Apple’s Vision Pro and the coming healthcare revolution
Once upon a time, a young doctor joined the surgical unit at a prestigious hospital as an anaesthesiologist....
Russian Turla Hackers Target Polish NGOs with New TinyTurla-NG Backdoor
The Russia-linked threat actor known as Turla has been observed using a new backdoor called TinyTurla-NG as part of a...
Product Safety Report: 5-in-1 Hair Curler sold via Amazon (2401-0038)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries
A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again...
Private Branch Exchange (PBX) best practice
Protecting your organisation’s telephony systems from cyber attacks and telecoms fraud. Source:: NCSC Guidance
ChatGPT will remember what you did last summer
OpenAI is testing a memory feature in ChatGPT, which will allow it to remember information about the user...
NIST Researchers Suggest Historical Precedent for Ethical AI Research
The Belmont Report’s guidelines could help avoid repeating past mistakes in AI-related human subjects research. Source:: NIST
New NIST Database of ‘Forever Chemicals’ Will Help Scientists Monitor Environmental Pollution
NIST has developed a first-of-its-kind database to help researchers identify and categorize unknown PFAS. Source:: NIST
How Nation-State Actors Target Your Business: New Research Exposes Major SaaS Vulnerabilities
With many of the highly publicized 2023 cyber attacks revolving around one or more SaaS applications, SaaS has...
Unlock your Android phone’s physical gesture magic
When we talk about Android gestures, we’re typically talking about the on-screen variety — y’know, the assorted swipes,...
How to use Google’s genAI-powered note-taking app
Among the experimental tools that Google offers is NotebookLM, a bare-bones notes app that you use in your...
Chinese Hackers Using Deepfakes in Advanced Mobile Banking Malware Attacks
A Chinese-speaking threat actor codenamed GoldFactory has been attributed to the development of highly sophisticated banking trojans, including a previously...
Critical Exchange Server Flaw (CVE-2024-21410) Under Active Exploitation
Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited...
SpaceX’s legal home moved to Texas, says Elon Musk
It comes after a judge in Delaware annulled his $55.8bn pay package from electric carmaker Tesla. Source:: BBC...
Future data centres may have built-in nuclear reactors
As AI uses more electricity, new data centres could have their own nuclear power stations. Source:: BBC News...
Offenders confused about ethics of AI child abuse
A charity warns that creating or viewing such images is still illegal, even if the children are not...
X took payment from terrorists, campaigners say
Campaigners at the Tech Transparency Project in the US found paid-for features for organisations. Source:: BBC News –...
AWS IoT Device Management Software Package Catalog available in AWS GovCloud (US) Regions
AWS IoT Device Management Software Package Catalog (SPC) is now available in the AWS GovCloud (US-East) and AWS...
Amazon OpenSearch Serverless now supports TLS 1.3 and perfect forward secrecy
We are pleased to announce Amazon OpenSearch Serverless now offers improved security options for workloads with the support...
Accelerating Drug Discovery at Receptor.AI with NVIDIA BioNeMo Cloud APIs
The quest for new, effective treatments for diseases that remain stubbornly resistant to current therapies is at the...