1. Nachrichten >
  2. Data Scientists: Kommt der Datenwissenschaftler 2.0?

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Data Scientists: Kommt der Datenwissenschaftler 2.0?


Nachrichten vom | Direktlink: computerwoche.de Nachrichten Bewertung

Data Scientist gilt für viele immer noch als Traumjob. Doch am Datenwissenschaftler-Himmel ziehen dunkle Wolken auf - der technologische Fortschritt wird das Berufsbild nachhaltig verändern....

Externe Webseite mit kompletten Inhalt öffnen



https://www.computerwoche.de/a/kommt-der-datenwissenschaftler-2-0,3549205?utm_source=Nach-Artikeltyp_1,30,119,124&utm_medium=RSS&utm_campaign=RSS-Feeds

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • Diving Deep Into a Pwn2Own Winning WebKit Bug

    vom 357.72 Punkte ic_school_black_18dp
    Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of
  • CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters

    vom 282.02 Punkte ic_school_black_18dp
    In April 2020, Microsoft released four Critical and two Important-rated patches to fix remote code execution bugs in Microsoft SharePoint. All these are deserialization bugs. Two came through the ZDI program from an anonymous researcher: CVE-2020-0931
  • CVE-2020-0729: Remote Code Execution Through .LNK Files

    vom 234.41 Punkte ic_school_black_18dp
    In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, John Simpson and Pengsu Cheng of the Trend Micro Research Team detail a recent remote code execution bug in Microsoft Windows .LNK files. The following is a portion of
  • ConstraintLayout 2.0.0 beta 7

    vom 216.1 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 7. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta7'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint
  • Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

    vom 195.34 Punkte ic_school_black_18dp
    Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven
  • ConstraintLayout 2.0.0 beta 2

    vom 192.9 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 2. It’s available from the google maven repository: dependencies {    implementation 'com.android.support.constraint:constraint-layout:2.0.0-beta2'} or if using the AndroidX packages: dependencies {    implementation 'androidx.con
  • ConstraintLayout 2.0.0 beta 5

    vom 183.13 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 5. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta5'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint
  • MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

    vom 177.03 Punkte ic_school_black_18dp
    In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N
  • Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

    vom 168.48 Punkte ic_school_black_18dp
    This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t
  • Power BI and Azure Data Services dismantle data silos and unlock insights

    vom 154.1 Punkte ic_school_black_18dp
    Learn how to connect Power BI and Azure Data Services to share data and unlock new insights with a new tutorial. Business analysts who use Power BI dataflows can now share data with data engineers and data scientists, who can leverage the power of A
  • ConstraintLayout 2.0.0 beta 4

    vom 152.61 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 4. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta4'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint
  • DirectX to the Kernel

    vom 146.51 Punkte ic_school_black_18dp
    The operating system kernel is the final goal for every great exploit chain. You can look at the entries in the Zero Day Initiative (ZDI) Pwn2Own contests over the years to see that process at work. The Windows kernel has been subject to many points of

Team Security Diskussion über Data Scientists: Kommt der Datenwissenschaftler 2.0?