Artificial intelligence continues to evolve, but most IT systems still need human intervention to stay operational. Threat actors face the same issue when controlling their malware. Consider the malware cyber kill chain. Its components have remained the same, but when you dig into the details, many aspects have changed, requiring enterprises to update their protections.
The state of Massachusetts is reportedly facing increased cyber threats from adversaries who are trying to steal sensitive information, according to the Gloucester Daily Times. In an interview with Stephanie Helm, director of the MassCyberCenter, State House reporter Christian M. Wade learned that the state’s computer systems as well as Massachusetts businesses and individuals are
Hello and welcome to an Equity Shot, a short-form episode of the show where we dive into a single breaking news story. Guess what we’re talking about today?! It’s Lyft . You guessed correctly. The Lyft S-1 is the very first major S-1 event of 2019. As you might recall, the government shutdown gummed the
by Mark Stockley Some ideas are so good at getting people to spread them that they go viral. There doesn’t have to be any design, purpose or merit in an idea to make it spread. It doesn’t have to be good, interesting, helpful, useful or true, in fact it can even be a very bad,
The first virtual concert to take place inside a video game attracted interest not only from players but also from scammers, who tried to take advantage of the huge event by tricking users into buying tickets even though the concert was free At the start of February first ever concert to take place inside a
In January, eBay received a strongly worded letter from activist investors Elliott Management, outlining a way forward for the company that Elliott saw as floundering. Two weeks ago, the company announced it was restructuring operations and laying off some of its workers. Today, the company announced further steps toward reorganizing, much of which sounds straight
Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim’s device. With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress (MWC). Although it’s hard to believe that the show is already over, MWC 2019 managed to deliver a slew of showstoppers that captured our attention. Here are some of my main takeaways from the event:
When you think about disaster recovery strategy, much of the context for planning revolves around the types of disasters you want to protect against. Natural disasters, IT failures and power outages usually top the list of threats. However, moving forward, the idea that a cyberattack may occur is likely going to take a more dominant
Cryptocurrency mining tool Coinhive has decided to shut up shop, although not because of its rampant abuse by hackers over the past two years. The team behind the Monero miner revealed all in a brief post on Tuesday, claiming that the 18-month project had come to an end as it was no longer economically viable.
A Chinese startup that’s taking a dorm-like approach to urban housing just raised $500 million as its valuation jumped over $2 billion. Danke Apartment, whose name means “eggshell” in Chinese, closed the Series C round led by returning investor Tiger Global Management and newcomer Ant Financial, Alibaba’s e-payment and financial affiliate controlled by Jack Ma.
by Paul Ducklin Cyberscare-of-the-moment is the “Momo challenge”, named after an admittedly rather freaky Japanese sculpture known as Momo, or the Mother-Bird. The sculpture was made a few years ago by a horror-movie special effects artist and displayed at an art exhibition. Pictures of the sculpture began to circulate online over the last year or