Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (2024)

Michael Tchuindjang

Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

  • Report this post

Online graphic design platform Canva went looking for security problems in fonts, and found three – in "strange places." On its engineering blog, the Australian outfit explained it's "continuously looking for ways to uplift the security of [its] processes, software, supply chain, and tools," leading it to the "less explored attack surfaces, such as fonts that present a complex and prevalent part of graphics processing."Canva stressed that the font landscape is rife with attack surfaces, as corporations and individuals alike require unique typography – each with their own specifications. Canva has advocated treating fonts like any other untrusted input. "We hope to see more font security research in the future, because we believe it's an area still lacking in security maturity."...#fonts #graphicdesign #vulnerabilities #alert #securityawareness #insecurities #warning #cybersecurity #informationsecurity

Font security 'still a Helvetica of a problem' says Canva theregister.com

29

1 Comment

Like Comment

Dr Syreeta Charles-Cole

Independent Academic with 20+ years expertise | Ethicist | 🌐 Exploring the Synergy between Panpsychism and Embodied Cognition

2d

  • Report this comment

😂

Like Reply

1Reaction 2Reactions

To view or add a comment, sign in

More Relevant Posts

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Researchers have set a new world record for internet speed that is 4.5 million times faster than the average broadband. An international team that included scientists from Aston University in Birmingham set the new record of 301 terabits per second – the equivalent of 9,000 HD films – using a standard optical fibre. At this speed, it would take just one minute to download every single movie listed on the Internet Movie Database (IMDb).The record-breaking data transmission rate was achieved by developing a new optical processing device that opened up new wavelength bands that have not been previously used in fibre optic systems. With consumer demand for faster internet speeds constantly increasing, the researchers believe their new technology could be used to help internet service providers meet it...#internet #broadband #breakthrough #speed #datatransmission

    New world record for internet speed is 4.5 million times faster than broadband independent.co.uk

    33

    8 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Facebook was caught using a cyberattack method, “SSL man-in-the-middle,” to intercept and decrypt Snapchat, YouTube, and Amazon encrypted analytics traffic. Codenamed “Ghostbusters,” the project aimed at intercepting rivals’ encrypted app traffic for analytics despite some internal dissent. This practice is likely in violation of wiretapping laws and “potentially criminal,” advertisers suing Meta claim.According to advertisers suing Meta, the secret program was launched at the request of Mark Zuckerberg. Zuckerberg’s quotes from the internal emails to top executives in June 2016 reveal that he was worried about the quick growth of Snapchat. Facebook did not have analytics about a competitor because their traffic was encrypted. “Documents and testimony show that this “man-in-the-middle” approach – which relied on a technology known as a server-side SSL bump performed on Facebook’s Onavo servers – was in fact implemented, at scale, between June 2016 and early 2019,” plaintiffs claim...#meta #facebook #lawsuit #spying #cyber #cybersecurity

    Facebook may have exploited user devices to spy on competitors, documents show | Cybernews cybernews.com

    86

    12 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    𝐓𝐡𝐞 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐯𝐞𝐧𝐭𝐮𝐫𝐞𝐬 𝐰𝐢𝐭𝐡 𝐛𝐚𝐬𝐡𝐟𝐚𝐦 (𝐛𝐚𝐬𝐡 𝐟𝐚𝐦𝐢𝐥𝐲) 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 𝟓𝟕: 𝐅𝐢𝐯𝐞 𝐞𝐦𝐞𝐫𝐠𝐢𝐧𝐠 𝐚𝐫𝐞𝐚𝐬 𝐨𝐟 𝐨𝐩𝐩𝐨𝐫𝐭𝐮𝐧𝐢𝐭𝐲 𝐟𝐨𝐫 𝐀𝐈 𝐢𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲✅ Hi everyone and welcome to the cybersecurity ventures with the bash family 😊 !It's me again keke turkey 🦃. I am considered as a type of bird closely related to pheasants and quails, featured by my multicoloured feathers 😍. I like to spend much of my time foraging for food, and preening my feathers. Nevertheless, while I can run quite fast, I am unable to fly for any significant distance, making me vulnerable to predators 😥. ✅ Cyber attackers are evolving their tactics faster than anticipated, prompting cybersecurity vendors to enhance their defenses rapidly. However, with businesses increasingly adopting AI and the need for new security technologies, @VentureBeat unveiled five areas (our today topic) where generative AI is pivotal:🛡️𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐭𝐞𝐬𝐭𝐢𝐧𝐠: It may adapt to AI-driven attacks by automating more simulated attacks, leveraging gen AI for searching criminal characteristics, scanning IT environments, suggesting remediation steps, and auto-generating reports.🔍 𝐀𝐧𝐨𝐦𝐚𝐥𝐨𝐮𝐬 𝐝𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐩𝐫𝐞𝐯𝐞𝐧𝐭𝐢𝐨𝐧: Gen AI can enhance anomaly detection by monitoring telemetry data for intrusions, scaling across networks, APIs, and data repositories for comprehensive security.🚨 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐚𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐒𝐎𝐀𝐑 𝐜𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐢𝐞𝐬: Gen AI can streamline Security Operations Centers by improving alert accuracy, reducing false alarms, and enabling analysts to focus on high-value tasks.👨💻 𝐂𝐨𝐝𝐞 𝐫𝐞𝐯𝐢𝐞𝐰: Startups may focus on integrating security into software development processes with tools like Semgrep for customizable rule writing and validation to improve code review efficiency.🕵️♂️ 𝐒𝐲𝐧𝐭𝐡𝐞𝐭𝐢𝐜 𝐜𝐨𝐧𝐭𝐞𝐧𝐭 𝐝𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐯𝐞𝐫𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧: Next-gen verification tools can combat synthetic content by baselining authentic behavior, detecting voice clones, verifying articles, and identifying synthetic images and videos to mitigate identity fraud.✅ Tip of the day 😎 :Here are five Tips to Avoid Fake Apps in the Windows Store: https://lnkd.in/e_waXC3a #bashfam #cybersecurityventures #cyberawareness #cybersecurity #klex #tubuntu #keketurkey #bash #linux #cyberforeveryone #cybertalk

    • Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (17)

    13

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    “It would be impossible to train today’s leading AI models without using copyrighted materials” stated OpenAI in its filing to the UK House of Lords which made headlines across the web earlier this year. But a new model is challenging that assumption — at least, challenging the notion that it’s impossible to create a useful model without relying on copyrighted data.The new LLM is called KL3M (Kelvin Legal Large Language Model, pronounced “Clem”), and it is the work of 273 Ventures, a two-year-old startup co-founded by Daniel Martin Katz, a law professor at the Illinois Institute of Technology and chief strategy officer (CSO) of the venture, and his “frequent collaborator” Michael Bommarito, a legal technology entrepreneur who serves as 273 Ventures’ CEO. KL3M was released in late February 2024 but today, it earned the distinction of being the first LLM to receive a “Licensed Model (L) Certification” from independent auditing company Fairly Trained, a non-profit founded and led by former Stability AI executive Ed Newton-Rex earlier this year...#artificialintelligence #llm #copyright #ai #innovation #license #aimodel

    The first 'Fairly Trained' AI large language model is here https://venturebeat.com

    50

    10 Comments

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Popular artificial intelligence (AI) powered image generators can run up to 30 times faster thanks to a technique that condenses an entire 100-stage process into one step, new research shows. This framework results in smaller and leaner AI models that can generate images much more quickly while retaining the same quality of the final image. By applying their new framework to a new model — and cutting these "reverse diffusion" steps down to one — the scientists cut the average time it took to generate an image. In one test, their model slashed the image-generation time from approximately 2,590 milliseconds (or 2.59 seconds) using Stable Diffusion v1.5 to 90 ms — 28.8 times faster. The model can also offer advantages in industries where lightning-fast and efficient generation is crucial, the study co-lead author Tianwei Yin, a doctoral student in electrical engineering and computer science at MIT, said in a statement, leading to much quicker content creation...#artificialintelligencetechnology #innovation #aimodels #faster #mit

    MIT scientists have just figured out how to make the most popular AI image generators 30 times faster livescience.com

    46

    10 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    What is a TCP SYN Flood Attack, and how does it work? 🤔 Explore this animated infographic to gain a deeper understanding. 🤓 Happy learning! 🤗 Credits to @Cyber Security News.#klex #cybersecurity #informationsecurity

    • Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (30)

    23

    3 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Just 5% of businesses have a cyber expert on the board, despite stronger cybersecurity correlating with significantly higher financial performance, according to a new report by Diligent and Bitsight. There was a significant variation between countries regarding the proportion of organizations with a cyber expert on the board, ranging from 10% in France to just 1% in Canada.The study observed a significant improvement in cybersecurity performance when these experts are integrated into specialized risk committees. Companies with cyber experts on an audit or specialized risk committee achieved an average security performance score of 700 out of a maximum of 900, which compared to a score of 580 for those businesses that do not have a cyber expert on such committees...#businessboard #cybersecurityexpert #cyberinsights #impact #cybersecurity #informationsecurity #cyber

    Only 5% of Boards Have Cybersecurity Expertise infosecurity-magazine.com

    24

    7 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Open Systems Intercommunication (OSI) Layers and Potential Attacks. 🧊⚔️Credits to @Cyber Writes ✍.#klex #cybersecurity #informationsecurity

    • Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (40)

    40

    7 Comments

    Like Comment

    To view or add a comment, sign in

  • Michael Tchuindjang

    Cyber Security | Instructor | Mentor | I assist people and organizations in staying ahead of cybercriminals | Spiritual Guru

    • Report this post

    Researchers at the Department of Energy's Oak Ridge National Laboratory have demonstrated that advanced quantum-based cybersecurity can be realized in a deployed fiber link. The team transmitted a quantum signal for quantum key distribution––a secure approach to sharing a secret key––using a true local oscillator. A local oscillator quells the effects of noise scattered from other data transmitted in the same fiber-optic network, and the work demonstrated coexistence between the quantum and conventional data signals. The experiment resolved major roadblocks to implementing quantum key distribution while enhancing security, said Nicholas Peters, head of ORNL's Quantum Information Science Section and the study's principal investigator...#quantumcomputing #keydistribution #milestone #cybersecurity #fiberoptic #cryptography #cyber

    Researchers achieve quantum key distribution for cybersecurity in novel experiment phys.org

    45

    4 Comments

    Like Comment

    To view or add a comment, sign in

Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (48)

Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (49)

13,106 followers

  • 1,217 Posts

View Profile

Follow

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Michael Tchuindjang on LinkedIn: Font security 'still a Helvetica of a problem' says Canva (2024)

References

Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 5864

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.