innovator

Add idea


Calendar

«    October 2017    »
MonTueWedThuFriSatSun
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 

 

Advert

 

Payment

 

Advert

 

Authorization

Стартап

DateDate: 14-10-2017, 07:26

In the United States, the virtual reality of Holodeck appeared, allowing technicians and engineers who are at a distance from each other to work on joint projects. The information was provided by Zhenxun Huang, CEO of Nvidia.
Holodeck allows people in different offices or cities to communicate and work together. Technology can recreate three-dimensional images of objects in accordance with their actual size. For example, designers using a virtual assistant will save time on computer modeling and prototyping.
Holodeck is suitable for virtual training of technicians and industrial robots, testing software with real and dangerous tasks.
Earlier it was reported that scientists will use VR-technology to detect concussion.

DateDate: 14-10-2017, 07:23

High-Tech Bridge Company presented a free online service Mobile X-Ray for checking the security and privacy of mobile applications. The service promptly determines a wide range of common errors and vulnerabilities, including those included in the OWASP Mobile Top Ten rating, and also provides a report on identified problems with recommendations for their elimination.
In early October this year, experts identified a dubious feature in the mobile application Uber, which quietly took pictures of screens of users' smartphones. Earlier, the credit bureau Equifax was forced to remove its mobile application from online catalogs due to the risk of data leakage. Using the Mobile X-Ray service, any user can identify similar problems in the used applications.
According to statistics obtained through the ImmuniWeb application testing platform, 88% of the APIs and web services used in mobile applications are vulnerable to vulnerabilities that allow access to sensitive or sensitive data. At the same time, 69% of APIs and web-services do not have adequate mechanisms for protecting against common web-attacks.
It is noted that 97% of applications for Android contain at least one vulnerability from the OWASP Mobile Top Ten rating, over 78% of programs are subject to at least one high-risk vulnerability and two with an average level of risk. At the same time, 69% of applications lack encryption or unreliable encryption algorithms. According to the company, every second Android application contains encrypted encryption keys, credentials or other important information. Finally, less than 5% of applications use anti-debugging mechanisms to prevent reverse engineering.
In the case of iOS applications, the situation is no less critical. As it turned out, at least one vulnerability of the Top 10 OWASP contains 85% of applications. Over 69% of the programs contain one dangerous vulnerability and two medium-level hazards. In more than 50% of analyzed applications, there is no encryption, or unreliable encryption is used when acquiring or retrieving important data. Just like with Android applications, every second iOS program contains encrypted encryption keys, credentials or other information. Anti-debugging mechanisms use less than 9% of applications.
High-Tech Bridge Company presented a free online service Mobile X-Ray for checking the security and privacy of mobile applications. The service promptly determines a wide range of common errors and vulnerabilities, including those included in the OWASP Mobile Top Ten rating, and also provides a report on identified problems with recommendations for their elimination.
In early October this year, experts identified a dubious feature in the mobile application Uber, which quietly took pictures of screens of users' smartphones. Earlier, the credit bureau Equifax was forced to remove its mobile application from online catalogs due to the risk of data leakage. Using the Mobile X-Ray service, any user can identify similar problems in the used applications.
According to statistics obtained through the ImmuniWeb application testing platform, 88% of the APIs and web services used in mobile applications are vulnerable to vulnerabilities that allow access to sensitive or sensitive data. At the same time, 69% of APIs and web-services do not have adequate mechanisms for protecting against common web-attacks.
It is noted that 97% of applications for Android contain at least one vulnerability from the OWASP Mobile Top Ten rating, over 78% of programs are subject to at least one high-risk vulnerability and two with an average level of risk. At the same time, 69% of applications lack encryption or unreliable encryption algorithms. According to the company, every second Android application contains encrypted encryption keys, credentials or other important information. Finally, less than 5% of applications use anti-debugging mechanisms to prevent reverse engineering.
In the case of iOS applications, the situation is no less critical. As it turned out, at least one vulnerability of the Top 10 OWASP contains 85% of applications. Over 69% of the programs contain one dangerous vulnerability and two medium-level hazards. In more than 50% of analyzed applications, there is no encryption, or unreliable encryption is used when acquiring or retrieving important data. Just like with Android applications, every second iOS program contains encrypted encryption keys, credentials or other information. Anti-debugging mechanisms use less than 9% of applications.
More information: http://www.securitylab.ru/news/489060.php
Source: securitylab.ru

DateDate: 14-10-2017, 07:21

The law firm Bot & Partners Law Firm has created a bot named Gobsec, who knows how to develop legal documents, in particular, receipts.
This is written by ain.ua.
So, when the bot communicates with the user, he specifies the details (the amount of money that needs to be paid into debt, the presence of a fine in case of overdue payment, interest, etc.).
Bot Gobsec step by step helps the user to make a receipt. Thus, the user receives a finished document template in Google Docs, which can be printed and filled in with missing fields.
As the co-founder of 908 Andrei Horse has told, the bot will be able to make a statement of claim, if by the agreed date the debt will not be returned.
http://24tv.ua/tehnologiyi_tag1131?utm_source=seocopy