New: computer-securityAll contenthive-129948krhive-196917zzansteemhive-166405hive-183959hive-180932hive-185836photographyhive-183397uncommonlabhive-150122hive-144064hive-101145hive-188619krsuccessbitcoinhive-184714hive-145157hive-193637hive-139150hive-103599lifehive-180301TrendingNewHotLikersremlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for October 4, 2019The importance of adversarial interoperability; An explanation of Segwit; An essay on the trust dilemma in a corporate supply chain; A perspective on the term, quantum supremacy (with a link to the…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for September 28, 2019Provable and tractable algorithms for protein design; A researcher theorizes that obesity is growing because of "ultra-processed" foods; Message rate limiting reduces the spread of misinformation on…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for September 15, 2019A robotic "flying fish" along with IEEE Spectrum's weekly selection of awesome robot videos; An argument to integrate knowledge from genetic engineering and information security; A recursive zero…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for September 9, 2019Massive denial of service attack left wikipedia unreachable in parts of Europe and the Middle East; Moody's expects blockchain standards by 2021; MIT Media Lab insiders say the personal food…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for September 4, 2019Growing access to comp. sci. classes doesn't put high-schoolers in the seats; Tesla users complain of being locked out and stranded when the mobile app stopped working; Samsung files to patent a…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 31, 2019A robotic puppeteer; An electroshock bracelet to deter bad habits; An argument that smart cities should spend more on digital security for infrastructure technologies; A new tablet experience for…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 30, 2019Conducting foreign policy on autopilot; Bikes and ridesharing added to Google Maps; A privilege escalation vulnerability announced in Checkpoint's Endpoint Security; Bug bounty up to $10,000 for…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 23, 2019MoviePass leaked thousands of unencrypted credit card numbers; Another argument against the current thinking about "old age"; Biology's role in defining moods, behavior, and identity; A Block.One…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 9, 2019DoJ says AT&T workers took $1 million to unlock 2 million phones; EU court says sites must get consent to send data via Facebook's "Like" button; An AI mastered chess by reading about it; Valve, Inc…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 7, 2019Capital One's breach was enabled by a long-known vulnerability; Discovery of "clock-like" neurons; An argument for the preservation of spiders; Recaptcha considered harmful; A Steem essay on the…remlaps-lite (76)in rsslog • 5 years agoCurating the Internet: Science and technology micro-summaries for August 4, 2019Federal regulators eyeing Amazon cloud storage; A Steem biography of Marie Curie; Correction on Facebook backdoor reporting; Shelter dogs protecting endangered species; IEEE Spectrum's weekly…eminentodih (25)in windows-vulnerability • 6 years ago1⃣ Million Computers Still Vulnerable to Major Windows⚠ Security ExploitMicrosoft has warned that nearly one million computers globally are still at risk of malware attack similar to WannaCry that spread worldwide in 2017 causing billions of dollars in damage. The…newsrx (9)in italy • 7 years agoRisk Assessment in Social Networks Based on User Anomalous BehaviorsBy a News Reporter-Staff News Editor at Computers, Networks & Communications -- A new study on Computers - Computer Security is now available. According to news reporting originating from Varese…d7795 (55)in kr • 7 years ago인텔 CPU 취약점 패치 후 성능 하락은???안녕하세요 공맹이 입니다. 오늘 CPU 취약점에 대한 업데이트가 나왔습니다. 수동으로는 지금 바로 패치를 적용 할수 있습니다. 9일 부터는 자동으로 업데이트가 될것이라고 합니다. 수동으로 업데이트를 실시 하기 위해서는 시작 메뉴에서 설정 메뉴 선택 하고 업데이트 및 보안을 눌릅니다. 그 후 업데이트 확인을 눌르게…