Month: September 2018

0 Comments
Lime, the 18-month-old, San Francisco-based company whose bright green bicycles and scooters now dot cities throughout the U.S., launched a pilot program in Tacoma, Washington, today, but that tiny victory might have felt short-lived. The reason: on the opposite side of the country, a Lime rider was killed today by an SUV while tooling around Washington
0 Comments
As the cyber industry continues to evolve, it becomes increasingly difficult for organizations to stay ahead of the curve, making the ever-changing threat landscape a major concern for many businesses, according to the 2018 Travelers Risk Index published by The Travelers Indemnity Company. Evolving threats and new digital developments make cyber a top concern for large technology,
0 Comments
Author: Brett Stone-Gross and Pallav Khandhar, Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 17 December 2014 Summary Threat actors regularly develop new Trojan horse malware to fuel their operations and to ensure the longevity of their botnets. After the takedowns of the Gameover Zeus and Shylock botnets, researchers predicted that a new breed of
0 Comments
The skimmer, injected into the store’s payment page, harvested credit-card details from the store’s online customers for more than a month The major electronics and computer hardware retailer Newegg has announced that attackers have compromised its online payments system, potentially scooping up buyers’ credit-card data over a period of more than a month. “Yesterday we
0 Comments
A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database
0 Comments
Researchers at the prestigious Salk Institute are reporting that they have managed to map the molecular structure of a CRISPR enzyme that could allow scientists to more precisely manipulate functions within cells. Over the past several years, CRISPR-Cas9 has seized the public imagination for its ability to edit genetic code in a way that may correct defects inside
0 Comments
The infamous Magecart code has struck again, with an attack group this time using it to skim card details from customers of online retailer Newegg for a full month, according to researchers. The US-based, tech-focused e-tailer has yet to release a statement on the news, but RiskIQ, which has been following Magecart closely over the past
0 Comments
Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 January 2015 Summary Dell SecureWorks Counter Threat Unit(TM) (CTU) researchers discovered malware that bypasses authentication on Active Directory (AD) systems that implement single-factor (password only) authentication. Threat actors can use a password of their choosing to authenticate as any user. This malware was given the
0 Comments
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat. This committee comprises expert researchers from major cybersecurity companies, including McAfee. The committee has now released “The Illicit Cryptocurrency Mining Threat,” an in-depth report on the current state of unlawful
0 Comments
Atlanta-based consumer credit reporting agency Equifax has been issued a £500,000 fine by the UK’s privacy watchdog for its last year’s massive data breach that exposed personal and financial data of hundreds of millions of its customers. Yes, £500,000—that’s the maximum fine allowed by the UK’s Data Protection Act 1998, though the penalty is apparently
0 Comments
Omobola Johnson (Image: Flickr/World Economic Forum under a CC BY-NC-SA 2.0 TechCrunch Startup Battlefield is returning to Africa in December, this time in Lagos, Nigeria. We will have a day-long program full of our flagship Battlefield competition highlighting the best startups that Africa has to offer. Not only that, we’ll have panel discussions designed to
0 Comments
Enhanced cloud SIEM analytics in Sumo Logic’s enterprise machine data analytics platform aim to serve up security watchdog capabilities for both line-of-business and DevOps users. The addition of cloud security information and event management (SIEM) analytics capabilities to Sumo Logic’s machine data analysis platform will enable security engineers and non-IT users to detect and investigate
0 Comments
New Mexico’s attorney general, Hector Balderas, announced a lawsuit, filed against Google, Twitter, Tiny Lab Productions, MoPub, AerServ, InModi PTE, AppLovin and IronSource, on allegations that nearly 100 gaming apps targeting children contain illegal tracking software. The apps, designed by Tiny Lab Productions, are marketed in the Google Play Store and are reported to collect personal
0 Comments
Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 May 2015 Summary In early February 2015, Dell SecureWorks Counter Threat Unit™ (CTU™) researchers investigated a new file-encrypting ransomware family named TeslaCrypt, which was distributed by the popular Angler browser exploit kit. After encrypting popular file types with the AES-256 encryption algorithm, TeslaCrypt holds the
0 Comments
Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications.  This requires corporate IT departments to reexamine their current data security posture, including Data Loss Prevention policies to better monitor and control sensitive data that are
0 Comments
Security researchers have discovered an authentication bypass vulnerability in Western Digital’s My Cloud NAS devices that potentially allows an unauthenticated attacker to gain admin-level control to the affected devices. Western Digital’s My Cloud (WD My Cloud) is one of the most popular network-attached storage (NAS) devices which is being used by businesses and individuals to
0 Comments
Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on instant gratification. From accessing information on the web to doing work –and now sending and receiving digital payments– our devices and applications support us while we’re on the go. Whether we’re paying a friend for
0 Comments
A leading think tank has called for urgent regulatory and oversight mechanisms to be introduced to govern the use of machine learning technology by UK law enforcers. The Royal United Services Institute for Defence and Security Studies (RUSI), is the world’s oldest independent defense and security think tank. Its latest report, Machine Learning Algorithms and