0 Comments
When Aileen Lee, the former Kleiner Perkins partner and founder of the seed-stage venture capital firm Cowboy Ventures, coined the term “unicorn” in 2013 on this very site, there were just 39 companies that had earned the title. She called them “the lucky/genius few.” Her definition: U.S. software startups launched since 2003 worth more than
0 Comments
YouTube quietly added around 100 ad-supported Hollywood movies to its site, beginning last month, according to a new report from AdAge. The titles include a mix of classics like “Rocky” and “The Terminator,” as well as other family fare like “Zookeeper,” “Agent Cody Banks,” and “Legally Blonde,” among others. Before, YouTube had only offered consumers
0 Comments
Traditional network security vulnerabilities are bad enough without adding SDN security issues to the mix. But, as organizations deploy SDN, they risk exposing their networks to new types of threats and attacks, especially if they don’t have proper plans in place. A prevalent concern with SDN security focuses on the SDN controller. The controller contains
0 Comments
Without any notable opposition to the Senate’s version of the bill, the House agreed to a reorganization of the Cybersecurity and Infrastructure Security Agency (CISA) Act earlier this week, according to FCW.  Replacing the National Protection and Programs Directorate, the new agency will oversee the cybersecurity of federal computer systems and will be a government liaison
0 Comments
by John E Dunn How many computer users still regularly use Windows XP? It’s a trick question, of course, because the answer is that millions of people do every time they take money out of an ATM cash machine; a significant proportion of which still run some variant of the geriatric OS. It’s a finding
0 Comments
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons to personalize your avatar. But how does one go about gaining virtual currency? Players complete in-game challenges and are rewarded with coins to spend in their virtual world. These challenges can be pretty difficult and
0 Comments
Almost all young people recycle their passwords, often doing so across work and personal accounts The prevalence of cybersecurity incidents and the concomitant growing concerns about any organization’s cybersecurity posture haven’t done much to discourage many employees from engaging in poor security habits, a survey has found. In some respects, employees’ cyber-hygiene is actually getting
0 Comments
Has Wikileaks founder Julian Assange officially been charged with any unspecified criminal offense in the United States? — YES United States prosecutors have accidentally revealed the existence of criminal charges against Wikileaks founder Julian Assange in a recently unsealed court filing in an unrelated ongoing sex crime case in the Eastern District of Virginia. Assistant
0 Comments
Despite the session’s name, “Two Points of View: Collaboration and Disclosure: Balancing Openness About Cyber Security with Managing Risk and Reputation,” panelists at today’s Infosecurity North America conference were actually in agreement about sharing threat intelligence.  Moderated by Joseph Gittens, director, standards, Security Industry Association, the panelists explored the different channels by which information can and
0 Comments
On October 4, 2018, a Bloomberg Businessweek article alleged that in 2015, manufacturers inserted microchips onto the motherboards of servers destined for U.S. public and government organizations to provide Chinese government-sponsored threat actors with unauthorized access. The story was immediately refuted in its entirety by the three companies named in the story: Apple, Amazon, and
0 Comments
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled with McAfee and partner leadership coming together to collaborate on McAfee’s partner strategy, product portfolio, programs, and more. Here are some of the highlights: The Audience 338 partners 225 VAR, Disti, MSP, etc. 35 OEM
0 Comments
Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification The need to encrypt data on devices has never been greater, especially with legislation such as the European Union’s General Data Protection Regulation (GDPR). Purchasing a self-encrypting drive (SED) that adheres to the industry standard, published as the Trusted Computing Group’s
0 Comments
Facebook has changed its News Feed algorithm to demote content that comes close to violating its policies prohibiting misinformation, hate speech, violence, bullying, clickbait so it’s seen by fewer people even it’s highly engaging. In a 5000-word letter by Mark Zuckerberg published today, he explained how a “basic incentive problem” that “when left unchecked, people
0 Comments
Okta Inc. researchers discovered a bypass that allows threat actors to create malware that can pose as legitimate software files signed by Apple. What is this bypass and who does it affect? Because regular users sometimes find it difficult to know what is and isn’t safe on the internet or when installing software, software developers
0 Comments
Finding and keeping talent in the cybersecurity industry is a challenge for organizations of all sizes around the globe. As a result, the talent market is highly competitive, which is why a panel of experts came together at this year’s Infosecurity North America conference in New York to talk about building an effective cybersecurity team
0 Comments
by John E Dunn Cybercriminals have returned to old-school manual hacking tactics to boost the efficiency of targeted extortion, according to research conducted for the SophosLabs 2019 Threat Report. Ransomware attacks are nothing new, but well known examples like CryptoLocker or WannaCry have tended to be opportunistic and indiscriminate. To penetrate their targets they rely on
0 Comments
Disclosed earlier this year, potentially dangerous Meltdown and Spectre vulnerabilities that affected a large family of modern processors proven that speculative execution attacks can be exploited in a trivial way to access highly sensitive information. Since then, several more variants of speculative execution attacks have been discovered, including Spectre-NG, SpectreRSB, Spectre 1.1, Spectre1.2, TLBleed, Lazy