January 21, 2022
11 11 11 AM
What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake
mRNA vaccines, asteroid missions, and collaborative robots: what to watch in science in 2022 – podcast
Pentagon report says UFOs can’t be explained, and this admission is a big deal
How colonialism’s legacy makes it harder for countries to escape poverty and fossil fuels today
Schools must act carefully on students’ off-campus speech, Supreme Court rules
Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?
Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has
Fast computers, 5G networks and radar that passes through walls are bringing ‘X-ray vision’ closer to reality
Study shows AI-generated fake reports fool experts
AzuraCast, open source Web Radio Manager
Latest Post
What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake mRNA vaccines, asteroid missions, and collaborative robots: what to watch in science in 2022 – podcast Pentagon report says UFOs can’t be explained, and this admission is a big deal How colonialism’s legacy makes it harder for countries to escape poverty and fossil fuels today Schools must act carefully on students’ off-campus speech, Supreme Court rules Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be? Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has Fast computers, 5G networks and radar that passes through walls are bringing ‘X-ray vision’ closer to reality Study shows AI-generated fake reports fool experts AzuraCast, open source Web Radio Manager
Jan
2022
7

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake

Santiago Torres-Arias, Purdue University Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide

%d bloggers like this: