Month: November 2018

0 Comments
A grand committee of international parliamentarians empty-chaired Mark Zuckerberg at a hearing earlier today, after the Facebook founder snubbed repeat invitations to face questions about malicious, abusive and improper uses of his social media platform — including the democracy-denting impacts of so-called ‘fake news’. The UK’s DCMS committee has been leading the charge to hold Facebook
0 Comments
Some consolidation is afoot in the world of business software. TechCrunch has learned that Parallels, the virtualization specialist with millions of users, is getting acquired by Corel, the Canadian company behind design apps like CorelDraw and other productivity apps like WordPerfect. Some employees at Parallels have already been briefed on the acquisition, which is expected
0 Comments
‘Tis the season for cyber-scams, according to the new Holiday Threat Report from Carbon Black. The report compared cyber-attack data over the last two years and found that once cyber-attacks spike on Cyber Monday, they will likely remain elevated throughout the holiday season. The holiday season of 2016 saw a 20.5% surge in attempted attacks, but
0 Comments
Law enforcement agencies across the EU have successfully shut down more than 33,600 internet domains distributing counterfeit or stolen items, according to a press release published today by Europol. Europol announced that its Intellectual Property Crime Coordinated Coalition (IPC3) seized 33,654 domain names that had been selling contraband, including counterfeit pharmaceuticals, pirated films, television shows,
0 Comments
Facebook has again made headlines after the UK Parliament leveraged its legal right to demand documents alleged to include confidential email exchanges between top executives, as well as correspondences with CEO Mark Zuckerberg, according to The Guardian. The documents are believed to contain the details of Facebook’s data and privacy controls prior to the Cambridge Analytica
0 Comments
Uber has been hit with a £385,000 fine by the UK’s data protection regulator after a notorious breach in October/November 2016 which affected over 2.7 million customers and drivers. The Information Commissioner’s Office (ICO) branded the incident the result of “a series of avoidable data security flaws.” The hackers managed to obtain username and password combinations previously
0 Comments
The Cyber Security Challenge has named 19-year-old Edinburgh Napier University student Charlie Hosier as its 2018 champion. The winner was announced at a dinner event held in central London at the culmination of Cyber Security Challenge’s 2018 masterclass, which saw 42 contestants participate in the three-day event at Barclays HQ. This year’s cryptofactor challenge saw teams tasked
0 Comments
Microsoft has revealed the causes of a major global incident last week that led to large numbers of Azure, Office 365, Dynamics and other Microsoft users being unable to log-in to their services. The 14-hour outage affected Microsoft Azure AD Multi-Factor Authentication (MFA) services, but “gaps in telemetry and monitoring” for these delayed attempts to
0 Comments
by Naked Security writer Get yourself up to date with everything we’ve written in the last seven days – it’s weekly roundup time. Monday 19 November 2018 Mozilla’s IoT gift guide ranks gadgets from secure to shoddy Has that website been pwned? Firefox Monitor will tell you Did a copy-paste error reveal the US’s secret
0 Comments
by John E Dunn One of Intel’s fixes for the Spectre variant 2 chip flaw (CVE- 2017-5715) appears to have taken a big bite out of the performance of the latest Linux kernel. The mitigation in question is the Single Thread Indirect Branch Predictors (STIBP), one of three that Intel proposed not long after details of
0 Comments
If your organization is, you can win on a couple fronts… In traditional warfare, information sharing is key. The notion of sharing insight on your opponent is extremely valuable and cannot be underestimated. The basic principles in Sun Tzu’s The Art of War state you must know yourself and know your opponent to be successful.
0 Comments
Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time of year for e-commerce, this year we conducted the Stressed Holiday Online Shopping survey to understand how financial pressure can impact buyer behavior when it comes to online purchasing and cybersecurity. The economic burden of the
0 Comments
Listen, I know you’re tired of deals. I get it. You already woke up at 1AM on Black Friday to head to Best Buy in your pajama pants. But if we just stick together and follow the rules, we’ll get through the holiday gift season in one piece. We got this. What follows is far
0 Comments
Amazon’s kicking off Re:Invent week with the launch of AWS RoboMaker. The cloud-based service utilizes the widely deployed open-source software Robot Operating System (ROS) to offer developers a place to develop and test robotics applications. RoboMaker essentially serves as a platform to help speed up the time-consuming robotics development process. Among the tools offered by
0 Comments
Roughly one year after WhatsApp co-founder Brian Acton made his highly-publicized exit from Facebook, another executive and early employee of the messaging platform is doing the same. Neeraj Arora, WhatsApp’s chief business officer, announced today that he would be “taking some time off to recharge and spend time with family.” Facebook acquired WhatsApp for $19 billion
0 Comments
After focusing on Asian markets, particularly in Southeast Asia, Bangkok-based Eko Communications is getting ready to take on Slack, Microsoft Teams, and other enterprise messaging apps in Europe. The startup announced today that it has raised a Series B of $20 million and opened offices in London (which will serve as its new commercial headquarters),
0 Comments
Positive Technologies researchers found two serious vulnerabilities that affect ATMs made by NCR. Researchers were able to launch black box attacks that forced the machines to dispense cash without authorization. What are these ATM vulnerabilities, and how does a black box attack work? Researchers from Positive Technologies — Vladimir Kononovich and Alexey Stennikov — found