Month: March 2019

0 Comments
IT administrators must walk the tightrope between locking down their systems and finding ways to manage those machines without tripping over internal controls. Microsoft offers a number of security-based technologies to help IT workers who need admin privileges correct many issues, such as Just Enough Administration and bastion forests. But these restrictions tend to be
0 Comments
At this week’s Black Hat Asia 2019 conference, researchers from Positive Technologies revealed findings about an undocumented technology in Intel microchips that allow reading data from the memory of and intercepting the signals from peripherals. On March 28, 2019, Positive Technologies experts Maxim Goryachy and Mark Ermolov spoke in Singapore, discussing the microchips in their session
0 Comments
Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures’ Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb’s hot EOS and XRP wallets and transferred around 3 million EOS (~ $13 million)
0 Comments
After researchers discovered an SQL injection vulnerability in Magento’s code, the company issued a security fix for more than 30 different vulnerabilities in its software, which reportedly has put more than 300,000 e-commerce sites at risk of card-skimming attacks. Online businesses have been strongly urged to download the latest fix, warning that versions prior to 2.3.1
0 Comments
A security researcher today publicly disclosed details and proof-of-concept exploits for two ‘unpatched’ zero-day vulnerabilities in Microsoft’s web browsers after the company allegedly failed to respond to his responsible private disclosure. Both unpatched vulnerabilities—one of which affects the latest version of Microsoft Internet Explorer and another affects the latest Edge Browser—allow a remote attacker to
0 Comments
World Backup Day is a reminder that organizations and individuals need to make data backup and protection a priority The loss of data – whether a result of human error, technological failure, or a cyberattack – is one of the greatest threats to organizations and individuals today. In our increasingly digitized world, we rely on our
0 Comments
After a security incident in February at its Australian subsidiary, Toyota Motor Corp. has suffered its second security breach in the last five weeks, with today’s breach announced by the company’s main offices in Japan. “On March 29, 2019, it was announced in Japan that Toyota Motor Corporation (TMC) learned it had possibly been the
0 Comments
Grab, the $16 billion-valued ride-hailing firm that acquired Uber’s Southeast Asia business last year, is in talks with Alibaba’s Ant Financial and PayPal as it considers spinning out of its financial services unit to double down on its non-transportation business, TechCrunch has learned. The seven-year-old company’s coming-of-age moment was a deal to buy Uber’s regional
0 Comments
Bad guys out, good guys in. This principle has long shaped how enterprises approach information security, anchored in the premise that IT environments can be protected from malicious activity simply by making the perimeter bigger, stronger and more resilient. It’s a model that evokes comparisons to castles and moats, but it carries a twinge of
0 Comments
Lyft raised more than $2 billion Thursday afternoon after pricing its shares at $72 apiece, the top of the expected range of $70 to $72 per share, CNBC reports. This gives Lyft a fully-diluted market value of $24 billion. The company will debut on the Nasdaq stock exchange Friday morning, trading under the ticker symbol
0 Comments
Though backup is a known best-practice approach to IT risk management, many companies are overwhelmed by the number of sites that need to be backed up, according to a new survey released today by Barracuda Networks. The study, Closing Backup and Recovery Gaps, asked more than 1,000 IT professionals, business executives and backup administrators about
0 Comments
The technology around us is constantly changing, and cybersecurity practices are evolving to match these new innovations. As the cybersecurity landscape shifts to meet the needs presented by new technology, opportunities arise for cybersecurity professionals to step into new roles – an experience I recently underwent myself. I’ve recently shifted from McAfee’s Mobile and ISP
0 Comments
Doing business in today’s connected world means dealing with a continually evolving threat landscape. With potential losses due to downtime following a breach, plus valuable client and proprietary information at risk, most organizations realize they cannot afford to be complacent. This puts extra onus on security IT teams, who are continuously left scrambling, looking for
0 Comments
Lawsuits are coming for sites and apps that don’t follow web standards Beth Franssen 7 hours Beth Franssen Contributor Beth Franssen is an expert in digital accessibility, WCAG and Section 508 compliance. She helps fintech, retail and payment companies implement digital accessibility strategies for Nexient, a leading provider of 100% US-based Agile software product development.