More stories

  • in

    iOS 16.2: These security updates will protect your iPhone from multiple vulnerabilities

    Image: Getty/Zhang Peng Apple has released iOS 16.2, the latest software update for iPhone and iPad, which fixes multiple security vulnerabilities, including several that could allow cyber attackers to run commands and take control of devices.  iOS 16.2 and iPadOS 16.2 contain several new features for iPhone and iPad users, but alongside those are the […] More

  • in

    China lays out ground rules to stem deepfake abuse

    China has laid out ground rules to prevent “deep synthesis” technology, including deepfakes and virtual reality, from being abused. Anyone using these services must label the images accordingly and refrain from tapping the technology for activities that breach local regulations.  Cyberspace Administration of China, Ministry of Industry and Information Technology, and Ministry of Public Security released a joint statement mandating the use of deep synthesis technology and services must be clearly indicated, so these are not mistaken to represent real information. To be effective from January 10 next year, the new rules aim to protect national security and the country’s core social values, as well as safeguard the rights and interests of citizens and organisations, said the government agencies. They noted that while synthesis technology had improved user experience, it also was used to impersonate identifies and disseminate false and harmful information that tarnish victims’ reputation. This endangered national security and social stability. They added that regulations were necessary to mitigate such risks and drive the “healthy” development of new technology. The ground rules also would standardise the development of deep synthesis services and ensure these were in line with the country’s other related regulations, including data security and personal information protection laws.  The new rules will apply to technology that use deep learning, virtual reality, and other synthetic algorithms to create text, images, video, audio, and virtual scenes, including text-to-speech, voice editing, gesture manipulation, digital simulation, and 3D reconstruction.  Apart from not using deep synthesis services to produce and disseminate information prohibited by local laws, the new regulations also outline the need to implement a real identity data authentication system as well as other management systems, such as user registration, algorithm mechanism review, data security, emergency response, and ethics review. In addition, safety technical measures must be established.  These management rules and service agreements must be disclosed. Users also will have to put in place mechanisms to address rumours in a timely manner, should the use of deep synthesis services be used to publish or disseminate false information. The relevant government agencies will need to be notified, too.  RELATED COVERAGE More

  • in

    Microsoft Patch Tuesday fixes six critical vulnerabilities

    By Alberto Garcia Guillen — Shutterstock Microsoft on Tuesday disclosed 56 vulnerabilities, including six critical ones and one moderate vulnerability that has been exploited.  The patches released address common vulnerabilities and exposures (CVEs) in: Microsoft Windows and Windows Components; Azure; Office and Office Components; SysInternals; Microsoft Edge (Chromium-based); SharePoint Server; and the .NET framework. The […] More

  • in

    The 20 best Amazon security camera deals: Ring and Blink on sale

    Current price: $60Original price: $100This is Ring’s most popular video doorbell: the 2020-release, battery-operated model. Featuring 1080p HD video, Alexa voice control, two-way talk, night vision, and advanced motion detection, this video doorbell is at the lowest price we’ve ever seen it before — even lower than during Amazon’s July and October Prime Day sales events.The built-in rechargeable battery makes for an easy installation, since there is no wiring involved, making it a perfect fit for anyone looking to upgrade their current doorbell setup. However, if you prefer a wired installation, this doorbell is also equipped for installation using your existing doorbell’s wiring. Also: What are the best home security systems and do they require Wi-Fi? More

  • in

    This Linux-targeting malware just got more powerful

    Image: Getty A cryptomining malware campaign that targets systems and cloud-computing instances running on Linux has added trojan malware to its capabilities – something that could make attacks more dangerous.  Detailed by cybersecurity researchers at Trend Micro, such as several other cryptomining campaigns, this one is secretly compromising Linux systems, using their computing power to mine […] More

  • in

    Android Private Compute Core: Google explains the “important” new privacy infrastructure

    Image: MS_studio/Shutterstock Google has shed more light on how it’s using private data from sensors on your Android phone to update its machine-learning features, such as Live Translate, without sending private data to its cloud servers.  Google last September introduced Live Caption, Now Playing and Smart Reply as features within Android’s Private Compute Core (PCC), […] More

  • in

    You've got Mastodon questions, I've got answers

    If you decide that the original instance where you created an account isn’t working out for you and you’ve identified a new instance that you want to move to, follow these steps to make the move. Note that moving to a new instance migrates your followers but not your posts.Start at the new instance. Go to Preferences > Account > Account Settings. Under the heading “Moving from a different account,” click Create An Account Alias. (As a shortcut, you can go directly to https:///settings/aliases.) Enter the handle for the account you want to move from, in the format username@domain, and then click Create Alias.Now go to the old instance, the one you want to move from. Open the Account Settings page and, under the heading “Move to a different account,” click Configure It Here. (As a shortcut, you can go directly to https:///settings/aliases.) Enter the handle of the new account, in the format username@domain, along with the current password. Read the notes carefully, and then click Move Followers.If you want to migrate the list of accounts you’ve followed, blocked, or muted, go to Preferences > Import and Export. Export data in CSV format from the old account and import it using the new account. More

  • in

    This evasive new cyberattack can bypass air-gapped systems to steal data from the most sensitive networks

    Image: Getty/Manuel Breva Colmeiro Cybersecurity researchers have demonstrated a novel method of cyberattack that could allow malicious hackers to steal information from some of the most well-protected computers. Air-gapped systems are isolated from the internet due to the nature of the information they handle. The idea is that by being completely removed from both the […] More