Month: June 2019

0 Comments
Gail Ann Hurd Contributor Gale Anne Hurd is a producer of films and television shows, including the “Terminator” trilogy, “Aliens”, “Armageddon”, and “The Walking Dead”. Ruth Vitale Contributor Ruth Vitale, who has held top executive posts at indie film outfits including Paramount Classics, Fine Line Features, and New Line Cinema, is CEO of CreativeFuture. Internet
0 Comments
Another company charged with managing and safeguarding client data, Attunity, left client data files exposed on the internet, according to a June 27 report from UpGuard. The incident has reportedly impacted clients, including Ford and the TD Bank, whose customer information was publicly accessible.  Researchers disclosed that three Amazon S3 buckets used by the data management
0 Comments
Many different types of firewalls share a basic gatekeeping function preventing unauthorized traffic from flowing… into or out of a private network, while allowing sanctioned traffic to continue uninterrupted. A firewall might sit between an enterprise network and the internet, for example, allowing internal users to access information from external networks with varying levels of
0 Comments
Several times lately, CIOs and CISOs have asked me why the security toolset they get for “free” from their cloud service providers isn’t enough. Sure, it might not be the best … but isn’t it good enough for the program’s success? It’s true that we don’t often need the Cadillac.But cloud programs are failing at high
0 Comments
Cybersecurity researchers are warning about an ongoing Android malware campaign that has been active since 2016 and was first publicly reported in August 2018. Dubbed “ViceLeaker” by researchers at Kaspersky, the campaign has recently been found targeting Israeli citizens and some other middle eastern countries with a powerful surveillance malware designed to steal almost all
0 Comments
Reminder: Extra Crunch discount on Sessions: Enterprise tickets Come and watch TechCrunch interview enterprise titans and rising founders at the premier of TechCrunch Sessions: Enterprise in San Francisco on September 5th. Join 1000+ enterprise enthusiasts for a day of talks, demos, startups, and networking. Book your $249 Early Bird tickets today and save an extra
0 Comments
Independent restaurant owners may be doomed, and perhaps grocery stores, too. Such is the conclusion of a growing chorus of observers who’ve been closely watching a new and powerful trend gain strength: that of cloud kitchens, or fully equipped shared spaces for restaurant owners, most of them quick-serve operations. While viewed peripherally as an interesting
0 Comments
Only 10 days after malware researcher Brad Duncan reported analysis on a new variant of Dridex that bypasses mitigation of application whitelisting techniques by disabling or blocking Windows Script Host, eSentire discovered a new infrastructure pointing to a similar Dridex variant.   “Dridex malware targets banking information and is delivered via email in the form of a malicious
0 Comments
CERT, CSIRT, CIRT and SOC are terms you’ll hear in the realm of incident response. In a nutshell, the first three are often used synonymously to describe teams focused on incident response, while the last typically has a broader cybersecurity and security scope. Still, terminology can be important. Inconsistent terminology can cause misunderstandings of what
0 Comments
A popular gaming platform used by hundreds of millions of people worldwide has been found vulnerable to multiple security flaws that could have allowed remote hackers to takeover players’ accounts and steal sensitive data. The vulnerabilities in question reside in the “Origin” digital distribution platform developed by Electronic Arts (EA)—the world’s second-largest gaming company with
0 Comments
Silex, a new strain of malware that was used to brick IoT devices, is apparently the work of a 14-year-old boy from Europe, according to an Akamai researcher. The botnet works by trashing the IoT device’s storage, removing the network configuration, such as dropping firewall rules, and ultimately halting the devices, which renders them useless. Researcher Larry
0 Comments
Ransomware has been around since the late 1980s, but in recent years, it has emerged as one of the largest financial threats facing the public and private sector alike. According to the U.S. Department of Homeland Security, ransomware is the fastest-growing malware threat—and according to a report by Recorded Future in May, more than 170
0 Comments
By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K. Becoming a parent is a daunting experience for anyone. The sheer amount of responsibilities can feel overwhelming and all consuming. For my husband and I, we spent an emotional and tiring 18 months working through the adoption process before becoming parents to two fully formed little humans