Month: August 2019

0 Comments
Beam, a telepresence robot with a screen that a person can remotely control and use to communicate via video, became a breakthrough success in the world of robotics in part because of its role in helping high-profile, but movement-limited, people like Edward Snowden better communicate with the outside world, and disability rights activists meet with world
0 Comments
[embedded content] Bell Helicopter’s catchily-named Autonomous Pod Transport 70 (aka APT 70) has managed a major milestone, performing its first autonomous flight during a test at its Forth Worth providing ground. The aircraft is a small vertical take-off and landing craft that users four rotors to provide lift and propulsion once it’s in the air,
0 Comments
At the Open Source Summit in San Diego, California on August 21, the Linux Foundation announced the formation of the Confidential Computing Consortium. Confidential computing is an approach using encrypted data that enables organizations to share and collaborate, while still maintaining privacy. Among the initial backers of the effort are Alibaba, Arm, Baidu, Google Cloud,
0 Comments
by John E Dunn If you’re a Cisco customer, the company just issued some urgent patching homework in the form of 31 security fixes, including four addressing new flaws rated ‘critical’. Three of the criticals (CVE-2019-1937, CVE-2019-1938, CVE-2019-1974) relate to authentication bypass vulnerabilities affecting the following products: UCS Director and Cisco UCS Director Express for
0 Comments
US authorities have charged 80 members of a Nigerian-based crime ring in connection with online scams designed to swindle victims around the world out of $46 million. A 145-page indictment lists 252 charges against the 80 suspects, who are mostly Nigerian nationals. Charges of aggravated identity theft, conspiracy to launder money and conspiracy to commit
0 Comments
Open-source Android spyware has appeared twice on Google Play. Research conducted by ESET discovered the first known instance of spyware based on the open-source espionage tool AhMyth lurking within a radio app available on Google Play. The app in question is Radio Balouch, detected as Android/Spy.Agent.AOX. On the surface Radio Balouch functions as an internet radio app dedicated to playing
0 Comments
by Paul Ducklin When cybercrooks first got into phishing in a big way, they went straight to where they figured the money was: your bank account. A few years ago, we used to see a daily slew of bogus emails warning us of banking problems at financial institutions we’d never even heard of, let alone
0 Comments
The South Korean government has said it will end a crucial intelligence-sharing arrangement with Japan, as a trade dispute between the two wartime foes deepens. Kim You-geun, deputy director of the presidential National Security Council, said the move was a response to Tokyo’s decision to remove South Korea’s fast-track export status earlier this month. “Under
0 Comments
The number of reported data breaches is said to be doubling every 18 months. Many of those breaches are the result of unpatched PCs, servers, applications or network infrastructure equipment that allowed bad actors access. Breaches are a serious issue for enterprise organizations. The last thing business leaders want is to have their companies’ names
0 Comments
Now well into its second decade of commercial availability, cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy. While cloud providers are more secure than ever before, there are still risks to using any cloud service. Fortunately, they can be largely mitigated by following these cloud