Month: January 2019

0 Comments
by John E Dunn For anyone who believes vein authentication is more secure than fingerprints or facial recognition, we have good news – researchers have just showed how the technology can be beaten. Before we explain why that statement isn’t a contradiction, let’s dive a bit deeper into what researchers Jan Krissler and Julian Albrecht
0 Comments
Gousto, the U.K. cook-at-home meal kit service that competes most directly with HelloFresh, has raised a further £18 million in funding. The round is backed by Instagram “health influencer” Joe Wicks, along with existing investors Unilever Ventures, Hargreave Hale, BGF Ventures, MMC Ventures, and Angel CoFund. The new funding brings the total raised by Gousto
0 Comments
A number of branch network security suppliers are touting their abilities to add software-defined WAN capabilities to their firewall platforms. In the meantime, SD-WAN suppliers continue to improve their native network security capabilities. Organizations must carefully evaluate their security and WAN requirements, as they select the appropriate architecture for their unique branch network needs. Many
0 Comments
A unique phishing template using fake fonts to evade detection and to better steal user credentials for a major US bank has been discovered, according to new research from Proofpoint. Researchers identified what they are calling a first-of-its kind phishing template that uses fake fonts to exploit web font features typically used by developers to deploy a
0 Comments
Germany has been hit with the biggest hack in its history. A group of unknown hackers has leaked highly-sensitive personal data from more than 100 German politicians, including German Chancellor Angela Merkel, Brandenburg’s prime minister Dietmar Woidke, along with some German artists, journalists, and YouTube celebrities. The leaked data that was published on a Twitter
0 Comments
Researchers at Trend Micro discovered spyware that had successfully disguised itself as a legitimate Android application. Initially found in a game called Flappy Birr Dog, the malware has been widely distributed, affecting users from 196 different countries. According to research, the application was available on Google Play and had more than 100,000 recorded downloads from
0 Comments
A cyberattack on Tribune Publishing Company LLC this weekend disrupted the printing operations of several major newspapers, including the Los Angeles Times and Chicago Tribune, but questions remain about the nature and attribution of the incident. The Tribune Publishing cyberattack, which was initially discovered Friday, involved malware that affected several of the company’s systems for
0 Comments
Working in partnership with HackerOne and Intigriti, the EU announced that the European Commission will launch a bug bounty program as part of the Free and Open Source Software Audit (FOSSA). The third edition of FOSSA will include 15 software programs: 7-zip, Apache Kafka, Apache Tomcat, Digital Signature Services (DSS), Drupal, Filezilla, FLUX TL, the
0 Comments
Cruise is partnering with DoorDash to pilot food and grocery delivery in San Francisco using self-driving vehicles. The companies announced Thursday that the testing program will begin in early 2019 with an initial focus on the San Francisco market. “Delivery is a significant opportunity for Cruise as we prepare to commercialize our autonomous vehicle technology and
0 Comments
by John E Dunn As if the US newspaper industry doesn’t have enough to contend with, on the morning of 29 December one of its largest publishing groups, Tribune Media, found itself battling a major ransomware attack. This caused big problems for many newspapers in its stable including the Chicago Tribune and New York Daily
0 Comments
Cloud-deployed containers and container orchestration systems are becoming mainstream. Vulnerabilities and exploits associated with containers are gathering pace; however, the best practice of securing containers continues to be overlooked. Containers allow for packaging and deployment of single applications. Decoupling applications or services from various parts of a target environment can provide a variety of operational
0 Comments
A list of employee names, work phone numbers and job titles available to government employees through the Victorian Government directory was reportedly accessed by an unauthorized third party. According to the Australian Broadcasting Corporation (ABC), information on approximately 30,000 Victorian public servants was stolen in a data breach, after an unknown party downloaded a portion of the directory. Employees that
0 Comments
New York-based venture capital firm Union Square Ventures (USV) has submitted paperwork to the U.S. Securities and Exchange Commission indicating a $429 million fundraise across two new vehicles. Founded in 2003 by Fred Wilson (pictured) and Brad Burnham, USV has supported high-flying companies including Twitter, Tumblr, Etsy and, more recently, Carta and Coinbase. The firm
0 Comments
Just in time for the new year, a report from New Marketshare puts Windows 10 in the top spot for desktop operating systems. It’s the first time Microsoft’s OS took the top spot since hitting the market three and a half years ago. At 39.22 percent of the market, Windows 10’s rise isn’t an overnight
0 Comments
Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks. On the morning of Saturday, December 29, 2018, hundreds of thousands of American households were surprised to find that their daily newspaper was
0 Comments
After a limited rollout, Go-Jek said today that it will extend its ride-hailing service to all of Singapore tomorrow while continuing its beta phase. The Indonesian-based company began offering rides in Singapore at the end of November, but only for passengers riding to and from certain areas. It https://www.straitstimes.com/singapore/transport/gojek-introduces-dynamic-pricing-move-will-likely-attract-more-drivers-to-joinintroduced dynamic pricing there, which increases prices