0 Comments
Amazon must be pretty happy after tonight’s primetime Emmy Awards, where its shows “Fleabag” and “The Marvelous Mrs. Maisel” dominated the comedy categories. “Fleabag” did particularly well, winning the big award for Comedy Series, as well as additional awards for Lead Actress in a Comedy Series (Phoebe Waller-Bridge, pictured above), Writing for a Comedy Series
0 Comments
The Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program is a key component of the federal government’s cybersecurity posture. This important program provides real-time, continuous monitoring of federal networks while also auditing networks for unauthorized changes. While the CDM program has been a boon to the security of many civilian agencies, there
0 Comments
A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one of the most popular applications for managing the MySQL and MariaDB databases. phpMyAdmin is a free and open source administration tool for MySQL and MariaDB that’s widely used to manage the database for websites created with WordPress, Joomla, and many
0 Comments
It makes lazy people like me work out. That’s the genius of the Peloton bicycle. All you have to do is velcro on the shoes and you’re trapped. You’ve eliminated choice and you will exercise. Through a succession of savvy product design choice I’ll break down here, Peloton removes the friction to getting fit. It’s the
0 Comments
A lack of security on WeWork‘s WiFi network has left sensitive user data exposed. In August, Fast Company revealed that WeWork had used the same WiFi password at many of its rentable shared co-working spaces for years, a password that appears in plain text on WeWork’s app.  The security of the real estate company’s WiFi came under further
0 Comments
Encrypting web content is nothing new: It’s been nearly 20 years since the publication of the specification for encrypting web content by running HTTP over the Transport Layer Security protocol. However, running a secure encrypted web server has gone from an option to a virtual necessity in recent years. Attackers continue to seek — and
0 Comments
As Facebook prepares to launch its new cryptocurrency Libra in 2020, it’s putting the pieces in place to help it run. In one of the latest developments, it has acquired Servicefriend, a startup that built bots — chat clients for messaging apps based on artificial intelligence — to help customer service teams, TechCrunch has confirmed.
0 Comments
Facebook CEO Mark Zuckerberg, a 35-year-old billionaire who keeps refusing to sit in front of international parliamentarians to answer questions about his ad business’ impact on democracy and human rights around the world, has a new piece of accountability theatre to sell you: An “Oversight Board“. Not of Facebook’s business itself. Though you’d be forgiven
0 Comments
The City of Los Angeles and IBM are joining forces with the LA Cyber Lab to help local businesses combat cybercrime. In a new project announced by IBM Security on September 17, the American multi-national IT company will provide technologies and data that will give the city’s commercial movers and shakers an edge in the event of a cyber-attack.
0 Comments
by Danny Bradbury A researcher has just published a zero-day security bug in one of the web’s most popular database administration software packages. The bug makes it possible for an attacker to delete a server by hijacking a user’s account in phpMyAdmin, a 21-year-old open-source tool used to manage MySQL and MariaDB databases. The flaw
0 Comments
Back in January, Blackstone — the investment firm whose assets under management surpassed a jaw-dropping half a trillion dollars earlier this year — quietly began piecing together a new, growth equity platform called Blackstone Growth, or BXG. Step one was hiring away Jon Korngold from General Atlantic, where he’d spent the previous 18 years, including
0 Comments
Defending enterprises against the growing frequency and complexity of cyberattacks is becoming an ever-increasing burden to cybersecurity budgets and manpower. An ESG enterprise-class cybersecurity technology platform white paper commissioned by McAfee shows CISOs have “reached a tipping point where the current cybersecurity point tools are no longer acceptable.” Current high-cost, complex strategies using disconnected point
0 Comments
In a surprise u-turn, senate Republicans have decided to back Democrat calls for an extra $250m to enhance the security of the nation’s voting infrastructure. Speaking on the floor yesterday, senate majority leader Mitch McConnell said: “I’m proud the Financial Services & General Government bill will include a bipartisan amendment providing another $250 million for
0 Comments
Whether organizations truly need a cybersecurity framework is one of the biggest questions that’s never really asked in information security. This is because some vendors focus on selling spot security products, an approach that doesn’t lend itself to encouraging enterprises to step back and look at security in the overall context of what they are
0 Comments
by Lisa Vaas Facebook’s original motto: “Move fast and break things.” France’s finance minister Bruno Le Maire: Non merci, not our global economy, you don’t. Last week, on Thursday, 13 September, Le Maire said in a speech at the OECD Global Blockchain Policy Forum 2019 – a digital currency conference – that he sees Facebook’s
0 Comments
Twitter’s ongoing, and possibly Sisyphean, effort of policing and removing nefarious content disseminated on its platform is taking another step forward today. The company’s safety team has disclosed the removal of another 10,112 accounts across six countries that were found to be actively spreading misinformation and encouraging unrest in politically sensitive climates. The accounts noted
0 Comments
The UK’s cybersecurity agency also outlines precautions that academia should take to mitigate risks The United Kingdom’s National Cyber Security Centre (NCSC) has issued a stark warning to universities across the country, urging them to be on their guard against cyberattacks. The main risk is, in fact, two-fold. Firstly, it comes from ne’er-do-wells seeking financial
0 Comments
Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade the application to the latest available version immediately. Started rolling out to users worldwide this Wednesday, the Chrome 77.0.3865.90 version contains security patches for 1 critical and 3 high-risk security vulnerabilities, the most
0 Comments
Thiago Paiva Contributor Thiago Paiva is a fintech entrepreneur, writer and investor. He is the co-founder of Liquia Digital Assets, an investment platform for international investments using blockchain technology. The super apps WeChat and Alipay became an integral part of the Chinese mobile ecosystem, growing to more than 1 billion monthly active users (MAU) and
0 Comments
It’s relatively easy to manage device encryption when there are only iOS devices in a mobile fleet. Apple provides a single encryption standard across all of the iOS devices it manufactures.  Android device encryption, however, depends on the version of Android the devices run, the OEM and device model, the hardware architecture and other factors.
0 Comments
Arch Rao, the former head of product at Tesla who was behind the company’s Powerwall home energy storage is system, is back with a new company pitching energy management and efficiency for homes. SpanIO is looking to upgrade the electrical fusebox for homes with a digital system that integrates into the existing circuit breaker technology