Automatic Cheating Detection in Human Racing
This is a fascinating glimpse of the future of automatic cheating detection in sports: Maybe you heard about the truly insane false-start controversy in track...
Reflections in your glasses can leak information while you’re on a Zoom call
Bespectacled video conferencing participants have more to worry about than if their hair is uncombed or they have some spinach stuck between their teeth. According...
Penetration testing is in the eye of the beholder
"Beauty is in the eye of the beholder." A famous phrase known to all indicates that our perceptions influence our definitions. The same can be...
Energy bill rebate scams spread via SMS and email
The UK’s National Cyber Security Centre (NCSC) has warned that fraudsters are sending out emails and SMS texts urging homeowners to sign up for a...
CVE-2022-0495 (koha_library_automation)
The library automation system product KOHA developed by Parantez Teknoloji before version 19.05.03 has an unauthenticated SQL Injection vulnerability. This has been fixed in the...
Video Game Publisher Admits Helpdesk Was Hijacked
Players were sent malicious links disguised as support tickets Read More
Top 5 attack surface challenges related to security operations
According to newly published ESG research, just over half of all organizations (52%) say that security operations are more difficult today than they were two...
Open Source Repository Attacks Soar 700% in Three Years
Sonatype says it has detected 95,000 since 2019 Read More
ZDI-22-1295: Apple macOS TIFF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the CoreGraphics framework is required to exploit this...
DSA-5233 e17 – security update
Maher Azzouzi discovered that missing input sanitising in the Enlightenment window manager may result in local privilege escalation to root. Read More