

Security
Vulnerabilities in Moxa devices pose a risk to rail transport
The vulnerabilities affect Moxa devices and a number of obsolete software components.
Nearly 60 vulnerabilities have been identified in equipment for use in rail transport by the Taiwanese company Moxa, including an issue allowing control over a vulnerable device.
The vulnerabilities discovered by SEC Consult affect Moxa devices and a number of legacy software components, including the GNU C Library (glibc), DHCP client in BusyBox, Dropbear SSH software, Linux kernel and OpenSSL.
Moxa devices contain two issues: a command injection vulnerability (CVE-2021-39279), which allows an authorized hacker to compromise the device’s operating system, and an XSS vulnerability (CVE-2021-39278), which can be exploited by sending a malicious configuration file.
Problems affect the TAP-323, WAC-1001 and WAC-2004 series of universal access points and wireless access controllers. The manufacturer has already released fixes for the TAP-323 and WAC-1001 series, but updates for the WAC-2004 series devices are not provided due to the end of support.
Although the experts have not investigated the possibility of using CVE-2021-39279 and CVE-2021-39278 together, they believe it is possible. To exploit the vulnerabilities, an attacker would need to perform an XSS attack, obtain the credentials required for authorization, and then exploit the command injection vulnerability.
Regarding the risk to rail transport and railroad operations, the researchers noted that the degree of damage that a hacker can cause by his actions is difficult to assess. It depends on the “criticality of the messages transmitted through the device,” experts say.
…

Security
Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

A dangerous vulnerability has been discovered in one of the standard Windows 11 applications that could lead to the disclosure of sensitive information to the user. Moreover, at the moment the vulnerability is not closed and attackers can use it.
We are talking about the application Snipping Tool (Scissors). The vulnerability, called aCropalypse, allows you to undo changes made by a user when editing a screenshot, including cropped or blurred parts that hide sensitive data.
When you edit a screenshot, you can save it with the same name as the original file by overwriting it. However, as it turns out, the Windows 11 Snipping Tool does not remove the original information from the file, but simply leaves it added at the end, which is usually invisible to users. With some trickery, a potential attacker can extract hidden information from a file and see what information has been edited.
As you can see, edited screenshots are usually much larger due to the inclusion of information from the original image.
This is a pretty serious vulnerability. For example, if you share a screenshot of an order confirmation page on Amazon, it may contain an address, the same goes for credit card numbers and other sensitive data.
Security
In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

In recent months, the ChatGPT chatbot has been on the news pages, and this has forced many companies to catch up with OpenAI. Among them are Microsoft, Google and a number of Chinese corporations. However, reportedly, the situation could be different.
As early as 2018, Google is said to have had a natural language processing AI similar to ChatGPT. However, company executives closed the project, considering it too dangerous. One of the developers was research engineer Daniel De Freitas, and Noam Shazeer, a software engineer at Google, also contributed to the project.
The project was called Meena and was a chatbot that could talk about different topics. With him you could discuss TV shows, have discussions about philosophy and joke. At the same time, the developers believed that this technology could be added to the search engine, however, in the end, Google stopped development. The company said the bot did not meet its AI security standards.
Note that later, on the basis of these developments, the LaMDA chat bot was created, which flies into the basis of Bard. Thus, the development nevertheless reached the mass user, albeit with a great delay.
Phones
Two-way satellite communications and military-grade security. Presented smartphone Motorola Defy 2

The British company Bullitt Group and Motorola, now owned by the Chinese Lenovo, introduced a new smartphone of the protected Motorola Defy series. The highlights of the Motorola Defy 2 are support for two-way satellite communication, combined with 5G fifth-generation cellular networks, and a very durable design.
The smartphone is resistant to dust, sand, dirt and water (IP68 and IP69K) and has been tested to military standard Mil-Spec 810H for extreme high and low temperatures, humid environments, salt fog, vibration and shock. The Motorola Defy 2 can be washed with soap and water and can also be cleaned with alcohol wipes.
The smartphone itself is equipped with a 6.6-inch Full HD + display with a refresh rate of 120 Hz, an 8 MP front camera, a main triple camera (50 MP, 8 and 2 MP), SoC MediaTek Dimensity 930, 6 GB of RAM and 128 GB flash memory that can be expanded with microSD cards, and a 5000 mAh battery with support for 15W charging and Qi wireless charging.
MediaTek Bullitt and 3GPP NTN technology, Bullitt satellite messaging service are supported. The smartphone is running Android 12 operating system, two major Android updates and 5 years of security updates are promised.
The Motorola Defy 2 smartphone will be available from Q2 2023 on select carriers in North America, Latin America and Canada starting at $599.
-
News2 days ago
Nvidia CEO Jensen Huang wants to run the company for another 30-40 years, and then become a robot and continue to hold this post
-
Gaming5 days ago
Build in 60 seconds: That’s how long it took GPT-4 to generate a Pong game in JavaScript
-
News5 days ago
Nikon Z8 Full-Frame Mirrorless Camera Coming in April, May Be Cheaper Than Expected
-
News5 days ago
6000 mAh, 48 MP and big screen. Huawei Enjoy 60 battery monster launches March 23