Digital assistants with access to everything you do on your phone can use that knowledge to remember the life details you’d otherwise forget. But with that great power comes great responsibility.
from Gear Latest https://ift.tt/TobQWsw
via IFTTT
Digital assistants with access to everything you do on your phone can use that knowledge to remember the life details you’d otherwise forget. But with that great power comes great responsibility.
from Gear Latest https://ift.tt/TobQWsw
via IFTTT
If only Patch Tuesdays came around infrequently — like total solar eclipse rare — instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to eclipse the number of vulnerabilities fixed in this month’s patch batch — a record 147 flaws in Windows and related software.

Yes, you read that right. Microsoft today released updates to address 147 security holes in Windows, Office, Azure, .NET Framework, Visual Studio, SQL Server, DNS Server, Windows Defender, Bitlocker, and Windows Secure Boot.
“This is the largest release from Microsoft this year and the largest since at least 2017,” said Dustin Childs, from Trend Micro’s Zero Day Initiative (ZDI). “As far as I can tell, it’s the largest Patch Tuesday release from Microsoft of all time.”
Once again this month, there are no known zero-day vulnerabilities threatening Windows users. Tempering the sheer volume of this month’s patches is the middling severity of many of the bugs. Only three of April’s vulnerabilities earned Microsoft’s most-dire “critical” rating, meaning they can be abused by malware or malcontents to take remote control over unpatched systems with no help from users.
Most of the flaws that Microsoft deems “more likely to be exploited” this month are marked as “important,” which usually involve bugs that require a bit more user interaction (social engineering) but which nevertheless can result in system security bypass, compromise, and the theft of critical assets.
Ben McCarthy, lead cyber security engineer at Immersive Labs called attention to CVE-2024-20670, an Outlook for Windows spoofing vulnerability described as being easy to exploit. It involves convincing a user to click on a malicious link in an email, which can then steal the user’s password hash and authenticate as the user in another Microsoft service.
Another interesting bug McCarthy pointed to is CVE-2024-29063, which involves hard-coded credentials in Azure’s search backend infrastructure that could be gleaned by taking advantage of Azure AI search.
“This along with many other AI attacks in recent news shows a potential new attack surface that we are just learning how to mitigate against,” McCarthy said. “Microsoft has updated their backend and notified any customers who have been affected by the credential leakage.”
CVE-2024-29988 is a weakness that allows attackers to bypass Windows SmartScreen, a technology Microsoft designed to provide additional protections for end users against phishing and malware attacks. Childs said one ZDI’s researchers found this vulnerability being exploited in the wild, although Microsoft doesn’t currently list CVE-2024-29988 as being exploited.
“I would treat this as in the wild until Microsoft clarifies,” Childs said. “The bug itself acts much like CVE-2024-21412 – a [zero-day threat from February] that bypassed the Mark of the Web feature and allows malware to execute on a target system. Threat actors are sending exploits in a zipped file to evade EDR/NDR detection and then using this bug (and others) to bypass Mark of the Web.”
Satnam Narang at Tenable notes that this month’s release includes fixes for two dozen flaws in Windows Secure Boot, the majority of which are considered “Exploitation Less Likely” according to Microsoft.
“However, the last time Microsoft patched a flaw in Windows Secure Boot in May 2023 had a notable impact as it was exploited in the wild and linked to the BlackLotus UEFI bootkit, which was sold on dark web forums for $5,000,” Narang said. “BlackLotus can bypass functionality called secure boot, which is designed to block malware from being able to load when booting up. While none of these Secure Boot vulnerabilities addressed this month were exploited in the wild, they serve as a reminder that flaws in Secure Boot persist, and we could see more malicious activity related to Secure Boot in the future.”
For links to individual security advisories indexed by severity, check out ZDI’s blog and the Patch Tuesday post from the SANS Internet Storm Center. Please consider backing up your data or your drive before updating, and drop a note in the comments here if you experience any issues applying these fixes.
Adobe today released nine patches tackling at least two dozen vulnerabilities in a range of software products, including Adobe After Effects, Photoshop, Commerce, InDesign, Experience Manager, Media Encoder, Bridge, Illustrator, and Adobe Animate.
KrebsOnSecurity needs to correct the record on a point mentioned at the end of March’s “Fat Patch Tuesday” post, which looked at new AI capabilities built into Adobe Acrobat that are turned on by default. Adobe has since clarified that its apps won’t use AI to auto-scan your documents, as the original language in its FAQ suggested.
“In practice, no document scanning or analysis occurs unless a user actively engages with the AI features by agreeing to the terms, opening a document, and selecting the AI Assistant or generative summary buttons for that specific document,” Adobe said earlier this month.
from Krebs on Security https://ift.tt/Kuz9dxm
via IFTTT
When an estranged friend resurfaces after 12 years, a prosecutor starts connecting disjointed events to unveil the truth behind her father’s tragic death.
from New On Netflix USA https://ift.tt/F4UtZHj
via IFTTT
The company’s first stage keyboard is just its Analog Lab software instrument in hardware form, but that’s not a bad thing.
from Gear Latest https://ift.tt/rhi79fg
via IFTTT
The internet is a mess. Ignore the algorithm, and distill the web down to the things you actually care about.
from Gear Latest https://ift.tt/O6QUNiT
via IFTTT

By Tripp Mickle
Automattic, the company behind WordPress.com, bought Beeper in an effort to build a system that works across Android and Apple devices.
Published: April 9, 2024 at 09:00AM
from NYT Technology https://ift.tt/a3lU0Oj
via IFTTT
Streaming music giving you the blues? These entry-level turntables will help you rock on to analog audio at home.
from Gear Latest https://ift.tt/dFJgDQq
via IFTTT
Embroiled in a bitter campaign against inequality, three priests suffer the fury of Spanish colonial rule in the Philippines. Based on historical events.
from New On Netflix USA https://ift.tt/26x8Kgo
via IFTTT
Comedian Neal Brennan riffs in this stand-up special on crypto, social media flexes, sex compliments and the link between greatness and mental health.
from New On Netflix USA https://ift.tt/xyUNuXf
via IFTTT
En la sexta versión de la serie Qt 6, presentamos muchas funciones nuevas para los desarrolladores de gráficos e interfaz de usuario y el backend de la aplicación
The Qt Company anuncio mediante una publicación de blog, el lanzamiento de la nueva versión de QT 6.7, la cual llega implementado una serie de numerosas mejoras que van desde la compatibilidad con estándares modernos de C++ hasta capacidades avanzadas en gráficos, conectividad, fuentes e integración de aplicaciones híbridas, entre otras cosas más.
Cabé mencionar que esta nueva versión de QT 6.7, al igual que las demás versiones de esta rama 6.X tienen como principal finalidad el estabilizar y ampliar la funcionalidad de la rama 6 de Qt, pero sin dejar de lado la implementación de mejoras e innovaciones. QT 6.7 cuenta con soporte para diversas plataformas como Windows 10+, macOS 12+, varias distribuciones Linux, asi como también para plataformas de dispositivos móviles, tales como iOS, Android (API 23+), webOS entre otros.
En esta nueva versión que se presenta de QT 6.7 se destaca el soporte mejorado para C++20 (aunque sigue siendo opcional), ya que se ha trabajado en adaptaciones para aprovechar las clases Qt::{strong,weak,partial}_ordering, asi como también que las macros se expanden al operador de comparación (<=>) Además, también se destaca la introducción de std::span y la implementación de la clase QSpan para representar secuencias contiguas de objetos en sistemas C++17.
Otro de los aspectos destacados de QT 6.7 son las mejoras implementadas en el módulo experimental Qt Graphs (introducido en la versión 6.6) ha continuado, ya que ahora cuenta con soporte adicional para gráficos de barras, líneas y dispersión en 2D, además de las visualizaciones 3D existentes. Y es qué ahora Qt Graphs utiliza Qt Quick 3D y el motor de renderizado RHI (Rendering Hardware Interface), que es compatible con varias API 3D como OpenGL, Vulkan, Metal y Direct 3D.
Además de ello, también se destacan las nuevas clases como QHttpHeaders, QRestAccessManager y QRestReply para facilitar el trabajo con API HTTP y REST, especialmente para aplicaciones distribuidas. En Qt Protobuf ofrecen un mejor manejo de mensajes gRPC, permitiendo a los desarrolladores implementar funciones como almacenamiento en caché y registro de manera más efectiva.
También se destacan las mejoras en el módulo Qt GRPC, ya que ahora se han agregado nuevas clases que facilitan las llamadas de transmisión bidireccional tanto del lado del cliente como del servidor. Estas clases permiten el intercambio automático de mensajes cuando cambian los valores, lo que mejora la comunicación y la sincronización entre las partes. También se ha propuesto una API Interceptor que permite adjuntar controladores de devolución de llamada para mensajes gRPC específicos.
De los demas cambios que se destacan:
<symbol>, <marker>, <pattern>, <mask> y filtros SVG.Si deseas conocer más al respecto, puedes consultar los detalles en el siguiente enlace.
Para los interesados en la nueva rama de Qt 6.7 deben saber que pueden obtener los paquetes ya compilados para su OS o plataforma, de esta nueva versión en el siguiente enlace.
from Linux Adictos https://ift.tt/DOV83eL
via IFTTT