admin

0 Comments
Scape Technologies, a London-based computer vision startup, is de-cloaking today to announce that it has raised $8 million in seed fund and launching the first iteration of its “Visual Positioning Service,” which lets developers build apps that require location accuracy far beyond the capabilities of GPS alone. The technology will initially target augmented reality apps,
0 Comments
The Advanced Cyber Security Center (ACSC) has published its first annual report, “Leveraging Board Governance for Cybersecurity, the CISO / CIO Perspective,” the results of which highlight the need for boards to be active governance partners in collaborative cyber defense. Recognizing the shared value of collaboration across organizational functions and between and among organizations when
0 Comments
Madelyn Bacon and Casey Clark Cloud provider Data Resolution claimed North Korea was behind the ransomware attack on its systems on Christmas Eve. According to cybersecurity journalist Brian Krebs, Data Resolution was infected with the Ryuk ransomware, which is the same ransomware thought to be behind the attacks on Tribune Publishing Company’s network, which disrupted
0 Comments
The Marriott breach announced on November 30, 2018, was initially suspected to have compromised the data of nearly 500 million customers, but on Friday the Starwood company updated its database security incident advisory to reflect what it now believes to be a more realistic and slightly smaller number of guests that were impacted. After weeks of
0 Comments
Yoav Leitersdorf Contributor More posts by this contributor Trends in Israel’s cybersecurity investments The drone race is off and running, with Israel in the lead Ofer Schreiber Contributor More posts by this contributor Trends in Israel’s cybersecurity investments The drone race is off and running, with Israel in the lead 2018 saw a spate of
0 Comments
by John E Dunn For anyone who believes vein authentication is more secure than fingerprints or facial recognition, we have good news – researchers have just showed how the technology can be beaten. Before we explain why that statement isn’t a contradiction, let’s dive a bit deeper into what researchers Jan Krissler and Julian Albrecht
0 Comments
Gousto, the U.K. cook-at-home meal kit service that competes most directly with HelloFresh, has raised a further £18 million in funding. The round is backed by Instagram “health influencer” Joe Wicks, along with existing investors Unilever Ventures, Hargreave Hale, BGF Ventures, MMC Ventures, and Angel CoFund. The new funding brings the total raised by Gousto
0 Comments
A number of branch network security suppliers are touting their abilities to add software-defined WAN capabilities to their firewall platforms. In the meantime, SD-WAN suppliers continue to improve their native network security capabilities. Organizations must carefully evaluate their security and WAN requirements, as they select the appropriate architecture for their unique branch network needs. Many
0 Comments
A unique phishing template using fake fonts to evade detection and to better steal user credentials for a major US bank has been discovered, according to new research from Proofpoint. Researchers identified what they are calling a first-of-its kind phishing template that uses fake fonts to exploit web font features typically used by developers to deploy a
0 Comments
Germany has been hit with the biggest hack in its history. A group of unknown hackers has leaked highly-sensitive personal data from more than 100 German politicians, including German Chancellor Angela Merkel, Brandenburg’s prime minister Dietmar Woidke, along with some German artists, journalists, and YouTube celebrities. The leaked data that was published on a Twitter
0 Comments
Researchers at Trend Micro discovered spyware that had successfully disguised itself as a legitimate Android application. Initially found in a game called Flappy Birr Dog, the malware has been widely distributed, affecting users from 196 different countries. According to research, the application was available on Google Play and had more than 100,000 recorded downloads from
0 Comments
A cyberattack on Tribune Publishing Company LLC this weekend disrupted the printing operations of several major newspapers, including the Los Angeles Times and Chicago Tribune, but questions remain about the nature and attribution of the incident. The Tribune Publishing cyberattack, which was initially discovered Friday, involved malware that affected several of the company’s systems for
0 Comments
Working in partnership with HackerOne and Intigriti, the EU announced that the European Commission will launch a bug bounty program as part of the Free and Open Source Software Audit (FOSSA). The third edition of FOSSA will include 15 software programs: 7-zip, Apache Kafka, Apache Tomcat, Digital Signature Services (DSS), Drupal, Filezilla, FLUX TL, the