When ChatGPT was introduced last fall, it sent shockwaves through the technology industry and the larger world. Machine learning researchers had been experimenting with large language models (LLMs) for a few years by that point, but the general public had not been paying close attention and didn’t realize how powerful they had become. Today, almost everyone has heard about LLMs, and tens of millio
Enlarge / Just a few of the many Google messaging logos. Can you name them all? Google Talk, Google's first-ever instant messaging platform, launched on August 24, 2005. This company has been in the messaging business for 16 years, meaning Google has been making messaging clients for longer than some of its rivals have existed. But thanks to a decade and a half of nearly constant strategy changes,
Linux has yet another high-severity vulnerability that makes it easy for untrusted users to execute code capable of carrying out a host of malicious actions, including installing backdoors, creating unauthorized user accounts, and modifying scripts or binaries used by privileged services or apps. Dirty Pipe, as the vulnerability has been named, is among the most serious Linux threats to be disclos
More than five years have passed since researchers warned of the serious security risks that a widely used administrative tool poses to servers used for some of the most sensitive and mission-critical computing. Now, new research shows how baseboard management controllers, as the embedded hardware is called, threaten premium cloud services from IBM and possibly other providers. In short, BMCs are
Google successfully made its case to a jury last year that its use of Java APIs in Android was "fair use." A San Francisco federal jury rejected Oracle's claim that the mobile system infringed Oracle's copyrights. But Oracle isn't backing down. Late Friday, the company appealed the high-profile verdict to a federal appeals court. This is the latest stage of a seemingly never-ending legal battle ov
A Dutch security firm recently fell victim to a well-executed attack that allowed hackers to take control of its servers and intercept clients' login credentials and confidential data. The security firm, Fox-IT, said in a blog post published last week that the so-called "man-in-the-middle attack" lasted for 10 hours and 24 minutes, although the attack was largely contained for much of that time. T
Enlarge / 750,000 Estonian cards that look like this use a 2048-bit RSA key that can be factored in a matter of days. A crippling flaw in a widely used code library has fatally undermined the security of millions of encryption keys used in some of the highest-stakes settings, including national identity cards, software- and application-signing, and trusted platform modules protecting government an
A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible. While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are seve
A key guarantee provided by HTTPS encryption is that the addresses of visited websites aren't visible to attackers who may be monitoring an end user's network traffic. Now, researchers have devised an attack that breaks this protection. The attack can be carried out by operators of just about any type of network, including public Wi-Fi networks, which arguably are the places where Web surfers need
I attended my first WWDC in 2006 to participate in Apple's launch of its DTrace port to the next version of Mac OS X (Leopard). Apple completed all but the fiddliest finishing touches without help from the DTrace team. Even when Apple did meet with us, we had no idea that it was mere weeks away from the finished product being announced to the world. DTrace was a testament both to Apple's engineeri
Though the feature wasn’t mentioned in Apple’s WWDC 2016 keynote, I’m most excited about the introduction of the Apple File System, or APFS. The preliminary version of the developer documentation is online now, and it looks like the new file system introduces a whole boat-load of solid features—including a few out of the ZFS playbook. APFS looks to be a major update over Apple’s old and creaky HFS
FBI agents, one armed with an assault weapon, reportedly raided the home of a security professional who discovered sensitive data for 22,000 dental patients was available on the Internet, according to a report published Friday. Justin Shafer, who is described as a dental computer technician and software security researcher, reportedly said the raid happened on Tuesday at 6:30am as he, his wife, an
SAN FRANCISCO—Following a two-week trial, a federal jury concluded Thursday that Google's Android operating system does not infringe Oracle-owned copyrights because its re-implementation of 37 Java APIs is protected by "fair use." The verdict was reached after three days of deliberations. "Ladies and gentlemen of the jury, listen to your verdict as it will stand recorded," said the court clerk, be
As we reported a few days ago, Ian Murdock, the creator of the Debian GNU/Linux distribution project, died in rather unclear circumstances last week. Until more details emerge, it seems wise to refrain from speculation about what really happened. Far better to celebrate what is not in doubt: his important contribution to free software at a critical period in its growth. In November 1999, I spoke t
As of yesterday, North America is out of IPv4 addresses. Getting that feeling of déjà vu all over again? In July, we reported that ARIN, the American Registry for Internet Numbers, was activating its waitlist policy, wherein organizations that qualify for a block of IPv4 addresses larger than the largest block in ARIN's available pool of addresses could opt to wait for that larger block to become
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く