Sat.May 04, 2019

article thumbnail

Japan will develop its first-ever malware as a defense measure against cyber attacks

Security Affairs

The news was reported by the Kyodo News and has caught my attention, Japan will develop its first-ever computer virus as defense against cyber attacks. The Kyodo News revealed that Japan will develop its first-ever computer virus as a defense measure against cyber attacks and that the development will be completed by next March. The Defense Ministry plans to use the malware as a vaccine that could neutralize the other malicious codes.

IT 103
article thumbnail

Don’t seize rape complainants' mobiles, say police bosses

The Guardian Data Protection

Association takes unusual step of intervening in row, saying move would undermine public confidence in justice system Britain’s police commissioners are calling on the Crown Prosecution Service to withdraw a controversial new form issued to rape complainants telling them to hand over their mobile phones or risk seeing their case discontinued. The Association of Police and Crime Commissioners (APCC), whose members include a commissioner who is a rape victim, told the Observer that use of the form

Risk 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Expert found hundred of vulnerable Jenkins Plugins

Security Affairs

A security researcher discovered vulnerabilities in more than 100 plugins of the Jenkins open source software development automation server. Jenkins is the most popular open source automation server, it is maintained by CloudBees and the Jenkins community. The automation server supports developers build, test and deploy their applications, it has hundreds of thousands of active installations worldwide with more than 1 million users.

article thumbnail

They Don't Leave Us Alone Anywhere We Go - Gender and Digital Abuse in South Asia

Elie

South Asia faces one of the largest gender gaps online globally, and online safety is one of the main barriers to gender-equitable Internet access. To better understand the gendered risks and coping practices online in South Asia, we present a qualitative study of the online abuse experiences and coping practices of 199 people who identified as women and 6 NGO staff from India, Pakistan, and Bangladesh, using a feminist analysis.

Risk 54
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mozilla plans to ban Firefox Extensions containing obfuscated code

Security Affairs

Mozilla is going to update the Add-on Policy for Firefox to ban Firefox extensions containing obfuscated code starting from June 10, 2019. Mozilla announced a change to the Add-on Policy for Firefox to ban Firefox extensions containing obfuscated code starting from June 10, 2019. The move aims to prevent malicious extensions to threaten Firefox users. “As part of our ongoing work to make add-ons safer for Firefox users , we are updating our Add-on Policy to help us respond faster to repor

Privacy 77

More Trending

article thumbnail

The privacy paradox: why do people keep using tech firms that abuse their data? | John Naughton

The Guardian Data Protection

Despite privacy scandals, Facebook is more profitable than ever – journalists must use the tools of tech to understand why A dark shadow looms over our networked world. It’s called the “ privacy paradox ”. The main commercial engine of this world involves erosion of, and intrusions upon, our privacy. Whenever researchers, opinion pollsters and other busybodies ask people if they value their privacy, they invariably respond with a resounding “yes”.

Privacy 53
article thumbnail

Episode 9 Spoilers

Adam Shostack

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end. Film critics have long talked about how Star Wars is about Luke’s Hero’s Journey, or the core trilogy is about his relationship to his father, but they’re wrong. Also, I regularly say that Star Wars is fundamentally the story of information disclosure: from the opening shot of Princess Leia’s ship being pursued through the climatic destruction of the Death Star, it’

article thumbnail

Mysterious attacks wipe Git repositories and ask a ransom to rescue code

Security Affairs

Extortion practice hit programmers’ Git repositories, experts observed a new piece of ransomware that wipes them and replaces the code with a ransom note. Hackers are using a new piece of ransomware to target GitHub, GitLab, and Bitbucket repositories, wiping code and commiting, and leaving a ransom note. The hackers wipe out all commit history and leave just a single commit named ‘WARNING’ that contains a single file: Some of the reports published online by the victims ( 1 , 2