Month: January 2019

0 Comments
Earlier last year, the U.S. Commerce Department’s Bureau of Industry and Security (BIS) put out a call for public comment on criteria for identifying emerging technologies that could potentially be subject to future export control regulations. The tech industry responded in full force, providing recommendations for how the federal government can ensure U.S. competitiveness in
0 Comments
The new year is a time for resolutions and promises of change, so much so that even malware has returned from a bit of time off with some new features, including a new Flash exploit, according to Malwarebytes head of investigations, Jérôme Segura. The Fallout exploit kit (EK) took a little respite over the first few
0 Comments
by John E Dunn The Have I Been Pwned? (HIBP) website has revealed another huge cache of breached email addresses and passwords discovered last week circulating among criminals. Named “Collection #1”, its statistics are as impressive as they are worrying: 87GB of data, 12,000 files, and 1.16 billion unique combinations of email addresses and passwords.
0 Comments
On Monday, January 21, McAfee will join millions across the globe to recognize the life and legacy of Dr. Martin Luther King Jr. To honor the achievements of Dr. King, our McAfee African-Heritage Community (MAHC) members recently shared memorable lines from King’s iconic “I Have a Dream” speech that he delivered at the Lincoln Memorial
0 Comments
Why does the world need a self-lacing shoe? Haven’t you heard of Velcro? How will you tie your shoes when the Wi-Fi is down? That’s the gist of the instant response I got when I mentioned the new Adapt BB, a shoe from Nike with, yes, powered laces that tighten to a wearer’s foot automatically.
0 Comments
An attack leveraging the open-source Build Your Own Botnet (BYOB) framework has reportedly been intercepted by Israeli cybersecurity firm Perception Point’s incident response team. According to the team, this appears to be the first time the BYOB framework has been found to be used for fraudulent activity in the wild. While these tactics and techniques have
0 Comments
Cracking the silos of digital health records promises to bring better care to patients by better informing doctors, according to Abhinav Shashank, the chief executive officer of San Francisco-based startup Innovaccer . Shashank’s company is just wrapping up a $35 million round of financing with a new $11 million commitment from Microsoft’s investment arm M12
0 Comments
Google today announced that it is raising the price of its G Suite subscriptions for the first time. In the U.S., the prices of G Suite Basic and G Suite Business editions will increase by $1 and $2 per user/month, respectively, while increases in other regions will be adjusted according to the local currency and
0 Comments
A malicious MS Word document, titled “eml_-_PO20180921.doc,” has been found in the wild, and according to researchers at Fortinet’s FortiGuard Labs, the document contains auto-executable malicious VBA code. Victims who receive and open the document are prompted with a security warning that macros have been disable. If the user then clicks on “enable content,” the NanoCore
0 Comments
Forget balaclavas or hoodies; these cybercriminals are hiding in plain sight In my days when I worked for the police, we would constantly try to profile criminals because it made our investigations easier. We would even regularly use specialist criminal profilers and psychologists to help with slow cases in order to gather additional clues, which
0 Comments
A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites’ visitors at risk of hacking. Independent researcher and bug-hunter Paulos Yibelo, who shared his new research with The
0 Comments
By now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply, cryptocurrencies are virtual currencies that have actual monetary value in today’s world. They are limited entries of transactions into a single database, or public ledger, that can’t be changed without fulfilling certain conditions. These transactions
0 Comments
In the wake of the Ryuk ransomware attack on the Tribune Publishing Company last month, security researchers are warning the threat to enterprises may be growing. In a research post published last week, threat detection vendor CrowdStrike in Sunnyvale, Calif., reported that Ryuk ransomware has accumulated more than $3.7 million in cryptocurrency payments since it
0 Comments
Despite the burgeoning IoT market, organizations made limited progress on IoT security in 2018, according to a new report from Gemalto. Though there is evidence of incremental improvements, security measures are being outpaced by the rapid growth of IoT, which is on track to hit 20 billion devices by 2023. The survey queried 950 IT
0 Comments
by John E Dunn Microsoft has vexed its users with another misbehaving update. The latest problem occurred on 8 January when enterprise users running Windows 7 or Windows Server 2008 R2 with a Key Management Service (KMS) started complaining on Microsoft’s TechNet forums and Reddit that they were seeing two errors, the first relating to licensing,
0 Comments
Facebook plans to make a significant investment in local news over the next three years, with $300 million going to a variety of initiatives and organizations. The company has had a rocky relationship with news publishers recently. While it’s funded programming from partners like CNN and Fox News, it’s also played a role in some