Security

Defending smart systems on the machine learning framework level

While smart cities and smart homes have become mainstream buzzwords, few people outside the IT and machine learning communities know about TensorFlow, PyTorch, or Theano. These are the open-source machine learning (ML) frameworks ...

Consumer & Gadgets

Research: Millions of smart devices vulnerable to hacking

Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices—flaws that could be exploited by hackers to penetrate business and home computer networks ...

Software

Google team reveals zero-day Windows exploit

Google reported a new zero-day vulnerability in Windows Friday that allows for privilege escalation and sometimes resulted in a crash. The vulnerability is a buffer overflow type in a driver found in Windows versions 7 and ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

page 10 from 17