0 Comments
Listen to this podcast In this week’s Risk & Repeat podcast, SearchSecurity editors discuss the dispute between Google and Epic Games over a newly disclosed flaw in the Android version of Fortnite. Google’s public disclosure of a vulnerability in the Android version of Epic Games Inc.’s popular title “Fortnite Battle Royale” sparked a feud between
0 Comments
Criminals continue to infect millions of consumers by exploiting programmatic ads despite the efforts of some publishers and platform providers that use blockers to help prevent bad ads from souring user experience. However, The Media Trust has discovered that cybercriminals have found new ways to bypass those blocker defense solutions and execute their malicious code,
0 Comments
Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small, many of which are now from IoT devices. By 2025, it is estimated that there will be approximately 75 billion connected devices around the world. With more IoT devices ­–from wearables and pacemakers
0 Comments
Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to
0 Comments
The i7+ features much-improved mapping and a self-emptying bin Brian Heater @ / 8 hours The Roomba i7+ looks like, well, it looks like a Roomba. There are few factors distinguishing the product from the last several generations. The rollers are bright green, along with a large Automatic Dirt Disposal section just below. Beyond that,
0 Comments
Celebrating the success of this year’s live hacking event, HackerOne (H1) recently announced that more than $500,000 was paid in bounties during the third annual h1-702 at DEF CON 26 in Las Vegas last month. More than 75 hackers from over 20 countries hacked five targets (including the United States Marine Corps) over the course
0 Comments
The Justice Department has confirmed that Attorney General Jeff Sessions has expressed a “growing concern” that social media giants may be “hurting competition” and “intentionally stifling” free speech and expression. The comments come as Facebook chief operating officer Sheryl Sandberg and Twitter chief executive Jack Dorsey gave testimony to the Senate Intelligence Committee on Wednesday, as
0 Comments
Theranos is reportedly finally closing down for good, nearly three years after a Wall Street Journal investigation called its blood testing technology into question. The WSJ said the company, whose dramatic downfall spawned a best-selling book that’s set to be filmed with Jennifer Lawrence starring as Theranos founder and CEO Elizabeth Holmes, sent shareholders an
0 Comments
SecureAuth Core Security today published a vulnerability disclosure in conjunction with enterprise systems monitoring software provider Opsview. The publication of the disclosure is related to five vulnerabilities in the company’s Opsview Monitor product, which is a virtual appliance deployed inside an organization’s network infrastructure. The product comes bundled with a web management console that monitors
0 Comments
The digital whiteboards have long replaced the squeaky blackboards, while emails and text messages are replacing messages pinned on the display boards in the corridors. Today, many schools have a Bring Your Own Device (BYOD) policy, making notebooks redundant. The education pattern is itself changing from general rote learning for all to the ‘Discovery’ methods.
0 Comments
All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme It is no mean feat to find an area in business and
0 Comments
Last month we reported about a widespread crypto-mining malware campaign that hijacked over 200,000 MikroTik routers using a previously disclosed vulnerability revealed in the CIA Vault 7 leaks. Now Chinese security researchers at Qihoo 360 Netlab have discovered that out of 370,000 potentially vulnerable MikroTik routers, more than 7,500 devices have been compromised to enable
0 Comments
At least one malicious actor began exploiting a critical vulnerability in Apache Struts in the wild, despite a patch being issued last week. According to researchers at Volexity, a cybersecurity company based in Washington, D.C., the exploits of the Apache Struts vulnerability surfaced in the wild not long after a proof-of-concept (PoC) exploit was published
0 Comments
As cryptocurrencies emerge from the speculative bloodletting of the past months, believers in the promise of distributed ledger technologies for business and consumer applications are casting about for what comes next. On our stage at Disrupt San Francisco we’ll be welcoming some of the leading thinkers in how distributed ledgers can create an entirely new
0 Comments
A cryptocurrency wallet device-maker has closed its bug bounty program and retracted claims it is unhackable after a researcher demonstrated yet another successful attack. The $120 Bitfi device is backed by outspoken security pioneer John McAfee, who still claims it is unhackable despite researchers confirming they have been successful on multiple occasions. “As part of
0 Comments
David Gorn Contributor David Gorn is a contributing writer for CALMatters and formerly was an editor and reporter for public media, including NPR and its California stations. Karen Lewis knows about water problems. The 67-year-old lives in Compton, where the water coming out of her tap is tinged brown by manganese, a metal similar to