Month: March 2019

At this week’s Black Hat Asia 2019 conference, researchers from Positive Technologies revealed findings about an undocumented technology in Intel microchips that allow reading data from the memory of and intercepting the signals from peripherals. On March 28, 2019, Positive Technologies experts Maxim Goryachy and Mark Ermolov spoke in Singapore, discussing the microchips in their session
After researchers discovered an SQL injection vulnerability in Magento’s code, the company issued a security fix for more than 30 different vulnerabilities in its software, which reportedly has put more than 300,000 e-commerce sites at risk of card-skimming attacks. Online businesses have been strongly urged to download the latest fix, warning that versions prior to 2.3.1
A security researcher today publicly disclosed details and proof-of-concept exploits for two ‘unpatched’ zero-day vulnerabilities in Microsoft’s web browsers after the company allegedly failed to respond to his responsible private disclosure. Both unpatched vulnerabilities—one of which affects the latest version of Microsoft Internet Explorer and another affects the latest Edge Browser—allow a remote attacker to
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting is that there are no silver bullets for any parenting issues. Whether it’s toilet training or driver training, it takes time and often a combination of strategies. Teaching your kids about online safety is no
The escalating crisis in Venezuela has seen sky-high hyperinflation, widespread hunger and a large-scale exodus out of the country. The desperate circumstances have led to more than three million Venezuelans leaving the country for a better life. According to recent numbers published by the UN, Latin American countries have doled out around 1.3 million residence
Bad guys out, good guys in. This principle has long shaped how enterprises approach information security, anchored in the premise that IT environments can be protected from malicious activity simply by making the perimeter bigger, stronger and more resilient. It’s a model that evokes comparisons to castles and moats, but it carries a twinge of
Though backup is a known best-practice approach to IT risk management, many companies are overwhelmed by the number of sites that need to be backed up, according to a new survey released today by Barracuda Networks. The study, Closing Backup and Recovery Gaps, asked more than 1,000 IT professionals, business executives and backup administrators about
Kong, the open core API management and lifecycle management company previously known as Mashape, today announced that it has raised a $43 million Series C round led by Index Ventures. Previous investors Andreessen Horowitz and Charles River Ventures (CRV), as well as new investors GGV Capital and World Innovation Lab also participated. With this round,
An LGBTQ dating app, Grindr, has come under fire after Reuters reported that the Committee on Foreign Investment in the United States (CFIUS) told the app’s China-based parent company that its ownership posed a national security risk. Now, the Chinese gaming company, Beijing Kunlun Tech Co Ltd, is reportedly looking to sell Grindr LLC, which it