Sat.Jun 22, 2019

article thumbnail

Flaws allow hacking a system playing untrusted videos on VLC Player

Security Affairs

Two vulnerabilities in VLC media player could allow remote attackers to take full control over a computer system while playing untrusted videos. An attacker could remotely take full control over a computer system while playing untrusted videos with any version of VLC media player software prior to 3.0.7. The hack is possible due to two high-risk security flaws (CVE-2019-5439, CVE-2019-12874 ) that could potentially lead to arbitrary code execution attacks.

article thumbnail

Bringing big tech to heel: how do we take back control of the internet?

The Guardian Data Protection

As the web evolves, we should ask how we can maximise its benefits for all and mitigate the obvious damage When new technology destroyed their livelihood in the early 19th century, a group of workers in northern England took matters into their own hands. They were alpha males, the fittest of the farm workers with the best gig of their time: whacking and cutting sheets of woven wool into shape and then “cropping” the rough surface to make it smooth enough to become stockings for the aristocracy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Android Botnet leverages ADB ports and SSH to spread

Security Affairs

Trend Micro recently discovered an Android crypto-currency mining botnet that can spread via open ADB (Android Debug Bridge) ports and Secure Shell (SSH). Security researchers at Trend Micro have discovered an new Android crypto-currency mining botnet that spreads via open ADB ( Android Debug Bridge ) ports and Secure Shell (SSH). The Android Debug Bridge ( adb ) is a command-line tool that allows developers to communicate with an Android device.

Mining 61
article thumbnail

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

WIRED Threat Level

A ransomware haul, a border security leak, and more of the week's top security news.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.