The Download: cybersecurity’s shaky alert system, and mobile IVF

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Cybersecurity’s global alarm system is breaking down Every day, billions of people trust digital systems to run everything from communication to commerce to critical infrastructure. But the global early warning system that alerts […]

6 mins read

PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution on millions of transport vehicles from different vendors. The vulnerabilities, dubbed PerfektBlue, can be fashioned together as an exploit chain to run arbitrary code on cars from at least three major […]

4 mins read

How to provide private storage for internal company documents.

Private storage account refers to a cloud storage account that is not publicly accessible over the internet access is restricted to ensure data confidentiality and security. It is configured to deny anonymous or public access. Only authenticated users, services, or networks can access it usually via: Private endpoints, Virtual networks (VNets), Access control policies (like […]

4 mins read

Modeling CORS frameworks with CodeQL to find security vulnerabilities

There are many different types of vulnerabilities that can occur when setting up CORS for your web application, and insecure usage of CORS frameworks and logic errors in homemade CORS implementations can lead to serious security vulnerabilities that allow attackers to bypass authentication. What’s more, attackers can utilize CORS misconfigurations to escalate the severity of […]

13 mins read

A new era of Stack Overflow

Every year for the last three years, we’ve shared major announcements from the mainstage of WeAreDevelopers World Congress in Berlin at pivotal moments in our journey. In 2023, we launched OverflowAI, our flagship AI initiative for our users and enterprise customers, while last year, we revealed our vision for the Knowledge as a Service model […]

11 mins read

Two Examples of Useful, Non-Robust Features

A Discussion of ‘Adversarial Examples Are Not Bugs, They Are Features’: Two Examples of Useful, Non-Robust Features Ilyas et al. define a feature as a function fff that takes xxx from the data distribution (x,y)∼D(x,y) \sim \mathcal{D}(x,y)∼D into a real number, restricted to have mean zero and unit variance. A feature is said to be […]

7 mins read

Ideas Without Love | Techdirt

from the elegant-nihilism dept I recently sat through this hour-long interview between New York Times opinion columnist Ross Douthat and Peter Thiel. It was honestly a somewhat hypnotic experience for me. And on reflection, deeply disturbing. Not because Thiel said anything overtly monstrous—quite the opposite. He was thoughtful, articulate, intellectually sophisticated. He demonstrated genuine insight into technological stagnation, political […]

4 mins read

What can agents actually do?

There’s a lot of excitement about what AI (specifically the latest wave of LLM-anchored AI) can do, and how AI-first companies are different from the prior generations of companies. There are a lot of important and real opportunities at hand, but I find that many of these conversations occur at such an abstract altitude that […]

21 mins read