-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Aug 12, 2023


Microsoft Problems, Windows TCO

Gemini Articles of Interest



White House National Cyber Director requests feedback on open-source software security


↺ White House National Cyber Director requests feedback on open-source software security


> Last week, the White House said it would launch a Defense Advanced Research Projects Agency competition focused on using artificial intelligence to fix bugs created, in particular, by open-source software.



US Government Launches Cyber Contest to Harness AI for National Security


↺ US Government Launches Cyber Contest to Harness AI for National Security


> The White House launched a multimillion-dollar cyber contest to use artificial intelligence (AI) to detect and fix security vulnerabilities in the U.S. government's digital infrastructure in response to hackers' growing use of AI.



Say Hello to Downfall, Another Data-Leaking Security Hole in Several Years of Intel Chips


↺ Say Hello to Downfall, Another Data-Leaking Security Hole in Several Years of Intel Chips


> [BLACK HAT] Googlers have lately found not one but two more security vulnerabilities in Intel and AMD processors that can be exploited to steal sensitive data from a vulnerable computer's memory.



The Inability to Simultaneously Verify Sentience, Location, and Identity


↺ The Inability to Simultaneously Verify Sentience, Location, and Identity


> Really interesting “systematization of knowledge” paper: [...]


↺ paper


↺ paper



UK electoral body breached through Microsoft Exchange Server: claim


↺ UK electoral body breached through Microsoft Exchange Server: claim


> An unpatched vulnerability in Microsoft Exchange Server appears to have been the entry point for the attackers who breached the systems of the UK Electoral Commission, a fact disclosed by the agency on Wednesday 10 months after it was spotted.



Protecting Chrome Traffic with Hybrid Kyber KEM


↺ Protecting Chrome Traffic with Hybrid Kyber KEM


> Teams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 22:48:48 2024