Home / Tag Archives: the-potential

Tag Archives: the-potential

uBiome Awards Grant to University of Tasmania to Study Association…

The leader in microbial genomics awards grant to team of researchers at University of Tasmania to investigate the potential influence of the microbiota on cognitive decline and dementia. (PRWeb January 25, 2019) Read the full story at https://www.prweb.com/releases/ubiome_awards_grant_to_university_of_tasmania_to_study_association_between_gut_microbiota_and_cognitive_decline/prweb16001677.htm

Read More »

NewSight Reality Inc. Announces (AR) Breakthrough as Market Expands;…

NewSight Reality, Inc. (NSR) announced today a promising innovation that has the potential of addressing many of the current shortcomings of Augmented Reality (AR) Systems. (PRWeb January 15, 2019) Read the full story at https://www.prweb.com/releases/newsight_reality_inc_announces_ar_breakthrough_as_market_expands_rapid_growth_predicted_to_exceed_70_billion_by_2023_marketwatch/prweb16036025.htm

Read More »

Manhattan Mental Health Counseling Discusses the Link Between Social…

Manhattan Mental Health Counseling, a psychotherapy private practice in NYC that accepts insurance, has issued a warning about the potential health risks of using - and overusing - social media. There... (PRWeb October 22, 2018) Read the full story at https://www.prweb.com/releases/manhattan_mental_health_counseling_discusses_the_link_between_social_media_and_mental_illness/prweb15843129.htm

Read More »

Decades-old PGP bug allowed hackers to spoof just about anyone’s signature

Enlarge (credit: Marcus Brinkmann ) For their entire existence, some of the world's most widely used email encryption tools have been vulnerable to hacks that allowed attackers to spoof the digital signature of just about any person with a public key, a researcher said Wednesday. GnuPG, Enigmail, GPGTools, and python-gnupg have all been updated to patch the critical vulnerability. Enigmail and the Simple Password Store have also received patches for two related spoofing bugs. Digital signatures are used to prove the source of an encrypted message, data backup, or software update. Typically, the source must use a private encryption key to cause an application to show that a message or file is signed. But a series of vulnerabilities dubbed SigSpoof makes it possible in certain cases for attackers to fake signatures with nothing more than someone’s public key or key ID, both of which are often published online. The spoofed email shown at the top of this post can't be detected as malicious without doing forensic analysis that's beyond the ability of many users. Backups and software updates affected, too The flaw, indexed as CVE-2018-12020, means that decades' worth of email messages many people relied on for sensitive business or security matters may have in fact been spoofs. It also has the potential to affect uses that went well beyond encrypted email. Read 8 remaining paragraphs | Comments

Read More »