Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ancharia Desktop 1 1

Category: innovation

Malaysia launches new RM2 billion submarine cable for digital revolution

Malaysia has announced the construction of a new submarine fiber-optic cable system to boost connectivity between the eastern and western parts of the country, aiming to support the growth of...
Share on Facebook Share on LinkedIn Share on X

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a...
Share on Facebook Share on LinkedIn Share on X

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...
Share on Facebook Share on LinkedIn Share on X

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer "Fugaku," developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings of the world's fastest machines for years thanks to its...
Share on Facebook Share on LinkedIn Share on X

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it's already a recognized field of study, but here it's almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence...
Share on Facebook Share on LinkedIn Share on X

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...
Share on Facebook Share on LinkedIn Share on X

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...
Share on Facebook Share on LinkedIn Share on X

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...
Share on Facebook Share on LinkedIn Share on X

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...
Share on Facebook Share on LinkedIn Share on X

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...
Share on Facebook Share on LinkedIn Share on X