投稿時間:2024-02-07 04:11:56 RSSフィード2024-02-07 04:00分まとめ(13件)

カテゴリー サイト名 記事タイトル リンクURL 頻出ワード・要約等 登録日
AWS AWS Partner Network (APN) Blog Next-Generation Service Assurance with NeSA Powered by AWS https://aws.amazon.com/blogs/apn/next-generation-service-assurance-with-nesa-powered-by-aws/ As networks become more complex telcos need an integrated platform to manage monitoring diagnostics and automation Prodapt worked with AWS to build a cloud native open source network assurance platform called NeSA It provides a single pane of glass for end to end visibility faster troubleshooting and closed loop automation This post details Prodapt s experience implementing NeSA for a Tier telco reducing incident resolution time and costs 2024-02-06 18:32:58
AWS AWS Machine Learning Blog Integrate QnABot on AWS with ServiceNow https://aws.amazon.com/blogs/machine-learning/integrate-qnabot-on-aws-with-servicenow/ Do your employees wait for hours on the telephone to open an IT ticket Do they wait for an agent to triage an issue which sometimes only requires restarting the computer Providing excellent IT support is crucial for any organization but legacy systems have relied heavily on human agents being available to intake reports and 2024-02-06 18:03:18
海外TECH Ars Technica Meta will label AI-generated content from OpenAI and Google on Facebook, Instagram https://arstechnica.com/?p=2001313 In a big election year Meta details plans to label AI generated media on its social media sites 2024-02-06 18:04:04
海外TECH AppleInsider - Frontpage News Apple rolls out second developer beta of tvOS 17.4 https://appleinsider.com/articles/24/02/06/apple-rolls-out-second-developer-beta-of-tvos-174?utm_medium=rss Apple is on the second round of developer betas with a fresh tvOS build now available for testing Developers participating in the test program can acquire the latest build by visiting the Apple Developer Center or by updating any Apple TV set top boxes already running the beta Public beta builds generally surface shortly after the developer counterparts and the public can sign up to test them via the Apple Beta Software Program when they become available The second tvOS developer beta takes place after the first which arrived on January The second beta build is number Lf replacing the first build number Lh Continue Reading on AppleInsider Discuss on our Forums 2024-02-06 18:21:40
海外TECH AppleInsider - Frontpage News Apple introduces the first developer beta of visionOS 1.1 https://appleinsider.com/articles/24/02/06/apple-introduces-the-first-developer-beta-of-visionos-11?utm_medium=rss Following the release of the Apple Vision Pro Apple has brought out its first developer beta for its operating system visionOS visionOSBefore release the developer betas for visionOS could be downloaded to the developer s Mac which also acts as the development platform for visionOS apps The beta can be installed directly from the Apple Vision Pro by opening Settings then General followed by Beta Updates and selecting visionOS Developer Beta Users need a registered Apple developer account to access the beta Continue Reading on AppleInsider Discuss on our Forums 2024-02-06 18:33:19
海外TECH AppleInsider - Frontpage News Apple issues second watchOS 10.4 developer beta https://appleinsider.com/articles/24/02/06/apple-issues-second-watchos-104-developer-beta?utm_medium=rss Apple s second developer beta of watchOS is now available for trial by users testing using their Apple Watch Developers can download the new watchOS betaDevelopers taking part in the beta program can get the latest version from the Apple Developer Center or by updating their Apple Watch with the beta software Public beta releases generally appear shortly after the developer versions and users can sign up via the Apple Beta Software Program The second watchOS developer beta arrives after the first which Apple brought out on January Continue Reading on AppleInsider Discuss on our Forums 2024-02-06 18:17:12
海外TECH AppleInsider - Frontpage News Apple drops second developer beta of iOS 17.4, iPadOS 17.4 https://appleinsider.com/articles/24/02/06/apple-drops-second-developer-beta-of-ios-174-ipados-174?utm_medium=rss The second betas of iOS and iPadOS are now available giving developers a second chance to check out changes Apple is making to comply with the EU Digital Markets Act iOS Developers taking part in the beta program can acquire the latest builds through the Apple Developer Center or by updating their iPhone or iPad via the Settings app Public beta versions typically appear shortly after the developer versions and public participants can sign up through the Apple Beta Software Program website The second developer betas of iOS and iPadOS replace the first developer betas introduced on January Continue Reading on AppleInsider Discuss on our Forums 2024-02-06 18:06:24
海外TECH AppleInsider - Frontpage News Second macOS Sonoma 14.4 developer beta has arrived https://appleinsider.com/articles/24/02/06/second-macos-sonoma-144-developer-beta-has-arrived?utm_medium=rss The second developer beta of macOS Sonoma has arrived giving testers another build to try out on their Macs macOS SonomaDevelopers participating in the beta program can pick up the latest build through the Apple Developer Center or by updating Macs that are already running the beta The public beta which can be signed up to via the Apple Beta Software Program usually arrives not long after the developer versions are released The second beta arrives after the first round which Apple rolled out on January Continue Reading on AppleInsider Discuss on our Forums 2024-02-06 18:17:28
海外TECH Engadget How security experts unravel ransomware https://www.engadget.com/how-security-experts-unravel-ransomware-184531451.html?src=rss Hackers use ransomware to go after every industry charging as much money as they can to return access to a victim s files It s a lucrative business to be in In the first six months of ransomware gangs bilked million from their targets even though most governments advise against paying ransoms Increasingly security professionals are coming together with law enforcement to provide free decryption tools ーfreeing locked files and eliminating the temptation for victims to pony up There are a couple main ways that ransomware decryptors go about coming up with tools reverse engineering for mistakes working with law enforcement and gathering publicly available encryption keys The length of the process varies depending on how complex the code is but it usually requires information on the encrypted files unencrypted versions of the files and server information from the hacking group Just having the output encrypted file is usually useless You need the sample itself the executable file said Jakub Kroustek malware research director at antivirus business Avast It s not easy but does pay dividends to the impacted victims when it works First we have to understand how encryption works For a very basic example let s say a piece of data might have started as a cognizable sentence but appears like J qsfgfs dbut up epht once it s been encrypted If we know that one of the unencrypted words in J qsfgfs dbut up epht is supposed to be cats we can start to determine what pattern was applied to the original text to get the encrypted result In this case it s just the standard English alphabet with each letter moved forward one place A becomes B B becomes C and I prefer cats to dogs becomes the string of nonsense above It s much more complex for the sorts of encryption used by ransomware gangs but the principle remains the same The pattern of encryption is also known as the key and by deducing the key researchers can create a tool that can decrypt the files Some forms of encryption like the Advanced Encryption Standard of or bit keys are virtually unbreakable At its most advanced level bits of unencrypted plaintext data divided into chunks called blocks are put through rounds of transformation and then output in their encrypted ーor ciphertext ーform We don t have the quantum computing technology yet that can break encryption technology said Jon Clay vice president of threat intelligence at security software company Trend Micro But luckily for victims hackers don t always use strong methods like AES to encrypt files While some cryptographic schemes are virtually uncrackable it s a difficult science to perfect and inexperienced hackers will likely make mistakes If the hackers don t apply a standard scheme like AES and instead opt to build their own the researchers can then dig around for errors Why would they do this Mostly ego They want to do something themselves because they like it or they think it s better for speed purposes Jornt van der Wiel a cybersecurity researcher at Kaspersky said For example here s how Kaspersky decrypted the Yanluowang ransomware strain It was a targeted strain aimed at specific companies with an unknown list of victims Yanluowang used the Sosemanuk stream cipher to encrypt data a free for use process that encrypts the plaintext file one digit at a time Then it encrypted the key using an RSA algorithm another type of encryption standard But there was a flaw in the pattern The researchers were able to compare the plaintext to the encrypted version as explained above and reverse engineer a decryption tool now made available for free In fact there are tons that have already been cracked by the No More Ransom project Ransomware decryptors will use their knowledge of software engineering and cryptography to get the ransomware key and from there create a decryption tool according to Kroustek More advanced cryptographic processes may require either brute forcing or making educated guesses based on the information available Sometimes hackers use a pseudo random number generator to create the key A true RNG will be random duh but that means it won t be easily predicted A pseudo RNG as explained by van der Wiel may rely on an existing pattern in order to appear random when it s actually not ーthe pattern might be based on the time it was created for example If researchers know a portion of that they can try different time values until they deduce the key But getting that key often relies on working with law enforcement to get more information about how the hacking groups work If researchers are able to get the hacker s IP address they can request the local police to seize servers and get a memory dump of their contents Or if hackers have used a proxy server to obscure their location police might use traffic analyzers like NetFlow to determine where the traffic goes and get the information from there according to van der Wiel The Budapest Convention on Cybercrime makes this possible across international borders because it lets police request an image of a server in another country urgently while they wait for the official request to go through The server provides information on the hacker s activities like who they might be targeting or their process for extorting a ransom This can tell ransomware decryptors the process the hackers went through in order to encrypt the data details about the encryption key or access to files that can help them reverse engineer the process The researchers comb through the server logs for details in the same way you may help your friend dig up details on their Tinder date to make sure they re legit looking for clues or details about malicious patterns that can help suss out true intentions Researchers may for example discover part of the plaintext file to compare to the encrypted file to begin the process of reverse engineering the key or maybe they ll find parts of the pseudo RNG that can begin to explain the encryption pattern Working with law enforcement helped Cisco Talos create a decryption tool for the Babuk Tortilla ransomware This version of ransomware targeted healthcare manufacturing and national infrastructure encrypting victims devices and deleting valuable backups Avast had already created a generic Babuk decryptor but the Tortilla strain proved difficult to crack The Dutch Police and Cisco Talos worked together to apprehend the person behind the strain and gained access to the Tortilla decryptor in the process But often the easiest way to come up with these decryption tools stems from the ransomware gangs themselves Maybe they re retiring or just feeling generous but attackers will sometimes publicly release their encryption key Security experts can then use the key to make a decryption tool and release that for victims to use going forward Generally experts can t share a lot about the process without giving ransomware gangs a leg up If they divulge common mistakes hackers can use that to easily improve their next ransomware attempts If researchers tell us what encrypted files they re working on now gangs will know they re on to them But the best way to avoid paying is to be proactive If you ve done a good job of backing up your data you have a much higher opportunity to not have to pay said Clay This article originally appeared on Engadget at 2024-02-06 18:45:31
海外TECH Engadget Amazon Fire tablets are up to 35 percent off right now https://www.engadget.com/amazon-fire-tablets-are-up-to-35-percent-off-right-now-181542666.html?src=rss This may be a good time to buy one of Amazon s latest tablets as many of them are on sale with discounts of up to percent The sale brings the Fire HD down to which is only more than its record low and percent off the list price This model comes with GB of RAM GB of storage and a speedier processor than the last time around The p HD screen is touch and stylus compatible and there s a megapixel camera up front and another in back Note that this model displays ads on the lockscreen If you d rather not see those promos the ad free version is also on sale and currently more at nbsp All Fire tablets are budget slates that let you browse the web watch shows and play casual games They probably aren t the best pick if you re looking for a workhorse productivity tablet which tend to cost significantly more You won t be able to run Apple apps which seems obvious but Fire tablets also don t natively support the Google Play store ーeven though Fire OS is a fork of Android Readily available apps come from the Amazon app store which include most major streamers like Netflix Max Peacock social apps like TikTok and Instagram and plenty of casual games If you re just looking for a way to entertain yourself after a day of being productive Fire tablets offer one of the few ways to do so for under And like all Amazon devices Alexa is built in to answer questions and control your smart home lights cameras and doorbells nbsp Elsewhere in the sale the Fire HD is down to which is percent off and around more than its record low This is an inch version of Amazon s tablet with GB of RAM GB of storage and a x screen at ppi There s a MP front camera and a claimed battery life of hours This is also a model with lockscreen promos the ad free version is nbsp Follow EngadgetDeals on Twitter and subscribe to the Engadget Deals newsletter for the latest tech deals and buying advice This article originally appeared on Engadget at 2024-02-06 18:15:42
詳細記事 ダイヤモンド・オンライン - 新着記事 【精神科医が教える】 ふとネガティブなことが頭に浮かんで落ち込んでしまう根本的理由 - 精神科医Tomyが教える 30代を悩まず生きる言葉 https://diamond.jp/articles/-/336855 精神科医,tomy,カミングアウト 2024-02-07 04:00:00
詳細記事 ダイヤモンド・オンライン - 新着記事 「体調を崩してまして」英語でどう言う? 使えるようになりたいネイティブが使う英語表現 - 見たまま秒で言う英会話 https://diamond.jp/articles/-/337675 ネイティブ,外国語学部,英語学習 2024-02-07 03:57:00
YouTube Channels google 3 ways to protect yourself from bad ads #SaferInternetDay https://www.youtube.com/watch?v=EIs7I1WaHf8 Subscribe to our Channel Tweet with us on X Follow us on Instagram Join us on Facebook 2024-02-06 18:24:50

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)