Software

Boosting faith in the authenticity of open source software

Open source software—software that is freely distributed, along with its source code, so that copies, additions, or modifications can be readily made —is "everywhere," to quote the 2023 Open Source Security and Risk Analysis ...

Software

High-performance detection tool for ReDoS-vulnerability

Regular expressions (regexes) are widely used in different fields of computer science. However, the Regular expression Denial of Service (ReDoS) vulnerability forms a class of common and serious algorithmic complexity attacks.

Security

Defending smart systems on the machine learning framework level

While smart cities and smart homes have become mainstream buzzwords, few people outside the IT and machine learning communities know about TensorFlow, PyTorch, or Theano. These are the open-source machine learning (ML) frameworks ...

Consumer & Gadgets

Research: Millions of smart devices vulnerable to hacking

Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices—flaws that could be exploited by hackers to penetrate business and home computer networks ...

page 1 from 2