Month: July 2019

0 Comments
An exposed database at automotive giant Honda allowed anyone to see which systems on its network were vulnerable to unpatched security flaws, potentially giving hackers insider knowledge of the company’s weak points. The server contained 134 million rows of employee systems data from the company’s endpoint security service, containing technical details of each computer and
0 Comments
Researchers are warning of a potentially serious Android ransomware threat that spreads via malicious links in SMS messages and posts in forums. ESET malware researcher, Lukas Stefanko, explained in a blog post that Android/Filecoder.C has been active since at least July 12 — distributed via Reddit posts and an Android developers forum known as “XDA
0 Comments
If your e-commerce website runs on the OXID eShop platform, you need to update it immediately to prevent your site from becoming compromised. Cybersecurity researchers have discovered a pair of critical vulnerabilities in OXID eShop e-commerce software that could allow unauthenticated attackers to take full control over vulnerable eCommerce websites remotely in less than a
0 Comments
NakedPoppy co-founders Jaleh Bisharat and Kimberly Shenk are an impressive duo. Bisharat, the startup’s chief executive officer, is a commanding presence and a bona fide marketing savant. The perfect compliment to Shenk, a reticent and data-focused chief product officer. Together they’re building a cosmetics startup, NakedPoppy, where people can purchase high-quality “clean” makeup, or sustainable,
0 Comments
by John E Dunn Network Attached Storage (NAS) company Synology has issued an urgent warning for owners to check their box’s security settings after it emerged cybercriminals are targeting numerous NAS vendors with a new wave of ransomware. At first it was thought that recent attacks could be exploiting an unknown software vulnerability in Synology’s
0 Comments
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks After two years of decline in Android ransomware, a new family has emerged. We have seen the ransomware, detected by ESET Mobile Security as Android/Filecoder.C, distributed via various online forums. Using victims’ contact lists, it
0 Comments
Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries. According to a new report Armis researchers shared with The Hacker News
0 Comments
A British cybersecurity researcher who was arrested in the US for historic hacking offenses has been spared jail time. Marcus Hutchins, 25, sprang to fame in 2017 when he discovered a “kill switch” which helped to mitigate the impact of the infamous WannaCry worm. However, a few months later things turned sour after he was
0 Comments
Yesterday, some residents of Johannesburg, the largest city in South Africa, were left without electricity after the city’s power company got attacked by a ransomware virus. City Power, the company responsible for powering South Africa’s financial capital Johannesburg, confirmed Thursday on Twitter that it had been hit by a Ransomware virus that had encrypted all
0 Comments
Hello, weekenders. This is Week-in-Review, where I give a heavy amount of analysis and/or rambling thoughts on one story while scouring the rest of the hundreds of stories that emerged on TechCrunch this week to surface my favorites for your reading pleasure. Last week, I talked about how services like Instagram had moved beyond letting
0 Comments
Ransomware dominated the first half of 2019, while mobile banking malware threats grew by more than 50% from 2018 to 2019, according to Check Point’s Mid-Year Trends Report. “This year collaborations between threat actors allowed even more destructive attacks that paralyzed numerous organizations worldwide. What ends with a ransomware attack usually starts with a more
0 Comments
Quantum computers, cryptography and encryption are a potent mix, especially because quantum computers could eventually give attackers a practical method for decrypting almost all traditionally encrypted data. Although the potential for quantum computing was first posited in 1982 by physicist Richard Feynman, and the MIT mathematician Peter Shor reported an algorithm that would enable quantum
0 Comments
The John S. and James L. Knight Foundation is looking for pitches on how to enhance and augment traditional creative arts through immersive technologies. Through a partnership with Microsoft the foundation is offering a share of a $750,00 pool of cash and the option of technical support from Microsoft, including mentoring in mixed-reality technologies and
0 Comments
Hello and welcome back to Startups Weekly, a weekend newsletter that dives into the week’s noteworthy startups and venture capital news. Before I jump into today’s topic, let’s catch up a bit. Last week, I noted some challenges plaguing mental health tech startups. Before that, I wrote about Zoom and Superhuman’s PR disasters. Remember, you