technology-news.space - All about the world of technology!

  • Artificial Intelligence
  • Data Management & Statistics
  • Information Technology
  • Internet of Things
  • Networking
  • Robotics
  • Network
    • *** .SPACE NETWORK ***
      • art-news
      • eco-news
      • economic-news
      • family-news
      • job-news
      • motor-news
      • myhome-news
      • politic-news
      • realestate-news
      • scientific-news
      • show-news
      • technology-news
      • traveller-news
      • wellness-news
    • *** .CLOUD NETWORK ***
      • sportlife
      • calciolife
    • *** VENTIDI NETWORK ***
      • ventidinews
      • ventidisocieta
      • ventidispettacolo
      • ventidisport
      • ventidicronaca
      • ventidieconomia
      • ventidipolitica
    • *** MIX NETWORK ***
      • womenworld
      • sportlife
      • foodingnews
      • sportingnews
      • notiziealvino
Search
Login

technology-news.space - All about the world of technology!

Menu
Search

HOTTEST

  • A sneaky phishing campaign aims to steal passwords from Facebook users – including administrators of company Facebook Pages. Detailed by cybersecurity researchers at Abnormal Security, the attack begins with a phishing email claiming to be from ‘The Facebook Team’, which warns that the user’s account “might be disabled and your page might be removed” due to repeatedly posting content that has been reported as infringing the rights of another user. The victim is invited to appeal the report by clicking on a link that the security researchers said goes to a Facebook post – and within this post there’s another link that directs users to a separate website in order to make their “appeal”.

    As part of the fake appeals process, the user is asked to provide sensitive information, including their name and email address. Before submitting the form, the user is also asked to enter their Facebook password. SEE: Multi-factor authentication: How to enable 2FA to step up your securityAll this information is sent to the attacker, who can use it to log in to the victim’s Facebook page, collect information from their account and potentially lock them out of it. If the victim re-uses their Facebook email address and password for other websites and applications, the attacker can access those too. One of the reasons phishing attacks like this are successful is because they create a sense of urgency.”This is often enough to convince recipients to provide their personal information, particularly if they are using their Facebook account for business purposes,” said Rachelle Chouinard, threat intelligence analyst at Abnormal Security.  What made this particular phishing campaign interesting to the security researchers was that it connected to a post on Facebook and that there was a link to a credential-phishing site within the post, which was disguised as a form to request an appeal.However, while the phishing email and phishing domain might have looked legitimate at first glance, there were clues that would have suggested that something might be off.  For example, while the email contained Facebook branding and claimed to be from Facebook itself, the sender email address was not related to Facebook at all. In addition to this, attempting to reply to the sender email directs messages to an unrelated Gmail address. The language of the email is designed to create fear in the victim, scaring them into losing their account. It’s unlikely an actual online service will send an email like this, but if you receive a message and do get worried, don’t click the link in the email. Instead, log in to the website directly. If something is wrong with your account, you’ll be able to find out there – without handing your password to cyber criminals. SEE: These are the problems that cause headaches for bug bounty huntersZDNet contacted Facebook and the company pointed to advice to users on how to identify and report phishing attacks. Facebook’s Help Centre says anyone who thinks that their account has been phished should report it, change their password, and – in the security settings – log out of any devices that they don’t recognise.  It’s also recommended that users turn on multi-factor authentication to increase account security against unauthorised logins.  ZDNet also contacted Google – the company said the Gmail account used as part of the campaign has now been removed. MORE ON CYBERSECURITY More

  • Getty Images/iStockphoto The criminal group behind the REvil (Sodinokibi) ransomware is extorting a New York-based law firm, threatening to release sensitive files on the company’s celebrity clients unless the the firm pays a whopping $42 million ransom demand. The extortion attempt is the result of a ransomware infection that Grubman Shire Meiselas & Sacks (GSMS) […] More

  • Security vulnerabilities in popular online meeting service and events website Meetup could have allowed cyber attackers to gain access to the profiles of millions of members, according to a security company.
    Researchers from security company Chechmarx found it was possible to combine cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities on the site to gain administrator privileges, enabling them to perform actions ranging from the annoying – like cancelling or changing events – to the fraudulent, including looking at information about users or redirecting PayPal payments.
    Researchers found it was possible to inject malicious script into posts made in the discussion section of the Meetup page – something that’s enabled by default on every event.
    SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)  
    However, the script would be hidden to users, but could allow attackers to take advantage by combining it with a CSRF attack – allowing them to carry out unauthorised commands which they can exploit to gain control of groups.

    “When you have these two vulnerabilities, it’s basically the Holy Grail for a hacker. Because what it means if an organiser page runs the script in the browser, we can actually use their role of administrator to do whatever we want,” Erez Yalon, director of security research at Checkmarx told ZDNet.
    On an individual MeetUp group level, an attacker could exploit this to take control of the page, view personal information and redirect finances, something that would be frustrating for victims, but not a huge cybersecurity event.
    However, researchers also found it was possible to spread the vulnerability with a worm, meaning that if unleashed in the wild, the whole site could become compromised by attackers taking control of groups and diverting funds.
    “Even if I just started with several groups, everyone in them becomes an agent to spread the worm,” he said. “Then when organisers are infected, they can move the funds to our own malicious PayPal. In a day or two we could infect each and every Meetup group – that would be a massive attack on the platform”.
    After uncovering the vulnerabilities disclosed them to Meetup who released a security patch which fixed the issue earlier this year. Meetup told Checkmarx “Meetup takes reports about its data security very seriously, and appreciates Checkmarx’s work in bringing these issues to our attention for investigation and follow up.” ZDNet has contacted the company for additional comment.
    What enabled the vulnerability was the ability to add scripts to the discussion page – and this could have been prevented if an allow list was used. By specifying which commands are acceptable for the page it means strange code or commands can’t be entered.
    Using this is preferable to a deny list because an allow list requires listing every potential way commands could be worked around – and attackers will always attempt to find new ways of doing this that developers might not think of.
    “When you’re using a deny list you’re hoping you can think of all the ways an attacker could use your system – I can promise you that every attacker will find things you didn’t think an attacker could do,” said Yalon, who argued that there’s a key takeaway from the research for other organisations.
    “Make sure you’re using an allow list when filtering inputs,” he concluded.
    READ MORE ON CYBERSECURITY More

  • China has laid out ground rules to prevent “deep synthesis” technology, including deepfakes and virtual reality, from being abused. Anyone using these services must label the images accordingly and refrain from tapping the technology for activities that breach local regulations.  Cyberspace Administration of China, Ministry of Industry and Information Technology, and Ministry of Public Security released a joint statement mandating the use of deep synthesis technology and services must be clearly indicated, so these are not mistaken to represent real information. To be effective from January 10 next year, the new rules aim to protect national security and the country’s core social values, as well as safeguard the rights and interests of citizens and organisations, said the government agencies. They noted that while synthesis technology had improved user experience, it also was used to impersonate identifies and disseminate false and harmful information that tarnish victims’ reputation. This endangered national security and social stability. They added that regulations were necessary to mitigate such risks and drive the “healthy” development of new technology. The ground rules also would standardise the development of deep synthesis services and ensure these were in line with the country’s other related regulations, including data security and personal information protection laws.  The new rules will apply to technology that use deep learning, virtual reality, and other synthetic algorithms to create text, images, video, audio, and virtual scenes, including text-to-speech, voice editing, gesture manipulation, digital simulation, and 3D reconstruction.  Apart from not using deep synthesis services to produce and disseminate information prohibited by local laws, the new regulations also outline the need to implement a real identity data authentication system as well as other management systems, such as user registration, algorithm mechanism review, data security, emergency response, and ethics review. In addition, safety technical measures must be established.  These management rules and service agreements must be disclosed. Users also will have to put in place mechanisms to address rumours in a timely manner, should the use of deep synthesis services be used to publish or disseminate false information. The relevant government agencies will need to be notified, too.  RELATED COVERAGE More

  • Leonid Korchenko/Getty Images If you find your personal information online, like your phone number, address, or email, Google just made it easier to make sure it doesn’t show up again. Several years ago, Google introduced a “Results about you” tool that lets you track your personal information online and remove it from search results. It […] More

Internet of Things

  • Samsung Spotlights Next-generation IoT Innovations for Retailers at National Retail Federation’s BIG Show 2017

    Read More

  • That’s Fantasy! The World’s First Stone Shines And Leads You to The Right Way

    Read More

  • LG Pushes Smart Home Appliances To Another Dimension With ‘Deep Learning’ Technology

    Read More

  • The Port of Hamburg Embarks on IoT: Air Quality Measurement with Sensors

    Read More

Artificial Intelligence

  • in Artificial Intelligence

    Contact-aware robot design

    19 July 2021, 04:00

  • in Artificial Intelligence

    MIT Schwarzman College of Computing awards named professorships to two faculty members

    16 July 2021, 15:45

  • in Artificial Intelligence

    Getting dressed with help from robots

    14 July 2021, 19:15

  • in Artificial Intelligence

    Software to accelerate R&D

    13 July 2021, 04:00

  • in Artificial Intelligence

    Sertac Karaman named director of the Laboratory for Information and Decision Systems

    12 July 2021, 16:00

  • in Artificial Intelligence

    The tenured engineers of 2021

    9 July 2021, 20:00

  • in Artificial Intelligence

    US Air Force pilots get an artificial intelligence assist with scheduling aircrews

    8 July 2021, 18:45

  • in Artificial Intelligence

    Infrared cameras and artificial intelligence provide insight into boiling

    7 July 2021, 20:15

  • in Artificial Intelligence

    Designing exploratory robots that collect data for marine scientists

    7 July 2021, 04:00

Robotics

  • in Robotics

    Own a Roku TV? I changed 6 settings to give the system a noticeable speed boost

    20 November 2025, 01:21

  • in Robotics

    What an orange USB port actually means – and the truth behind all the colors

    20 November 2025, 00:24

  • in Robotics

    QLED vs. OLED: Testing this overlooked Samsung TV model made the answer clear to me

    19 November 2025, 23:55

  • in Robotics

    This Greenworks 24V cordless drill and impact driver kit is perfect for my new house, and it’s $60 off

    19 November 2025, 23:51

  • in Robotics

    Uncover your digital footprint with this free tool – here’s how it works

    19 November 2025, 01:00

  • in Robotics

    I found a near-perfect Android phone, but the premium display has a surprising flaw

    19 November 2025, 00:43

  • in Robotics

    Is the $500 Oura Ring 4 Ceramic worth it? I wore one for a month, and here’s my advice

    19 November 2025, 00:16

  • in Robotics

    Why I recommend this Samsung QLED TV over pricier OLED models in 2025 – and don’t regret it

    19 November 2025, 00:09

  • in Robotics

    Traveling soon? Why this one charger is the only one you’ll ever need to pack

    19 November 2025, 00:01

Networking

  • I used this free tool to see what data the internet has on me – and the results were disturbing

  • Own AirPods? I changed 3 settings on my iPhone to significantly improve the audio experience

  • Linus Torvalds is surprisingly optimistic about vibe coding – except for this one ‘horrible’ use

  • Not enough people are talking about this Garmin competitor that wins in unique ways

  • I’m always looking for deals on kids’ tech – here’s what I’m buying this holiday season

  • The top 10 laptops our readers bought this year (no. 1 surprised us)

  • Struggling to track AI agents? This open-source tool gives you a single source of truth

Data Management & Statistics

  • Method prevents an AI model from being overconfident about wrong answers

  • Groundbreaking poverty alleviation project expands with new Arnold Ventures, J-PAL North America collaboration

  • Roadmap details how to improve exoplanet exploration using the JWST

  • Study: When allocating scarce resources with AI, randomization can improve fairness

  • AI model identifies certain breast tumor stages likely to progress to invasive cancer

  • How to assess a general-purpose AI model’s reliability before it’s deployed

  • Machine learning and the microscope

ABOUT

The QUATIO - web agency di Torino - is currently composed of 28 thematic-vertical online portals, which average about 2.300.000 pages per month per portal, each with an average visit time of 3:12 minutes and with about 2100 total news per day available for our readers of politics, economy, sports, gossip, entertainment, real estate, wellness, technology, ecology, society and much more themes ...

technology-news.space is one of the portals of the network of:

Quatio di CAPASSO ROMANO - Web Agency di Torino
SEDE LEGALE: CORSO PESCHIERA, 211 - 10141 - ( TORINO )
P.IVA IT07957871218 - REA TO-1268614

ALL RIGHTS RESERVED © 2015 - 2025 | Developed by: Quatio

ITALIAN LANGUAGE

calciolife.cloud | notiziealvino.it | sportingnews.it | sportlife.cloud | ventidicronaca.it | ventidieconomia.it | ventidinews.it | ventidipolitica.it | ventidisocieta.it | ventidispettacolo.it | ventidisport.it

ENGLISH LANGUAGE

art-news.space | eco-news.space | economic-news.space | family-news.space | job-news.space | motor-news.space | myhome-news.space | politic-news.space | realestate-news.space | scientific-news.space | show-news.space | sportlife.news | technology-news.space | traveller-news.space | wellness-news.space | womenworld.eu | foodingnews.it

This portal is not a newspaper as it is updated without periodicity. It cannot be considered an editorial product pursuant to law n. 62 of 7.03.2001. The author of the portal is not responsible for the content of comments to posts, the content of the linked sites. Some texts or images included in this portal are taken from the internet and, therefore, considered to be in the public domain; if their publication is violated, the copyright will be promptly communicated via e-mail. They will be immediately removed.

  • Home
  • Network
  • Terms and Conditions
  • Privacy Policy
  • Cookies
  • Contact
Back to Top
Close
  • Artificial Intelligence
  • Data Management & Statistics
  • Information Technology
  • Internet of Things
  • Networking
  • Robotics
  • Network
    • *** .SPACE NETWORK ***
      • art-news
      • eco-news
      • economic-news
      • family-news
      • job-news
      • motor-news
      • myhome-news
      • politic-news
      • realestate-news
      • scientific-news
      • show-news
      • technology-news
      • traveller-news
      • wellness-news
    • *** .CLOUD NETWORK ***
      • sportlife
      • calciolife
    • *** VENTIDI NETWORK ***
      • ventidinews
      • ventidisocieta
      • ventidispettacolo
      • ventidisport
      • ventidicronaca
      • ventidieconomia
      • ventidipolitica
    • *** MIX NETWORK ***
      • womenworld
      • sportlife
      • foodingnews
      • sportingnews
      • notiziealvino