C++ creator rebuts White House warning

C++ creator Bjarne Stroustrup has defended the widely used programming language in response to a Biden administration report that calls on developers to use memory-safe languages and avoid using vulnerable ones such as C++ and C. In a March 15 response to an inquiry from InfoWorld, Stroustrup pointed out strengths of C++, which was designed in 1979.
Safety improvement always has been a goal of C++ development efforts, Stroustrup stressed.
The White House in a report released February 26 called on developers to reduce the risk of cyber attacks by using programming languages that do not have memory safety vulnerabilities.
C++ and C were cited as two examples of languages with memory safety vulnerabilities.
A November 2022 cybersecurity information sheet from the US National Security Agency cited C#, Go, Java, Python, and Rust as languages considered to be memory-safe.
Stroustrup cited a number of efforts to improve C++ safety.
Stroustrup previously defended the safety of C++ against the NSA, which recommended using memory-safe languages instead of C++ and C in a November 2022 bulletin.


This Cyber News was published on www.infoworld.com. Publication date: Mon, 18 Mar 2024 17:13:07 +0000


Cyber News related to C++ creator rebuts White House warning

CVE-2021-46976 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Section 702 Surveillance Reauthorization May Get Slipped Into 'Must-Pass' NDAA - House majority leader Steve Scalise and House minority leader Hakeem Jeffries did not respond to WIRED's requests for comment, nor did any senior members of the House and Senate armed services committees. Republican staffers tell WIRED that extending ...
7 months ago Wired.com
C++ creator rebuts White House warning - C++ creator Bjarne Stroustrup has defended the widely used programming language in response to a Biden administration report that calls on developers to use memory-safe languages and avoid using vulnerable ones such as C++ and C. In a March 15 ...
3 months ago Infoworld.com
Online ransomware decryptor helps recover partially encrypted files - CyberArk has created an online version of 'White Phoenix,' an open-source ransomware decryptor targeting operations using intermittent encryption. The company announced today that although the tool was already freely available through GitHub as a ...
5 months ago Bleepingcomputer.com
Competing Section 702 surveillance bills on collision path The Register - Two competing bills to reauthorize America's FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a battle over warrantless surveillance before the law lapses in the New Year. At stake ...
6 months ago Go.theregister.com
Competing Section 702 surveillance bills on collision path The Register - Two competing bills to reauthorize America's FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a battle over warrantless surveillance before the law lapses in the New Year. At stake ...
6 months ago Theregister.com
Behind Closed Doors: The Dangers of Relying on In-House Platforms for Business Success - Setting the right strategy for a company is indeed only half the battle against the competition in today's volatile digital world. The majority of business processes in companies evolve organically and slowly over time, and this in turn easily ...
6 months ago Cysecurity.news
Top White House cyber aide says recent Iran hack on water system is call to tighten cybersecurity - WASHINGTON - A top White House national security official said recent cyber attacks by Iranian hackers on U.S. water authorities - as well as a separate spate of ransomware attacks on the health care industry - should be seen as a call to action by ...
6 months ago Apnews.com
Top White House Cyber Aide Says Recent Iran Hack on Water System Is Call to Tighten Cybersecurity - A top White House national security official said recent cyber attacks by Iranian hackers on US water authorities - as well as a separate spate of ransomware attacks on the health care industry - should be seen as a call to action by utilities and ...
6 months ago Securityweek.com
Roundup: Federal action that shaped cybersecurity in 2023 - As 2023 draws to a close, it's time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level. These ...
6 months ago Securityintelligence.com
Congressional leaders seek to extend contested surveillance program until April - The life of foreign spying tools set to expire in a few weeks could be briefly extended until April 19 after congressional leaders inserted a short-term renewal into the annual defense policy bill. The decision to attach a temporary renewal of ...
7 months ago Therecord.media
CVE-2021-46958 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2022-31113 - Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based ...
1 year ago
CVE-2023-22475 - Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an ...
1 year ago
US House 'Asks Intel, Nvidia, Micron CEOs' To Testify On China - US House of Representatives China committee asks chief executives of Intel, Nvidia, Micron to testify as international tensions mount. The chief executives of Intel, Nvidia and Micron have been asked to testify before the US House of Representatives' ...
5 months ago Silicon.co.uk
The Pentagon Tried to Hide That It Bought Americans' Data Without a Warrant - United States officials fought to conceal details of arrangements between US spy agencies and private companies tracking the whereabouts of Americans via their cell phones. Obtaining location data from US phones normally requires a warrant, but ...
5 months ago Wired.com
FISA Section 702 renewal approved by House The Register - Infosec in brief US Congress nearly killed a reauthorization of FISA Section 702 last week over concerns that it would continue to allow warrantless surveillance of Americans, but an amendment to require a warrant failed to pass. Section 702 of the ...
2 months ago Go.theregister.com
CVE-2023-46217 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
CVE-2023-46216 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
CVE-2023-41727 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
Ransomware Gangs Are Collaborating To Attack Financial Services - The Cyber-Extortion Trinity-the BianLian, White Rabbit, and Mario ransomware gangs-was observed by researchers working together to launch a joint extortion campaign against publicly traded financial services companies. Although these joint ransomware ...
6 months ago Cybersecuritynews.com
Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin - Melissa Hathaway hasn't shied away from advising corporate boards and government leaders on cybersecurity policy since leaving the White House a decade ago. Currently a member of the Centre for International Governance Innovation's board of ...
7 months ago Darkreading.com
White House hosts Counter Ransomware Initiative summit, with a focus on not paying hackers - The third annual White House-led counter ransomware summit convening 48 countries, the European Union and Interpol launches in Washington today, featuring several new elements including a pledge from most member states not to pay ransoms and a ...
7 months ago Therecord.media
The Unlikely Romance of Hackers and Government Suitors - The annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the press about the most critical cybersecurity challenges facing our nation. Hack the Capitol ...
6 months ago Darkreading.com
Key Building Blocks to Advance American Leadership in AI - The AI era is set to be a time of significant change for technological and information security. To guide the development and deployment of AI tools in a way that embraces their benefits while safeguarding against potential risks, the US government ...
6 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)