Month: January 2019

0 Comments
During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was discovered in a private peer-to-peer (p2p) network. After initial analysis, and making sure that our customers are protected, we decided to make this discovery public. Our telemetry showed that
0 Comments
Attackers can potentially run a malicious MySQL server and gain access to connected data, according to a new security alert. MySQL has issued a security notice resulting from issues with the LOAD DATA LOCAL, noting that the “statement can load a file located on the server host, or, if the LOCAL keyword is specified, on
0 Comments
On-demand food delivery startup Munchery is ceasing operations effective immediately, the startup announced in an e-mail to customers on Monday. Founded in 2010, the San Francisco-based business had raised a total of $125 million in venture capital funding, reaching a valuation of $300 million with an $87 million round in 2015, according to PitchBook. Munchery
0 Comments
Epic Games’ Fortnite has risen in popularity rapidly since its debut, and cybercriminals have leveraged that popularity to enact a handful of malicious schemes. Unfortunately, these tricks are showing no signs of slowing, as researchers recently discovered a security flaw that allowed cybercriminals to take over a gamer’s Fortnite account through a malicious link. This attack specifically
0 Comments
Unapproved mobile use and unpatched systems are just two of the end-user security problems admins could face during the ongoing U.S. government shutdown. With thousands of federal employees out of work, IT departments are left to determine how to manage those users’ access to business resources. The shutdown provides ample opportunity for users to turn
0 Comments
Global firms could lose over $5tr to cybercrime over the next five years, a new Accenture study has warned. The consulting giant interviewed over 1700 CEOs and other C-suite executives to compile its report, Securing the Digital Economy: Reinventing the Internet for Trust. It claimed that as businesses become more dependent on complex web-based models, their
0 Comments
by Mark Stockley If you have an Instagram account, if you’re on Facebook or you if use Twitter, or any other social media, or read the news, own a phone or have eyes, you will probably have encountered the ten year challenge. The challenge is the latest social media craze and it simply involves posting
0 Comments
Tesla can now deliver Model 3 vehicles to European customers. The automakers midsize sedan was recently granted approval from RDW, the Dutch regulator and European authority tasked by Tesla to approve the vehicle for European roads. The approval comes just ahead of the vehicle’s European introduction next month. Right now, it’s been reported that a
0 Comments
As the cybersecurity landscape evolves to match new trends in technology, it’s important for consumers to prioritize the protection of their online presence. That means remaining aware of the internet’s more common cyberthreats, including malware, phishing, and data breaches, and how they could potentially affect you. And while most of us already know about the
0 Comments
London, with its huge FinTech hub, is continuing to attract investment and that is no better represented today than with the news that MarketInvoice, arguably Europe’s largest online invoice finance platform, has raised £26M ($33.5M) in a Series-B funding round led by Barclays and fintech fund Santander InnoVentures, alongside participation from European VC Northzone, which
0 Comments
A new strain of yet another ransomware campaign has been discovered in which the malicious actors have expanded payment options beyond Bitcoin; they are instead offering alternatives (such as PayPal) that include a phishing link, according to MalwareHunterTeam. Attackers are stealing a page from Daedalus and are killing two birds with one stone by including a link
0 Comments
Last April, Spotify surprised Wall Street bankers by choosing to go public through a direct listing process rather than through a traditional IPO. Instead of issuing new shares, the company simply sold existing shares held by insiders, employees and investors directly to the market – bypassing the roadshow process and avoiding at least some of Wall
0 Comments
Malicious code was lurking about in two different apps within the Google Play store, according to researchers at Trend Micro who have disclosed that they discovered a banking Trojan in what seemed like legitimate apps. Both the currency converter and the battery-saving app have been removed from Google Play, but not before they were downloaded thousands
0 Comments
Bill Goodwin Contributor Tyler Finn Contributor Something odd is in motion in Los Angeles. On a recent day at the office, colleagues debated the merits of the Boring Company’s proposal to alleviate Dodger traffic via levitating tunnel pods. I stepped out for coffee in the afternoon and was almost run over by an elderly man