Category: Blog
-
Use Retraction Watch to Keep Tabs on Bogus “Hijacked” Journals
⋅
As a research institution, we know the value of credible, peer- reviewed journals. To cite and be cited is the lifeblood of modern academic discourse. But how do you know if a journal is what it purports to be? As reported recently in Nature, the project Retraction Watch, can allow researchers to find out before they submit if a…
-
A New Approach to Defeating Audio Capture Transcription
⋅
In a previous message, we discussed the revelation that various videoconferencing apps were continuing to collect audio data even when microphones were muted, against the expectations of most users. Taking concerns further, if you wish to guard against an unknown microphone surreptitiously listening in on your conversations, what can be done to make sure the recorded…
-
Muting in Virtual Meetings May Not Guarantee Privacy
⋅
It is not unreasonable to assume that when you mute yourself in a virtual meeting, your microphone will no longer be accessed by the meeting application. However, a new study from the University of Wisconsin-Madison has found that in all cases, videoconferencing apps do not give up access to the microphone and collect some data.…
-
Apache HTTP Server Critical Vulnerability under Active Exploitation
⋅
There are reports of active attacks on Apache servers. Apache HTTP Server 2.4.48 and earlier are vulnerable to a server-side request forgery (SSRF) flaw, allowing attackers to send crafted requests via a vulnerable server (turning it into a proxy) to target internal resources behind firewalls or arbitrary external systems. The CVSS (Common Vulnerability Scoring System) score for this…