Apple Loses Copyright Battle Against Security Startup Corellium

krakman writes: Corellium, a security research firm sued by Apple, has won a major legal victory against the iPhone maker. In a ruling that has wide-reaching implications for iPhone security research and copyright law, a federal judge in Florida threw out Apple’s claims that Corellium had violated copyright law with its software, which helps security researchers find bugs and security holes…

Cyberpunk Maker CD Projekt Sued by Investor Over Botched Launch

CD Projekt SA, the Polish video-game publisher of Cyberpunk 2077, was sued by an investor who claims the company misled him about the potential of the error-plagued game whose botched release this month caused shares to dive. From a report: Andrew Trampe sued Thursday in federal court in Los Angeles and seeks to represent other investors who bought the company’s securities….

How Do US Government Agencies Verify Security Software from Private Contractors?

A recent article at Politico argues that the U.S. government “doesn’t do much to verify the security of software from private contractors. And that’s how suspected Russian hackers got in.” The federal government conducts only cursory security inspections of the software it buys from private companies for a wide range of activities, from managing databases to operating internal chat applications. That…

Report: PHP, C++, Java, and .NET Applications are the Most Frequently Flawed

Application-security company Veracode “has released the 11th volume of its annual State of Software Security report, and its findings reveal that flawed applications are the norm, open-source libraries are increasingly untrustworthy, and it’s taking a long time to patch problems,” reports TechRepublic. The top three security flaws — like last year — are still information leakage, cryptographic issues, and CRLF injection:…

A New Release For GNU Octave

Long-time Slashdot reader lee1 shares his recent article from LWN: On November 26, version 6.1 of GNU Octave, a language and environment for numerical computing, was released. There are several new features and enhancements in the new version, including improvements to graphics output, better communication with web services, and over 40 new functions… In the words of its manual: GNU Octave…

Cyberpunk 2077 Bugs Hit CD Projekt

An anonymous reader shares a report: Numerous glitches reported by players as the long-awaited Cyberpunk 2077 game went live robbed creator CD Projekt of a stock surge on the back of encouraging advance-order sales figures. Poland’s biggest computer-games studio sold more than eight million copies of the futuristic title prior to its official release, mainly using higher-margin digital distribution. Excitement around…

Python’s Steering Council Assesses the After-Guido Era

47 of Python’s core developers participated in this year’s Core Development Sprint, according to this report — “but what’s more important is the very real and necessary community building that seemed to have taken place…” It’s an especially critical time for Python, which switched to a steering council model in February of 2019, after Guido van Rossum had stepped down as…

Twitter’s Launch of Fleets: Lag, Some Crashes, Bugs, Skepticism and Cat Pics

CNET reports on Twitter’s rocky rollout of “fleets” which disappear after 24 hours: In a blog post, Twitter said global tests of the feature indicated the tool helped people feel more comfortable joining public conversations on the service. “Those new to Twitter found Fleets to be an easier way to share what’s on their mind,” the company said. “Because they disappear…

Ubuntu Patches Bug That Tricked Gnome Desktop Into Giving Root Access

“Ubuntu developers have fixed a series of vulnerabilities that made it easy for standard users to gain coveted root privileges,” reports Ars Technica: “This blog post is about an astonishingly straightforward way to escalate privileges on Ubuntu,” Kevin Backhouse, a researcher at GitHub, wrote in a post published on Tuesday. “With a few simple commands in the terminal, and a few…

Hackers Can Now Reverse Engineer Intel Updates Or Write Their Own Custom Firmware

An anonymous reader quotes a report from Ars Technica: Researchers have extracted the secret key that encrypts updates to an assortment of Intel CPUs, a feat that could have wide-ranging consequences for the way the chips are used and, possibly, the way they’re secured. The key makes it possible to decrypt the microcode updates Intel provides to fix security vulnerabilities and…