IT administrators must walk the tightrope between locking down their systems and finding ways to manage those machines without tripping over internal controls. Microsoft offers a number of security-based technologies to help IT workers who need admin privileges correct many issues, such as Just Enough Administration and bastion forests. But these restrictions tend to be
Month: March 2019
At this week’s Black Hat Asia 2019 conference, researchers from Positive Technologies revealed findings about an undocumented technology in Intel microchips that allow reading data from the memory of and intercepting the signals from peripherals. On March 28, 2019, Positive Technologies experts Maxim Goryachy and Mark Ermolov spoke in Singapore, discussing the microchips in their session
by Lisa Vaas Some of us may think that an appropriate penalty for robocallers is to stuff them with burner phones and roast them up for Sunday dinner, in which case some of us are going to be underwhelmed with the news that the FCC has basically slapped some hands and tsk-tsk-ed them into promising
Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures’ Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb’s hot EOS and XRP wallets and transferred around 3 million EOS (~ $13 million)
It’s been a busy day for Facebook exec op-eds. Earlier this morning, Sheryl Sandberg broke the site’s silence around the Christchurch massacre, and now Mark Zuckerberg is calling on governments and other bodies to increase regulation around the sorts of data Facebook traffics in. He’s hoping to get out in front of heavy-handed regulation and
When you’ve been doing this job long enough, you start to develop strange interests (though some might compellingly argue that strange interests are a prerequisite). Lately for me it’s been power banks. Quite possibly the least sexy product in all of consumer electronics outside of the ever-ubiquitous dongle. I don’t know what to tell you.
After researchers discovered an SQL injection vulnerability in Magento’s code, the company issued a security fix for more than 30 different vulnerabilities in its software, which reportedly has put more than 300,000 e-commerce sites at risk of card-skimming attacks. Online businesses have been strongly urged to download the latest fix, warning that versions prior to 2.3.1
by Lisa Vaas A Chinese gaming company is reportedly looking to offload the gay dating site Grindr due to US government concerns over its ownership, according to Reuters. Sources familiar with the matter told the news service that Beijing Kunlun Tech Co Ltd., which picked up Grindr in 2016, is looking to sell it after
A new study from Pew Research confirms our collective hunch that 95% of teens now report they have a smartphone and that 45% of teens now say they are always online. No shock there. The finding that is far more worrisome? That despite this dramatic digital shift over the past decade, parents are divided on
After he was fired for poor performance, the ex-employee was back with a vengeance, literally A British man has been sent to prison for two years after he wiped out his ex-employer’s business-critical data in cloud storage, according to a report by the United Kingdom’s Thames Valley Police. Steffan Needham, of Bury, Greater Manchester, worked
A security researcher today publicly disclosed details and proof-of-concept exploits for two ‘unpatched’ zero-day vulnerabilities in Microsoft’s web browsers after the company allegedly failed to respond to his responsible private disclosure. Both unpatched vulnerabilities—one of which affects the latest version of Microsoft Internet Explorer and another affects the latest Edge Browser—allow a remote attacker to
Lyft completed its long-awaited IPO this week, trading 21 percent higher Friday than its initial offering price of $72 per share. It closed its first day of trading at about $78 per share, up roughly 9 percent. I spoke to IPO guru Brian Hamilton, the CEO of banking software company Sageworks, about Lyft’s offering to
Restaurant sales hit $825 billion last year in the US, but with margins averaging at only three to five percent per business, they’re always looking for an edge on efficiency and just generally running things in a smarter way. Now, a startup called Toast, which has built a popular platform for restaurant management, has closed
The rollout of 5G wireless technology is expected to enable many new technologies to thrive, but it will also lead to new edge computing security challenges and competition with cloud providers. John Maddison, executive vice president of products and solutions at Fortinet Inc., said that although the rollout of 5G may take a while, the
After a security incident in February at its Australian subsidiary, Toyota Motor Corp. has suffered its second security breach in the last five weeks, with today’s breach announced by the company’s main offices in Japan. “On March 29, 2019, it was announced in Japan that Toyota Motor Corporation (TMC) learned it had possibly been the
by John E Dunn For the longest time, drones looked like a good-news tech story that would transform aerial photography, disaster relief and parcel delivery. The world is still waiting to receive packages from the air (although UPS claims it’s started deliveries this week), which might be just as well because experts are having second thoughts.
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting is that there are no silver bullets for any parenting issues. Whether it’s toilet training or driver training, it takes time and often a combination of strategies. Teaching your kids about online safety is no
World Backup Day is a reminder that organizations and individuals need to make data backup and protection a priority The loss of data – whether a result of human error, technological failure, or a cyberattack – is one of the greatest threats to organizations and individuals today. In our increasingly digitized world, we rely on our
FireEye today released Commando VM, a first of its kind Windows-based security distribution for penetration testing and red teaming. When it comes to the best-operating systems for hackers, Kali Linux is always the first choice for penetration testers and ethical hackers. However, Kali is a Linux-based distribution, and using Linux without learning some basics is
The escalating crisis in Venezuela has seen sky-high hyperinflation, widespread hunger and a large-scale exodus out of the country. The desperate circumstances have led to more than three million Venezuelans leaving the country for a better life. According to recent numbers published by the UN, Latin American countries have doled out around 1.3 million residence
A revealing cluster of emails leaked to Business Insider offers a glimpse at how Facebook decides what content is objectionable in high profile cases. In this instance, a group of executives at Facebook went hands on in determining if an Alex Jones Instagram post violated the platform’s terms of service or not. As Business Insider
Bad guys out, good guys in. This principle has long shaped how enterprises approach information security, anchored in the premise that IT environments can be protected from malicious activity simply by making the perimeter bigger, stronger and more resilient. It’s a model that evokes comparisons to castles and moats, but it carries a twinge of
Though backup is a known best-practice approach to IT risk management, many companies are overwhelmed by the number of sites that need to be backed up, according to a new survey released today by Barracuda Networks. The study, Closing Backup and Recovery Gaps, asked more than 1,000 IT professionals, business executives and backup administrators about
by Paul Ducklin We’ve written about internet hoaxes many times before on Naked Security. Sometimes, hoaxes – made-up nonsense about software, bugs or hackers – get spread widely because they sound exciting and scary. Even when a hoax sounds bizarre and unlikely, it may get picked up and repeated as an earnest truth by millions
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games, and a credit card service. But while these exciting announcements were being made, the release of iOS 12.2 seemed to slip under the radar. This update contains 51 different security fixes and impacts devices ranging from
It’s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously A recent test of anti-malware apps available in Google Play showed that most are not, in fact, worthy of the name and, indeed, the space they take up on the Android device. Independent
An Iran-linked cyber-espionage group that has been found targeting critical infrastructure, energy and military sectors in Saudi Arabia and the United States two years ago continues targeting organizations in the two nations, Symantec reported on Wednesday. Widely known as APT33, which Symantec calls Elfin, the cyber-espionage group has been active since as early as late
Kong, the open core API management and lifecycle management company previously known as Mashape, today announced that it has raised a $43 million Series C round led by Index Ventures. Previous investors Andreessen Horowitz and Charles River Ventures (CRV), as well as new investors GGV Capital and World Innovation Lab also participated. With this round,
Apple’s continued to improve the MacBook line’s butterfly switch keyboards. In fact, the technology is on its third generation, which added a rubberized membrane designed to fix on-going issues and reduce that loud clacking sound. But even the most devoted Apple fans have continued to have gripes, from stuck keys to random misfires. True story:
An LGBTQ dating app, Grindr, has come under fire after Reuters reported that the Committee on Foreign Investment in the United States (CFIUS) told the app’s China-based parent company that its ownership posed a national security risk. Now, the Chinese gaming company, Beijing Kunlun Tech Co Ltd, is reportedly looking to sell Grindr LLC, which it
- 1
- 2
- 3
- …
- 8
- Next Page »