Microsoft has introduced a new password-protected folder within its OneDrive online file storage service that will allow you to keep your sensitive and important files protected and secured with an extra layer of authentication. Dubbed Personal Vault, the new OneDrive folder can only be accessed with an additional step of identity verification, such as your
Month: June 2019
Gail Ann Hurd Contributor Gale Anne Hurd is a producer of films and television shows, including the “Terminator” trilogy, “Aliens”, “Armageddon”, and “The Walking Dead”. Ruth Vitale Contributor Ruth Vitale, who has held top executive posts at indie film outfits including Paramount Classics, Fine Line Features, and New Line Cinema, is CEO of CreativeFuture. Internet
Welcome back to the transcribed edition of the popular podcast Equity. This week, TechCrunch writers Kate Clark and Connie Loizos were joined in the studio by Canvas Ventures’ general partner Rebecca Lynn. This week, the crew talked about the big rounds raised by shoe resale marketplace StockX, which raised $110 million at a $1 billion
Another company charged with managing and safeguarding client data, Attunity, left client data files exposed on the internet, according to a June 27 report from UpGuard. The incident has reportedly impacted clients, including Ford and the TD Bank, whose customer information was publicly accessible. Researchers disclosed that three Amazon S3 buckets used by the data management
Many different types of firewalls share a basic gatekeeping function preventing unauthorized traffic from flowing… into or out of a private network, while allowing sanctioned traffic to continue uninterrupted. A firewall might sit between an enterprise network and the internet, for example, allowing internal users to access information from external networks with varying levels of
by Danny Bradbury Well, this is one of the more bizarre internet stunts we’ve seen. In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you’re someone else. The company has introduced an online project called Track THIS (although we don’t recommend you
Several times lately, CIOs and CISOs have asked me why the security toolset they get for “free” from their cloud service providers isn’t enough. Sure, it might not be the best … but isn’t it good enough for the program’s success? It’s true that we don’t often need the Cadillac.But cloud programs are failing at high
Cybersecurity researchers are warning about an ongoing Android malware campaign that has been active since 2016 and was first publicly reported in August 2018. Dubbed “ViceLeaker” by researchers at Kaspersky, the campaign has recently been found targeting Israeli citizens and some other middle eastern countries with a powerful surveillance malware designed to steal almost all
Reminder: Extra Crunch discount on Sessions: Enterprise tickets Come and watch TechCrunch interview enterprise titans and rising founders at the premier of TechCrunch Sessions: Enterprise in San Francisco on September 5th. Join 1000+ enterprise enthusiasts for a day of talks, demos, startups, and networking. Book your $249 Early Bird tickets today and save an extra
Independent restaurant owners may be doomed, and perhaps grocery stores, too. Such is the conclusion of a growing chorus of observers who’ve been closely watching a new and powerful trend gain strength: that of cloud kitchens, or fully equipped shared spaces for restaurant owners, most of them quick-serve operations. While viewed peripherally as an interesting
Only 10 days after malware researcher Brad Duncan reported analysis on a new variant of Dridex that bypasses mitigation of application whitelisting techniques by disabling or blocking Windows Script Host, eSentire discovered a new infrastructure pointing to a similar Dridex variant. “Dridex malware targets banking information and is delivered via email in the form of a malicious
CERT, CSIRT, CIRT and SOC are terms you’ll hear in the realm of incident response. In a nutshell, the first three are often used synonymously to describe teams focused on incident response, while the last typically has a broader cybersecurity and security scope. Still, terminology can be important. Inconsistent terminology can cause misunderstandings of what
by Lisa Vaas Deepfakes: the convincing images created by sophisticated neural networks – an evolving technology that first came to light in 2017 – threaten to undercut the veracity of everything, including apparent videos of CEOs or any other public figure who can be made into an actor for the sake of fake news, undermining
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to the username. This little blue tick is Instagram’s indication that the account is verified. While it may seem insignificant at first glance, this badge actually means that Instagram has confirmed that the account is an
A popular gaming platform used by hundreds of millions of people worldwide has been found vulnerable to multiple security flaws that could have allowed remote hackers to takeover players’ accounts and steal sensitive data. The vulnerabilities in question reside in the “Origin” digital distribution platform developed by Electronic Arts (EA)—the world’s second-largest gaming company with
It looks like choose-your-own-adventure Twitter games won’t be a one-hit wonder, now that Apple’s social team has adopted the format. A new tweet from the @AppleTV Twitter account today helps users find a movie to watch by having them click through a series of Twitter threads. However, their effort (so far at least) pales compared
Spotify seems to have learned little from the Facebook developer platform’s scandals despite getting a huge boost from the social network in its early days. Spotify has been caught allowing record labels to grab tons of unnecessary user data and permissions to even control their accounts just so people can “pre-save” upcoming song releases. An
Silex, a new strain of malware that was used to brick IoT devices, is apparently the work of a 14-year-old boy from Europe, according to an Akamai researcher. The botnet works by trashing the IoT device’s storage, removing the network configuration, such as dropping firewall rules, and ultimately halting the devices, which renders them useless. Researcher Larry
The Internet Message Access Protocol, first specified in the 1980s, enables remote users to view and manage messages stored on mail servers. While IMAP has become less important as enterprises and users move to webmail services to manage email directories and messages, it is still widely deployed and used — often behind firewalls and gateways.
by Paul Ducklin Have you heard of a cryptocurrency outfit called Luno? We hadn’t heard of it until today – there are lots of cryptocoin companies out there, after all – but cybercrooks certainly had. According to its own website, Luno (it’s the word for moon in the constructed global language Esperanto, in case you’re
Ransomware has been around since the late 1980s, but in recent years, it has emerged as one of the largest financial threats facing the public and private sector alike. According to the U.S. Department of Homeland Security, ransomware is the fastest-growing malware threat—and according to a report by Recorded Future in May, more than 170
The new feature is intended to protect the kind of data that you hold particularly dear Microsoft will soon add a new feature to its OneDrive cloud storage that is designed to ramp up security for your most sensitive files. Dubbed OneDrive Personal Vault, this ‘partition’ of your OneDrive account will only be accessible using “a strong
The German police yesterday raided the house of the developer of OmniRAT and seized his laptop, computer and mobile phones probably as part of an investigation into a recent cyber attack, a source told The Hacker News. OmniRAT made headlines in November 2015 when its developer launched it as a legitimate remote administration tool for
French startup Ornikar is raising a $40 million Series B round (€35 million) from Idinvest and Bpifrance. The company competes with traditional driving schools in Europe with an online marketplace of students and teachers. And Ornikar has been a massive success in France. Overall, 35 percent of driving school registrations in 2019 are handled by
Talis Capital – an early investor in Darktrace, Pirate Studios, Luminance and iwoca – announces today that it’s raised $100m for 2019, a record for the firm to date as it passes it’s 10th year of operation. In those ten years it’s done $600m in transactions as it seeks to invest in the fast-growing tech
Another Florida city has decided to pay a ransom to the hackers who took control over its municipal computer systems. On June 25, the mayor of Lake City said the northern Florida city would pay hackers $460,000 to regain control of its email and other servers that were seized two weeks ago, according to CBS
SMS phishing — also known as smishing — can have serious business consequences for both managed devices and BYOD scenarios. Smishing is when a hacker attempts to trick a user into giving up information via a text message to a mobile device, and this trend appears to be gaining popularity. This attack vector is an
by Lisa Vaas If you’re going to go around DDoSing businesses, it’s probably not the slickest idea to carry a thumb drive full of evidence in your pocket while you’re hurling a Molotov cocktail at one of their brick-and-mortars. A now-35-year-old Belgian man who was already sentenced to prison for hurling that bomb has had
By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K. Becoming a parent is a daunting experience for anyone. The sheer amount of responsibilities can feel overwhelming and all consuming. For my husband and I, we spent an emotional and tiring 18 months working through the adoption process before becoming parents to two fully formed little humans
A few days apart, two cities in Florida cave in to extortionists’ demands in hopes of restoring access to municipal computer systems To pay or not to pay ransomware attackers? And if I do pay up, will I get my data back? These have been some truly pressing questions not only for ransomware victims and,
- 1
- 2
- 3
- …
- 8
- Next Page »