Month: August 2018

0 Comments
An advanced persistent threat group, active since at least 2016 and suspected in exploiting multiple attacks around the globe, is reportedly targeting institutions in Europe and Russia, according to a report released today from NETSCOUT Arbor. On 13 August NETSCOUT’s ASERT team identified new spear-phishing campaign activity from the financially motivated hacking group Cobalt. Given that
0 Comments
Google just made its Titan Security Key available on its store for $50. First announced last month at Google Cloud Next ’18 convention, Titan Security Key is a tiny USB device—similar to Yubico’s YubiKey—that offers hardware-based two-factor authentication (2FA) for online accounts with the highest level of protection against phishing attacks. Google’s Titan Security Key
0 Comments
VNTANA CEO Ashley Crowder calls the company’s technology, “the world’s first scalable, affordable and interactive hologram.” The startup’s tech hasn’t certainly wowed crowds in recent recent years. In 2016, it collaborated with Microsoft on HOLLAGRAM, beaming in a live hologram of MS executives during a HOLLAGRAM for a keynote at HackSC. The company’s technology has
0 Comments
The marriage of art and technology has the potential to stamp out art forgery, making it a thing of the past by using blockchain technology, according to Thomas Crown Art. The art-tech agency, established by art dealer Stephen Howes and technology expert Ian McLeod, has created smART (Smart Art). In an effort to eradicate counterfeit and
0 Comments
MGM Resorts International operates 27 resort properties worldwide, including more than 420 bars and restaurants and 282 retail establishments. SVP, Chief Information Security Officer Scott Howitt oversees security for the entire global enterprise, which encompasses 20,000 endpoints, various operating systems, and applications that span the gaming, hospitality, entertainment, food and beverage, retail and hotel industries.
0 Comments
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the
0 Comments
Valimail, an enterprise email security firm, announced that it will offer its email protections for free to relevant government workers and campaigns through the 2018 midterms. That offer covers state election boards, voting system vendors and major party U.S. election campaigns, including congressional, statewide and gubernatorial candidates. The company will also offer the same email
0 Comments
In a distributed-denial-of-service (DDoS) attack that began on Sunday, 26 August, and extended into today, Spain’s central bank was knocked offline. While Banco de Espana struggled to fight off the attack, business operations were not disrupted, according to Reuters. “We suffered a denial-of-service attack that intermittently affected access to our website, but it had no
0 Comments
The discovery was made barely two days after the release of a patch that fixes the critical flaw in the web application framework Researchers have discovered freely available proof-of-concept (PoC) code that can be used to exploit a critical security hole in the Apache Struts 2 web application framework shortly after the vulnerability was disclosed
0 Comments
A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft’s Windows operating system that could help a local user or malicious program obtain system privileges on the targeted machine. And guess what? The zero-day flaw has been confirmed working on a “fully-patched 64-bit Windows 10 system.” The vulnerability
0 Comments
Microsoft today announced a couple of AI-centric updates for OneDrive and SharePoint users with an Office 365 subscription that bring more of the company’s machine learning smarts to its file storage services. All of these features will launch at some point later this year. With the company’s Ignite conference in Orlando coming up next month,
0 Comments
Unfortunately for small-to-medium-sized businesses (SMBs), many employees remain ignorant to the reality of cyber threats, making decisions that continue to put the company at risk, according to a new study from Switchfast Technologies. The study found that one in three business owners do not have safeguards in place to combat cyber breaches and 60% of
0 Comments
by Lisa Vaas The Democratic National Committee (DNC), on Wednesday: We’ve been spearphished! The committee called the FBI about what it said was a fake login page designed to intercept usernames and passwords that would get attackers into the party’s voter database. The DNC, early on Thursday morning: False alarm! It was a test, but
0 Comments
Election security has again been called into question after millions of Texas voter records were left exposed. A file discovered by Flash Gordon, a New Zealand-based data breach hunter, was left on an unsecured server without a password, according to TechCrunch. Of the 15.2 million total registered Texas voters, an astounding 14.8 million records were left
0 Comments
Apple last week suggested that Facebook remove its Onavo security app from the App Store due to privacy rule violations. On Wednesday, Facebook complied. Onavo, an Israel-based company that Facebook acquired in 2013, has been raising eyebrows for months. Facebook had been pushing people to download the virtual private network (VPN) app for “protection” without
0 Comments
Security researchers from Google have publicly disclosed an extremely serious security flaw in the first Fortnite installer for Android that could allow other apps installed on the targeted devices to manipulate installation process and load malware, instead of the Fortnite APK.   Earlier this month, Epic Games announced not to make its insanely popular game
0 Comments
The cybersecurity team at T-Mobile discovered and halted an attack after a malicious actor had gained unauthorized access to the personal information of some customers during an ongoing security breach that the company disclosed on 20 August. While no financial data, passwords or social security numbers were compromised, T-Mobile wrote, “You should know that some
0 Comments
What’s next for robotics? At at Disrupt SF, we’ll be joined by four experts to discuss how new technologies are changing the field. Those experts include Peter Barrett, founder and CTO and Playground, a venture fund and design studio focused on hardware startups. Barrett is a 30-year veteran of the tech industry, whose accomplishments include
0 Comments
On the heels of Iran driving a disinformation campaign on Facebook, researchers have discovered a spoofed university login page that appears to be part of a larger credentials theft campaign believed to be the work of COBALT DICKENS, a threat group associate with the Iranian government. According to the Counter Threat Unit (CTU) research team