Samsung Security Tech Forum 2021

Shared subjects include; Security engineering and machine learning, Telephony gone the way of the internet?: Combating threats targeting voice communication, Challenges in automated vulnerability discovery through Fuzzing among others.

Firefox up paying Bug Bounty

Mozilla has updated its bug bounty policy to make it more appealing to security researchers. It has also launched a new website for security researchers, and Firefox bug bounty participants. Tom Ritter, in his inaugural post to the new  Attack & Defense blog took the opportunity to review the recent performance of the Firefox bug bounty program, which he notes began in 2004. Between 2017-2019, Mozilla paid out $965,750 to researchers across 348 bugs, making the...

Big tech doings

DocuvideosBig tech doings

2 February, 20202 min

Once a sleepy farming region, Silicon Valley is now the hub of a global industry that is transforming the economy, shaping our political discourse, and changing the very nature of our society. So what happened? How did this remarkable change take place? Why is this area the epicenter of this transformation? Discover the dark secrets behind the real history of Silicon Valley and the Big Tech giants in this important edition of The Corbett Report....

Thermomechanical Material Point

Computer graphics isn’t the same thing as simulation. It doesn’t have to be accurate, it simply has to look right. What about baking? Watch bread, cookies and pancakes cook in “fake baking” mode. Creating computer graphics of liquids and dust is hard enough, but materials that we cook are very complex. First you have the dough or batter which is a complicated viscoelastic solid. Next you have the effect of heat, which slowly changes the...

Bluetooth encryption broken

Researchers have broken Bluetooth’s encryption key negotiation protocol using an attack they’ve called KNOB – Key Negotiation Of Bluetooth. The vulnerability affects almost all devices that support Bluetooth, but Google has already announced patches for Android devices. The vulnerability was reported in a paper given at this year’s USENIX Security Symposium in California. The researchers, Kasper B. Rasmussen from Oxford University, Daniele Antonioli of Singapore University of Technology, and Nils Ole Tippenhauer of the CISPA...

Is Rust the low-level-ish

Rust is the great hope for a safe low-level programming language. This is often expressed in the motto “fearless concurrency”, but who is to say that it really is better. Perhaps it’s just as bad in different ways. New research by Zeming Yu, Linhai Song, Yiying Zhang at Pennsylvania State University and Purdue University aims to find out if Rust’s approach to concurrency really does protect the programmer from making the sort of mistake so...

The six stages of Digital Transformation

The definition of digital transformation is the realignment of, or new investment in, technology, business models, and processes to drive new value for customers and employees and more effectively compete in an ever-changing digital economy. This is how I define digital transformation, having evolved it slightly over the years. This definition, which was introduced in 2013/14, was different at the time in that it didn’t solely focus on technology. Early in its rise though the...