Sat.Nov 02, 2019

article thumbnail

CVE-2019-2114 flaw allows hackers to plant malware on Android devices via NFC beaming

Security Affairs

A vulnerability affecting devices running Andoid 8 (Oreo) or later, tracked as CVE-2019-2114, could be exploited by hackers to infect them via NFC beaming. Google has recently released a patch to address a vulnerability affecting devices running Android 8 (Oreo) or later, tracked as CVE-2019-2114, that could be exploited to infect nearby phones via NFC beaming.

article thumbnail

The First BlueKeep Mass Hacking Is Finally Hereā€”but Don't Panic

WIRED Threat Level

After months of warnings, the first successful attack using Microsoft's BlueKeep vulnerability has arrivedā€”but isn't nearly as bad as it could have been.

IT 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proton Technologies makes the code of ProtonMail iOS App open source

Security Affairs

Proton Technologies announced this week that it has made available the source code of its popular ProtonMail iOS App. The Proton Technologies firm continues to propose initiatives aimed at ensuring the transparency of its ProtonMail applications, this week it announced the availability of the source code of its popular ProtonMail iOS App. Recently the cybersecurity firm SEC Consult reviewed the source code of the ProtonMail iOS App and found seven low-risk vulnerabilities in the popular mobile m

article thumbnail

WhatsApp Hack Targeted Officials in More Than 20 Countries

WIRED Threat Level

NSO Group exploits, *Counter-Strike* money laundering, and a Pentagon scam are among the weekā€™s top security news.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. Itā€™s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Desjardins credit union data breach bigger than initially thought

Security Affairs

The data breach suffered by Canada Desjardins credit union last year is bigger than initially thought, it affected all 4.2 million of its customers. In June, Desjardins credit union announced a data breach that exposed personal banking information of 2.9 million customers. Unfortunately, the data breach is bigger than initially thought and affected all 4.2 million of bank customers.