How can we avoid coded bias in facial recognition tech?

How can we avoid coded bias in facial recognition tech?

Artificial intelligence (AI) researcher, Joy Buolamwini, has spent the last four years raising awareness of the social implications and possible harm of the technology. Inspired by her own experiences of facial recognition tech she founded the Algorithmic Justice League and recently became the star of the Netflix documentary Coded Bias. BBC Click’s Spencer Kelly finds…

Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack

Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack

Ivanti, the company behind Pulse Secure VPN appliances, has released a security patch to remediate a critical security vulnerability that was found being actively exploited in the wild by at least two different threat actors. Tracked as CVE-2021-22893 (CVSS score 10), the flaw concerns “multiple use after free” issues in Pulse Connect Secure that could…

Discovered New Vulnerability Affecting Computers Globally – Eurasia Review

Discovered New Vulnerability Affecting Computers Globally – Eurasia Review

In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Researchers named the vulnerability Spectre because the flaw was built into modern computer processors that get their speed from a technique called “speculative execution,” in which the processor predicts instructions it might end up executing…

Australia proposes teaching cyber-security to five-year-old kids

Australia proposes teaching cyber-security to five-year-old kids

Australia has decided that six-year-old children need education on cyber-security, even as it removes other material from the national curriculum. A newly revised draft of the national curriculum for children aged five to sixteen, launched yesterday, added a new strand titled “Considering privacy and security” that “involves students developing appropriate techniques for managing data, which…

Vulnerability about HCL Domino: buffer overflow via iNotes

Vulnerability about HCL Domino: buffer overflow via iNotes

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. Synthesis of the vulnerability  An attacker can trigger a buffer overflow via iNotes of HCL Domino, in order to trigger a denial of service, and possibly to run code.Impacted products: Domino by HCL,…

Vulnerability MongoDB Server denial of service via UUID Explain

Vulnerability MongoDB Server denial of service via UUID Explain

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. Synthesis of the vulnerability  An attacker can trigger a fatal error via UUID Explain of MongoDB Server, in order to trigger a denial of service.Vulnerable software: MongoDB Server.Severity of this announce: 2/4.Creation date:…

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Most mobile app users tend to blindly trust that the apps they download from app stores are safe and secure. But that isn’t always the case. To demonstrate the pitfalls and identify vulnerabilities on a large scale, cybersecurity and machine intelligence company CloudSEK recently provided a platform called BeVigil where individuals can search and check…

‘We spent 40 days in a cave without sunlight or watches’

‘We spent 40 days in a cave without sunlight or watches’

Fifteen people from various backgrounds have recently left a cave in south-west France after 40 days underground. The experiment was designed to see how the absence of clocks, daylight and external communications would affect the participants’ sense of time. Project director Christian Clot and Marina Lançon, one of the volunteers in the study, told BBC…