admin

0 Comments
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability. SandboxEscaper posted a link to a Github page hosting a proof-of-concept (PoC) exploit for the vulnerability that appears to be a privilege escalation flaw
0 Comments
Chinese startups rule the roost when it comes to total reported venture dollars raised so far in 2018. That is, mostly. In one key category at least — software-as-a-service, better known as SaaS — they do not. Ant Financial raised the largest-ever VC round in June, a mind-boggling $14 billion in Series C funding. And nearly a dozen
0 Comments
There’s some turmoil brewing over at Miami-based facial recognition startup Kairos. Late last month, New World Angels President and Kairos board chairperson Steve O’Hara sent a letter to Kairos founder Brian Brackeen notifying him of his termination from the role of chief executive officer. The termination letter cited willful misconduct as the cause for Brackeen’s
0 Comments
As concern over medical device cybersecurity grows, the U.S. Food and Drug Administration has taken additional steps to help hospitals get in front of the issue, an action commended by one medical device company CEO. The FDA recently announced efforts to strengthen the agency’s medical device cybersecurity program to help device manufacturers identify security vulnerabilities
0 Comments
by Lisa Vaas You know what takes 17 minutes? Building a piece of Ikea’s 5-minute furniture. Walking one mile if you’re in decent shape. Making £500k (USD $569,000) if you’re Facebook. The Register crunched the numbers because that sliver of Facebook revenue – £500k (about $640k) – is how much the social media giant has
0 Comments
As the 2018 midterm elections near, many remain concerned about the security of election infrastructure at the national level, though Steve Grobman, CTO at McAfee, said the realistic security risk lies in an attacker tampering with information and targeting individual counties and states. “A realistic attack wouldn’t require mass voting manipulation or the hacking of
0 Comments
This year’s MPOWER Americas was packed with innovative keynote speakers, the MPOWER Partner Summit, tons of sessions, technical deep dives, demos, an Innovation Fair, and much more. Take a look at some of the highlights from this year’s event! [embedded content] “Together is Power” in Action at Partner Summit On Tuesday, we hosted Partner Summit,
0 Comments
Following reports that Chinese spies infiltrated the supply chain of servers assembled by Supermicro Computers Inc., the New York–based CYBERGYM has launched a new infrastructure-security combat training program. Driven by the belief that threats posed by these types of supply chain and infrastructure hacks are significant, CYBERGYM said it developed the training to help organizations
0 Comments
According to the 2019 Global ICS & IIoT Risk Report published by CyberX, cyber-criminals are increasingly targeting the vulnerabilities of industrial control systems (ICSs) and the industrial internet of things (IIoT).  The report reflects the findings from data captured over the past 12 months from more than 850 production ICS networks across all industrial sectors. While the
0 Comments
by John E Dunn Mozilla’s ambition to turn Firefox into the number one privacy browser was never going to be easy to pull off. Too few, or ineffective, controls and privacy becomes a benefit in name only. Too many blunt controls and there is a danger of making websites difficult to use in ways that
0 Comments
As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to “bait” victims through a variety of platforms. In fact, we’re seeing a rise in the popularity of phishing via SMS messages, or
0 Comments
Siemens AG Siclock central plant clocks were recently found to be affected by several vulnerabilities, some of which have been rated critical. What are these Siemens Siclock flaws and how can they be exploited? German manufacturer and tech giant Siemens recently disclosed six vulnerabilities — three classified as critical — that were found in its
0 Comments
Over 80% of security professionals are concerned about the prospect of attackers using artificial intelligence (AI) against their organization, according to new research from Neustar. The global information services provider polled 301 IT and security professionals across EMEA and the US to compile its latest International Cyber Benchmarks Index. It found that although 87% of
0 Comments
by Lisa Vaas Have you recently tried to ditch a mobile app, only to have it keep following you around? If so, you may be a victim of a new crop of uninstall trackers that go beyond letting app developers track bugs and poor user experience: they also let developers track app users “the instant” they