Month: September 2018

0 Comments
Disrupt Berlin 2018, Europe’s most exciting tech conference, takes place on November 29-30 and plays host to hundreds of early-stage startups and thousands of attendees. We’re talking boundary-pushing founders, investors, hackers and tech leaders. Not to mention legendary events like Startup Battlefield, the startup competition that’s launched more than 750 companies. Does your early-stage startup have
0 Comments
Popular news aggregation site NewsNow has been notifying its users of a potential password breach after it found evidence of an intrusion. The firm notified customers about the incident via email this week after finding backdoor malware on some of its servers. The issue is said to have been patched and remediated. That could leave
0 Comments
by Danny Bradbury Users were complaining this week after discovering they’d been logged in to Google’s Chrome browser automatically, after logging into a Google website. Chrome has long included a feature that lets you log in, connecting the browser directly to your Google account. This lets the browser, via its sync feature, store information about
0 Comments
When people think about IoT devices, many often think of those that fill their homes. Smart lights, ovens, TVs, etc. But there’s a whole other type of IoT devices that are inside the home that parents may not be as cognizant of – children’s toys. In 2018, smartwatches, smart teddy bears, and more are all
0 Comments
Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry? There are few things that cause the computer security industry more concern than the need to avoid “false negatives”. While no product or technology is a silver
0 Comments
Google CEO Sundar Pichai will meet in private with Republican lawmakers on Friday to discuss issues including its work in China and alleged political bias, reports the Wall Street Journal. The meeting was organized by House Majority leader Kevin McCarthy, who has accused Google of “controlling the internet” by boosting negative news stories about conservatives
0 Comments
According to a new study released by (ISC)2, organizations that have made a strong investment in cybersecurity technology are better able to retain the talent they need to protect against both internal and external threats. The study, Building a Resilient Cybersecurity Culture, surveyed 250 organizations, representing a range of sizes. The prerequisite was that the
0 Comments
Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message Even though the first part of this series has not yet been published at the time of writing, it will not surprise me if some of the feedback
0 Comments
A high-severity vulnerability has been discovered in 4G-based wireless 4GEE Mini modem sold by mobile operator EE that could allow an attacker to run a malicious program on a targeted computer with the highest level of privileges in the system. The vulnerability—discovered by 20-year-old Osanda Malith, a Sri Lankan security researcher at ZeroDayLab—can be exploited
0 Comments
Celebrated former ProPublica investigative journalists Julia Angwin and Jeff Larson are launching their newest venture, the investigative nonprofit news organization called The Markup, with help from some big donors including Craigslist founder, Craig Newmark. The Markup co-founders Angwin, Larson and executive director Sue Gardner (the former head of the Wikimedia Foundation), are backed by a $20
0 Comments
Taking a critical step forward in national cyber defense, the White House yesterday published the National Cyber Strategy, aimed at strengthening America’s cybersecurity capabilities. President Trump wrote, “With the release of this National Cyber Strategy, the United States now has its fully articulated cyber strategy in 15 years.” “The new national cyber strategy is a
0 Comments
Author: Brett Stone-Gross, Ph.D., Dell SecureWorks Counter Threat Unit Date: 7 August 2014 Overview Lurk is a malware downloader that uses digital steganography: the art of hiding secret information within a digital format, such as an image, audio, or video file. Lurk specifically uses an algorithm that can embed encrypted URLs into an image file
0 Comments
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent tactic by ransomware developers looking to exploit the profiles of major politicians to install ransomware on victims’ computers. Donald Trump, Angela Merkel, and now Barack Obama all serve as lures for the unsuspecting. Despite its
0 Comments
The security and privacy issues with APIs and third-party app developers are something that’s not just Facebook is dealing with. A bug in Twitter’s API inadvertently exposed some users’ direct messages (DMs) and protected tweets to unauthorized third-party app developers who weren’t supposed to get them, Twitter disclosed in its Developer Blog on Friday. What
0 Comments
The White House published a comprehensive National Cyber Strategy detailing how the Trump administration aims to improve cybersecurity in government, critical infrastructure and the private sector, as well as tackling cybercrime and international issues. The National Cyber Strategy builds upon the cybersecurity executive order signed in May 2017 and the subsequent security audit reports submitted
0 Comments
There’s an episode in the latest season of the Hulu original series Casual, where the main character, Alex, tries his hand at dating in virtual reality. He quickly meets a woman and develops a big, adrenaline-inducing crush only to realize she’s a scammer out for his credit card information. The season takes place around 2021
0 Comments
Independence Blue Cross, a Philadelphia-based health insurer notified thousands of its members this week that a data breach had exposed some of their protected health information (PHI), according to Healthcare Informatics. On July 19, 2018, Independence Blue Cross’s privacy office announced a breach in which the personal information of approximately 17,000 members – fewer than
0 Comments
Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 27 August 2014 Overview In late February 2014, the Dell SecureWorks Counter Threat Unit™ (CTU™) research team analyzed a family of file-encrypting ransomware being actively distributed on the Internet. Although this ransomware, now known as CryptoWall, became well-known in the first quarter of 2014, it has
0 Comments
ESET researchers have discovered new DanaBot campaigns targeting a number of European countries Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently expanded further, with campaigns popping up in Italy, Germany, Austria, and