-2020-11652/

                              1 Reply Last reply Reply Quote 0
                              • mlnewsM
                                mlnews
                                last edited by

                                Latvian drone fuelled for days goes missing, restricting airspace

                                Latvian authorities are hunting a 26kg (57lb) drone that went missing mid-flight, causing air-traffic problems.
                                The aviation authority has restricted flights below 19,500ft (6,000m) in the region while they search for it. While officials say it is likely the drone, which took off on Saturday, has landed, it had enough fuel to fly until 19:10 local time on Tuesday (17:10 BST). Many members of the public reported sightings but none has been confirmed. The non-military drone is understood to belong to a local unmanned aerial vehicle (UAV) manufacturer. During a test flight, the company lost communications with the drone and lost track of its location, Latvian media reports.

                                1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch
                                  last edited by

                                  Uncle Sam to agencies: No encrypted DNS for you!

                                  The US federal government has been protecting its users by blocking malicious destinations for years, but it won’t let them take advantage of the latest protective measure in DNS – encryption – just yet. Last month, the US Department of Homeland Security warned government agencies that they’re legally bound to use an internal system that won’t support this feature.

                                  1 Reply Last reply Reply Quote 0
                                  • GreyG
                                    Grey
                                    last edited by

                                    https://exchange.xforce.ibmcloud.com/#/collection/705fd7c8cc1111e72979c5fc52611775

                                    Kaiji - New Chinese Linux Malware

                                    Summary
                                    A new report from Intezer details a new Chinese malware, named Kaiji, that is brute forcing servers and IoT devices. Its name is based on function, the botnet was built from scratch using Golang programming language, a rare occurrence within the IoT botnet arena.

                                    1 Reply Last reply Reply Quote 0
                                    • ObsolesceO
                                      Obsolesce
                                      last edited by

                                      28,000 GoDaddy Hosting Accounts Compromised

                                      "On May 4, 2020, GoDaddy, one of the world’s largest website hosting providers, disclosed that the SSH credentials of approximately 28,000 GoDaddy hosting accounts were compromised by an unauthorized attacker."

                                      1 Reply Last reply Reply Quote 1
                                      • DanpD
                                        Danp
                                        last edited by

                                        Hackers hide web skimmer behind a website's favicon

                                        The trick, according to Malwarebytes, was that the MyIcons..net website served a legitimate favicon file for all a website's pages, except on pages that contained checkout forms.

                                        On these pages, the MyIcons..net website would secretly switch the favicon with a malicious JavaScript file that created a fake checkout form and stole user card details.

                                        1 Reply Last reply Reply Quote 0
                                        • mlnewsM
                                          mlnews
                                          last edited by

                                          Microsoft confirms Windows 10X is coming to laptops amid big jump in Windows usage

                                          More people are turning to Windows PCs during the pandemic
                                          Microsoft is confirming that it’s planning to refocus Windows 10X on single-screen devices. “The world is a very different place than it was last October when we shared our vision for a new category of dual-screen Windows devices,” explains Panos Panay, Microsoft’s Windows and devices chief. “With Windows 10X, we designed for flexibility, and that flexibility has enabled us to pivot our focus toward single-screen Windows 10X devices that leverage the power of the cloud to help our customers work, learn and play in new ways.” Microsoft isn’t saying exactly when single-screen devices like laptops will support Windows 10X, nor when dual-screen devices will launch with the OS. However, Windows 10X will launch on single-screen devices first. “We will continue to look for the right moment, in conjunction with our OEM partners, to bring dual-screen devices to market,” says Panay.

                                          1 Reply Last reply Reply Quote 0
                                          • mlnewsM
                                            mlnews
                                            last edited by

                                            Zoom buys the identity service Keybase as part of 90-day security push

                                            Keybase serves as a secure home for online identities
                                            Zoom has acquired Keybase, an encryption and security service meant to serve as a secure home for your online identities. The acquisition is meant to quickly add a team of security-focused developers to Zoom, which has been widely criticized in recent weeks for lapses in security inside its increasingly popular videoconferencing software. Keybase co-founder Max Krohn will now lead Zoom’s security engineering team.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 372
                                            • 373
                                            • 2 / 373
                                            • First post
                                              Last post