0 Comments
A Japanese minister in charge of cybersecurity has shocked lawmakers after revealing that he doesn’t use a computer, and struggles to grasp the concept of a USB stick. Yoshitaka Sakurada, 68, is deputy chief of the government’s cybersecurity strategy office. However, responding to an independent lawmaker at a Lower House Cabinet Committee meeting this week, he’s
0 Comments
A new report looked at the number of companies that allow users to access corporate data on personal devices and found that most organizations enabling BYOD lack proper security controls, according to Bitglass.   With the advent of the cloud, more employees are taking advantage of being able to work from anywhere at anytime on any
0 Comments
The CEOs of BlackBerry and Cylance held a media conference this morning after announcing news of an acquisition.  BlackBerry announced that it has finalized an agreement in which it will acquire Cylance for $1.4 bn in cash, plus the assumption of unvested employee incentive awards. With Gartner citing security as the top barrier to successful
0 Comments
by Danny Bradbury The epidemic of Twitter-based Bitcoin scams took another twist this week as attackers tweeted scams directly from two verified high-profile accounts. Criminals sent posts from both Google’s G Suite account and Target’s official Twitter account. Cryptocurrency giveaway scams work by offering money to victims. There’s a catch, of course: They must first
0 Comments
by Lisa Vaas Christine Sullivan was stabbed to death on 27 January 2017, in the kitchen of the New Hampshire home where she lived with her boyfriend. Her friend, Jenna Pellegrini, was also murdered that day, in an upstairs bedroom. There might have been a witness who heard Sullivan’s murder as it happened, given that
0 Comments
The authors thank their colleagues Oliver Devane and Deepak Setty for their help with this analysis. McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background
0 Comments
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These highly hackable choices are despite years of education around the importance of password security. So, what does this say about people who pick simple passwords? Most likely, they are shooting for a password that is
0 Comments
At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. Three major flagship smartphones—iPhone X, Samsung Galaxy S9, and Xiaomi Mi6—were among the devices that successfully got hacked
0 Comments
When Equidate, a venture-backed secondaries marketplace based in San Francisco, closed its most recent round of funding with $50 million four months ago, it was hardly a surprising bet on the part of its backers. As startups linger ever longer as private companies, more people are looking to lock up shares wherever they can find
0 Comments
When Aileen Lee, the former Kleiner Perkins partner and founder of the seed-stage venture capital firm Cowboy Ventures, coined the term “unicorn” in 2013 on this very site, there were just 39 companies that had earned the title. She called them “the lucky/genius few.” Her definition: U.S. software startups launched since 2003 worth more than