Month: November 2018

0 Comments
Law enforcement agencies across the EU have successfully shut down more than 33,600 internet domains distributing counterfeit or stolen items, according to a press release published today by Europol. Europol announced that its Intellectual Property Crime Coordinated Coalition (IPC3) seized 33,654 domain names that had been selling contraband, including counterfeit pharmaceuticals, pirated films, television shows,
0 Comments
Facebook has again made headlines after the UK Parliament leveraged its legal right to demand documents alleged to include confidential email exchanges between top executives, as well as correspondences with CEO Mark Zuckerberg, according to The Guardian. The documents are believed to contain the details of Facebook’s data and privacy controls prior to the Cambridge Analytica
0 Comments
by John E Dunn One of Intel’s fixes for the Spectre variant 2 chip flaw (CVE- 2017-5715) appears to have taken a big bite out of the performance of the latest Linux kernel. The mitigation in question is the Single Thread Indirect Branch Predictors (STIBP), one of three that Intel proposed not long after details of
0 Comments
If your organization is, you can win on a couple fronts… In traditional warfare, information sharing is key. The notion of sharing insight on your opponent is extremely valuable and cannot be underestimated. The basic principles in Sun Tzu’s The Art of War state you must know yourself and know your opponent to be successful.
0 Comments
Roughly one year after WhatsApp co-founder Brian Acton made his highly-publicized exit from Facebook, another executive and early employee of the messaging platform is doing the same. Neeraj Arora, WhatsApp’s chief business officer, announced today that he would be “taking some time off to recharge and spend time with family.” Facebook acquired WhatsApp for $19 billion
0 Comments
Google Maps has quietly rolled out a new feature aimed at helping users discover places others have recommended: it now supports hashtags in reviews. For example, if you’re reviewing a restaurant that would make an excellent #datenight spot, you can simply add the appropriate hashtag. Or if the business is #familyfriendly or #wheelchairaccessible, you can
0 Comments
Amazon’s kicking off Re:Invent week with the launch of AWS RoboMaker. The cloud-based service utilizes the widely deployed open-source software Robot Operating System (ROS) to offer developers a place to develop and test robotics applications. RoboMaker essentially serves as a platform to help speed up the time-consuming robotics development process. Among the tools offered by
0 Comments
News of the world’s first ever gene-edited human babies being born in China caused a huge stir on Monday after the MIT Technology Review and the Associated Press brought the project to light. People in and outside China rushed to question the ethical implications of the scientific breakthrough, reportedly the fruit of a Chinese researcher named He Jiankui from a university
0 Comments
Facebook founder Mark Zuckerberg may yet regret underestimating a UK parliamentary committee that’s been investigating the democracy-denting impact of online disinformation for the best part of this year — and whose repeat requests for facetime he’s just as repeatedly snubbed. In the latest high gear change, reported in yesterday’s Observer, the committee has used parliamentary powers
0 Comments
In a statement issued today, Logitech International said that while it had engaged in discussions with Plantronics about a potential transaction, it had terminated the negotiations. Over the weekend we picked up a Reuters report that the two companies were in talks for a potential $2.2 billion merger. The company declined to comment further.
0 Comments
Researchers at Qihoo 360 Netlab discovered hackers using vulnerable MikroTik routers to hijack TaZmen Sniffer Protocol traffic and send it to domains under their control. What is TZSP traffic and how are attackers gaining control of routers with this MikroTik router hack? The TaZmen Sniffer Protocol (TZSP) is an open protocol designed to encapsulate other
0 Comments
Nine out of 10 UK retailers are failing to boost customers’ log-in security with two-factor authentication (2FA), according to new research from LastPass. The LogMeIn company used the Black Friday shopping period this weekend to raise awareness about the continued security failings of many online retailers. Only Amazon passed the 2FA test among the top shopping
0 Comments
The advanced persistent threat (APT) group GreyEnergy has been targeting industrial networks across Ukraine and Eastern Europe for years, and according to analysis of the group’s activity, the attacks begin with a malicious document sent in a phishing email. Nozomi Networks performed analysis on the GreyEnergy advanced ICS malware and found that the tools and tactics used by
0 Comments
A self-proclaimed leader in enabling operational intelligence, OSIsoft, maker of PI system software, announced an ongoing investigation into a data breach that likely compromised all domain accounts. On 16 November, the company reported that it was experiencing a security incident that potentially affected everyone from employees and interns to consultants and contractors. Attackers reportedly stole credentials and