By continuing to use the site or Forum, you agree to the use of cookies, find out more by reading our GDPR policy.

Microsoft is inviting AI researchers with ideas but no resources to submit their ideas to their  Microsoft AI Idea Challenge Contest for a chance to win prizes and collaborate with other developers. The Microsoft AI Idea Challenge is directed at developers, students, professionals and data scientists seeking innovative, breakthrough artificial intelligence (AI) solutions. The contest also provides a platform for developers, students and data scientists community to freely share AI models and applications, so they are reusable and easily accessible. The Microsoft AI Idea Challenge is looking for AI solutions across all use cases. The top three ideas will each receive prizes plus an opportunity to present the idea with Microsoft on AI Lab. Ideas will be judged on originality, feasibility and complexity to implement. The first prize is a 15 inch Surface Book, the second a DJI Drone Mavic Pro Bundle and the 3rd and Xbox One. The Microsoft AI Challenge is accepting submissions between August 13th– October 12th, 2018. Individuals or teams are required to submit a working AI model, test dataset, any demo app and a demo video (max. three minutes long) to qualify for the competition. Preference will be given for solutions developed on Microsoft AI Platform and services. Learn more at OUR FORUM.

A vulnerability in the VBScript engine has been used by hackers working for North Korea to compromise systems targeted by the Darkhotel operation. VBScript is available in the latest versions of Windows and in Internet Explorer 11. In recent versions of Windows, though, Microsoft in the default configuration of its browser, making it immune to the vulnerability. There are other methods to load scripts, though. For instance, applications in the Office suite rely on the IE engine to load and render web content. Security researchers from Trend Micro noticed a VBScript vulnerability being exploited in the wild a day after Microsoft delivered its regular updates for Windows in July. Now tracked as CVE-2018-8373, the bug has been addressed in this month's patch delivery. It is a use-after-free memory corruption that allows the attacker to run shellcode on the compromised computer. After analyzing the exploit code, researchers discovered that it shared the obfuscation technique used by exploits for an older VBScript vulnerability also used in the wild and patched in May, CVE-2018-8174. Also known as Double Kill, the vulnerability was reported by experts at Chinese security company Qihoo 360. Get better informed by visiting W10NI.

Google Chrome is without a doubt the most popular internet browser in the world right now and according to third-party data, it holds close to 65% market share. Google Chrome is easy to use and secure. Last year, the search engine giant updated the web browser with a much-needed built-in software that would warn users about incompatible apps. It’s an experimental feature and sometime it could warn users against the apps. The browser began blocking third-party software from injecting into Chrome processes. After restarting, it will allow the injection but it would show a warning that guides the user to remove the software. Over the last few days, in an old Google product forum post, the users have revealed that Google Chrome browser is warning them against legit apps and the warning showed up after the browser crashed. In another thread, users claim that they have received a similar warning. A user on Reddit social media website has also shared a screenshot that shows Chrome browser’s warning in action. According to the Reddit user, the Chrome browser crashed and it launched with the above screen. The issue is not limited to any specific app. By the looks of things, the first few reports appeared back in late June and new reports have surfaced online over the last few days. More on this topic is posted on OUR FORUM.

Google has patched a vulnerability in the Chrome browser that allows an attacker to retrieve sensitive information from other sites via audio or video HTML tags. Ron Masas, a security researcher with Imperva, discovered and reported this issue —tracked as CVE-2018-6177— to Google. The browser maker fixed the security hole at the end of July with the release of Chrome v68.0.3440.75. The vulnerability can be exploited in older versions of Chrome in situations where an attacker can lure a victim on a malicious site, via malvertising (malicious code inside ads embedded on legitimate sites), or via vulnerabilities on legitimate sites where an attacker can inject and execute code —such as via stored cross-site scripting (XSS) flaws. In a write-up published earlier today and shared with Bleeping Computer, Masas explained that the attack scenario requires malicious code that loads content from legitimate sites inside audio and video HTML tags. Through the use of "progress" events, Masas says he can deduce the size of responses he gets from external sites, and guess various types of information. Under normal circumstances, this wouldn't be possible because of CORS —Cross-Origin Resource Sharing— a browser security feature that prevents sites from loading resources from other websites, but this attack bypasses CORS. Full details posted on OUR FORUM.

Most recent Intel processors for desktops, laptops, and tablets feature integrated graphics capable of driving 4K displays and maybe even some gaming tasks. But Intel has been beefing up its graphics team recently, and now the company has confirmed recent reports that it plans to launch a discrete graphics card in 2020. The news comes via a short video posted on Twitter, and while it’s light on details, the company does promise that in 2020 it will “set our graphics free,” indicating that we’ll see a GPU that’s not built into the same silicon as an Intel CPU. This isn’t Intel’s first foray into discrete graphics solutions. The company launched the Intel i740 graphics card in 1998… but it was a commercial flop and the company scrapped the entire product line not long after that (a small number of i752 cards were released, but Intel canceled the i754 graphics card before it ever launched). At this point, it’s unclear what Intel hopes to bring to the table in 2020. A lot has changed in the past two decades and the discrete GPU space is still dominated by NVIDIA and AMD (which acquired GPU maker ATI). But Intel has also been chugging along all that time pushing more and more advanced features into integrated graphics. There's more posted on OUR FORUM.

Today is Patch Tuesday and Microsoft has just rolled out Windows 10 KB4343909. In case you’re planning to upgrade the PC manually, the direct download links for Windows 10 KB4343909 are also available. KB4343909 is available for devices running Windows 10 version 1803 and it advances the system to Build 17134.228. The latest patch for Windows 10 April 2018 Update comes with its own pack of improvements. First and foremost, to check if you’re already running the latest build, press Win key + R and then winver. If it shows Windows 10 Build 17134.228, the cumulative update has installed successfully. If the build number is something else, you would need to Open Settings and navigate to Update & Security -> Windows Update -> Check for updates. The latest patch for Windows 10 April 2018 Update addresses both security and non-security bugs. The update has fixed issues with Internet Explorer and Microsoft Edge. In the changelog, Microsoft explains that the new protections against a speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) have been applied. The company says that the vulnerability affects the Intel Core processors and Intel Xeon, processors. We have posted the download links on OUR FORUM.