News Warner Logo

News Warner

Cybersecurity

A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks

A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks A militarily degraded Iran may turn to asymmetrical warfare, including proxy and cyber attacks, as Israel’s air assault on Iran has compromised its conventional military capabilities. Iran’s “forward deterrence” doctrine, which aims to target adversaries before they reach […]

📰 News

DIP Events

DIP Events Digital Information Platform (DIP) has announced several upcoming events, including a virtual workshop on service quality and cybersecurity. The DIP has also hosted various workshops and information sessions in the past, including “DIP Workshop Series 3: DIP for Consumers” and “DIP Request for Information (RFI) Information Session”. The DIP is part of NASA’s […]

📰 News

AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing

AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing AI tools collect and store data about you from all your devices, including smartphones, smart home speakers, fitness trackers, and more, often without your knowledge or consent. The data collected by AI tools […]

💻 Technology

How illicit markets fueled by data breaches sell your personal information to criminals

How illicit markets fueled by data breaches sell your personal information to criminals Illicit markets fueled by data breaches sell personal information to criminals, often using cryptocurrencies like Bitcoin. The quantity problem: The sheer amount of stolen data from breaches makes it difficult for hackers and cybercriminals to efficiently process, validate, or use the information, […]

💻 Technology

Forensics tool ‘reanimates’ the ‘brains’ of AIs that fail in order to understand what went wrong

Forensics tool ‘reanimates’ the ‘brains’ of AIs that fail in order to understand what went wrong A new forensics tool called AI Psychiatry can “reanimate” failed AIs to understand what went wrong, helping investigators identify causes of failures and vulnerabilities. The system uses forensic algorithms to isolate data behind an AI’s decision-making, then reassembles it […]

💻 Technology

France accuses Russia of a decade’s worth of high-profile cyberattacks

France accuses Russia of a decade’s worth of high-profile cyberattacks France has publicly accused Russia of sponsoring high-profile cyberattacks on French entities for over a decade, including a faked Islamic State takeover and the leak of President Emmanuel Macron’s emails in 2017. The attacks are attributed to APT28, a Russian military intelligence hacking unit also […]

📰 News

Trump administration decides to fund CVE cybersecurity tracker after all

Trump administration decides to fund CVE cybersecurity tracker after all The US government has decided to fund the Common Vulnerabilities and Exposures (CVE) cybersecurity tracker program after all. The CVE program, which tracks cybersecurity vulnerabilities globally, was set to expire on April 16th due to its contract with MITRE expiring. MITRE announced an initiative to […]

💻 Technology

The CVE program for tracking security flaws is about to lose federal funding

The CVE program for tracking security flaws is about to lose federal funding The CVE (Common Vulnerabilities and Exposures) program, used by major companies to track security flaws, will lose federal funding starting April 16th. The CVE program, developed and operated by MITRE, a federally funded organization, has been tracking publicly disclosed cybersecurity vulnerabilities since […]

💻 Technology

Simulated Musk, Zuckerberg voices are speaking from hacked crosswalk buttons

Simulated Musk, Zuckerberg voices are speaking from hacked crosswalk buttons Simulated voices of Elon Musk and Mark Zuckerberg have been heard coming from hacked crosswalk buttons in at least three California cities, including Palo Alto, Redwood City, and Menlo Park. The hack appears to have taken place on Friday, with the voice features being used […]

💻 Technology

Signal is not the place for top secret communications, but it might be the right choice for you – a cybersecurity expert on what to look for in a secure messaging app

Signal is not the place for top secret communications, but it might be the right choice for you – a cybersecurity expert on what to look for in a secure messaging app Signal is in the news because of a security failure, but the app itself is quite secure. AP Photo/Kiichiro Sato When top White […]

💻 Technology