Browsing Category

TECHNOLOGIES

Student spotlight: Victory Yinka-Banjo

This interview is part of a series from the MIT Department of Electrical Engineering and Computer Science featuring students answering questions about themselves and life at the Institute. Recently’s interviewee,…

Two-Stage Method for Clothing Feature Detection

1. IntroductionThe fashion apparel industry’s reliance on imagery across various platforms, such as print media, e-commerce, and social media, has spurred the development of numerous object detection applications . These applications…

Rockwell Automation Arena Simulation | CISA

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: low attack complexity Vendor: Rockwell Automation Equipment: Arena Simulation Software Vulnerabilities: Out-of-bounds Write, Heap-based Buffer Overflow, Improper Restriction of…

Rockwell Automation FactoryTalk View ME | CISA

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk View ME Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation…

Automation-Direct C-MORE EA9 HMI | CISA

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: C-MORE EA9 HMI Vulnerabilities: Path Traversal, Stack-Based Buffer Overflow, Plaintext Storage of a…

Rockwell Automation PowerFlex 527 | CISA

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: PowerFlex 527 Vulnerabilities: Improper Input Validation, Uncontrolled Resource Consumption 2. RISK…

Q&A: How refusal can be an act of design

This month in the ACM Journal on Responsible Computing, MIT graduate student Jonathan Zong SM ’20 and co-author J. Nathan Matias SM ’13, PhD ’17 of the Cornell Citizens and Technology Lab examine how the notion…

Emilia Yang on Building a Future in Freedom

The rise of authoritarianism brings the erasure of memory. In several Central American countries, women’s stories are being erased, their bonds disrupted, and the spaces they inhabit made threatening. The Union of Feminists Engendering New…

The most effective extreme weather narratives

From dangerous heat to relentless wildfires, extreme weather is everywhere. July 5th was the hottest day ever recorded. July 6th was hotter. These extreme weather events can motivate action on climate change–if we talk about them in the…

Top questions about our global report

Earlier this month, we had the opportunity to present our global research briefing, “Later is Too Late,” to over 800 participants. We shared the key findings from our 23-country survey which seeks to answer: Does the world want action on…

Global Report: Later is too late

/* append - start */ .c-content-single { padding: 0; } .l-container--m { max-width: none; } article > h1:first-of-type { position: absolute; top: 120px; left: 60px; font-size: 20px; font-weight: 400; } .c-social-share {…

The road to clean

Continued investment in electric vehicle (EV) programs depends on broad public support. While EV sales have been accelerating dramatically, perspectives on EVs have become starkly partisan as a result of misinformation. Through extensive…

Wildfire Exchange

Mission The Wildfire Exchange project delivers an online learning hub for the development, exchange and consolidation of wildfire knowledge in the built environment between Chile and Australia. Wildfires can…

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More