0 Comments
Only days after Infosecurity reported that OkCupid users said their accounts had been hacked, Checkmarx disclosed that the OkCupid Android App actually posed risks because of security failures in MagicLinks. It’s well known that malicious actors love to exploit a good holiday, which puts users at risk on Valentine’s Day. To identify any potential vulnerabilities,
0 Comments
Instead of financial gain or other, more usual, goals, the attacker leaves ‘scorched digital earth’ behind An unknown attacker has wrought rare havoc on email service provider VFEmail, wiping out all of the company’s data stored in the United States, according to an announcement on the firm’s website. Describing the incident as “catastrophic”, the company
0 Comments
Grover, the Berlin-based startup that offers “pay-as-you-go” subscriptions to the latest consumer tech as an alternative to owning products outright, is going all-in on e-scooters or so-called micro-mobility. The latest to jump in on the e-scooter craze, the company is launching an e-scooter monthly subscription service in Germany. Dubbed GroverGo, customers can rent the Xiaomi
0 Comments
The dark web seller identified as gnosticplayers on Dream Market has removed all listings that were previously up for sale, which reportedly included upwards of 620 million account records. “All my listings have been removed, to avoid them being bought so many times and being leaked, as a respect for my buyers. But don’t worry, next
0 Comments
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the ‘privacy’ of social media accounts When Starbucks introduced personalising the coffee shop experience by writing their customer’s names on their coffee cups people felt violated. Why on earth would a coffee
0 Comments
As ever more transactions move on to digital platforms, a startup that is building a swiss army knife of financial services — from payments to currency transfers, ID verifications and card issuing — for companies to use by way of a single API — is announcing funding. Rapyd, a “fintech as a service startup akin to
0 Comments
Across healthcare organizations in the US, malicious actors are successfully leveraging phishing attacks to initially gain access to networks, according to findings from the 2019 HIMSS Cybersecurity Survey published by the Healthcare Information and Management Systems Society (HIMSS). The study, which surveyed 166 qualified information security leaders from November to December 2018, found that there
0 Comments
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems and could potentially allow attackers to escape container and obtain unauthorized, root-level access to the host operating system. The vulnerability was discovered by open source security researchers Adam Iwaniuk and Borys Popławski and publicly disclosed
0 Comments
A law change that comes into force in the UK today makes the highly intrusive practice of ‘upskirting’ illegal. The government said it wants the new law to send a clear message that such behaviour is criminal and will not be tolerated. Perpetrators in the UK face up to two years in prison under the new
0 Comments
Serverless platform-as-a-service (PaaS) offerings are being deployed at an increasing rate for many reasons. They relate to information in a myriad of ways, unlocking new opportunities to collect data, identify data, and ultimately find ways to transform data to value. Figure 1. Serverless application models. Serverless applications can cost-effectively reply and process information at scale, returning
0 Comments
Machine learning has become a valuable component of network security products, but the technology is a mixed blessing. Unfortunately, hackers can also employ machine learning. Machine learning in network security separates legitimate network and application operations from attacks by building a set of rules that characterizes both activities. Meanwhile, attackers can use machine learning to
0 Comments
A security issue that affects several open source container management systems, including Amazon Linux and Amazon Elastic Container Service, has been disclosed by AWS. The vulnerabilities (CVE-2019-5736) were reportedly discovered by security researchers Adam Iwaniuk, Borys Poplawski and Aleksa Sarai and would allow an attacker with minimal user interaction to “overwrite the host runc binary and thus gain
0 Comments
Four new animated Marvel series, plus a crossover special, are coming to Hulu. According to the Hollywood Reporter, Hulu has greenlit “MODOK,” “Hit-Monkey,” “Tigra & Dazzler Show” and “Howard the Duck.” The characters will then come together in a special titled “The Offenders.” These aren’t exactly A-list, or even B-list, Marvel characters. Howard the Duck
0 Comments
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a “Clipper,” masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to
0 Comments
Integration: it seems to be all the rage. As technology becomes more sophisticated, we sprint to incorporate these new innovations into our everyday lives. But as we celebrate Safer Internet Day, one can’t help but wonder, is all integration good when it comes to information shared online? Major privacy concerns have been raised surrounding Facebook’s
0 Comments
Researchers have warned users of a new phishing technique which uses Google Translate to add authenticity to scams. Akamai security researcher Larry Cashdollar explained in a blog post that he was targeted by this tactic early in the new year, receiving an email telling him his Google account had been accessed from a new Windows