Silence APT, a Russian-speaking cybercriminal group, known for targeting financial organizations primarily in former Soviet states and neighboring countries is now aggressively targeting banks in more than 30 countries across America, Europe, Africa, and Asia. Active since at least September 2016, Silence APT group’s most recent successful campaign was against Bangladesh-based Dutch-Bangla Bank, which lost
Month: August 2019
Entrepreneurship is on the rise, and nowhere is that more true than on college campuses. Students are ditching boring office jobs to seek out their own opportunities, whether that is launching a bootstrapped app, contributing to an open-source project, or building a venture-scalable startup. Here at Extra Crunch, our mission is to go behind the
The IT security community overwhelmingly believes that government-mandated encryption backdoors will put countries at a greater risk of election hacking, according to new Venafi research. The security vendor polled over 380 security professionals at Black Hat USA 2019 in Las Vegas earlier this month, following recent comments by attorney general, William Barr. Like his predecessors, Barr
by Paul Ducklin These days, webcams are everywhere. I’ve got one in my laptop, two in my phone, and even one that I can mount on my bicycle, though admittedly its battery doesn’t last very long when it’s filming and streaming at the same time. You’ll find webcam technology where you might expect it, such
Are you facing customers telling you that their data must be stored in a particular location? Be reassured: As a processor of data, we often encounter a discussion about where the data is resident, and we are often facing people certain that their data must be stored in a given country. But the truth is,
ThredUp, the 10-year-old fashion resale marketplace, has a lot of big news to boast about lately. For starters, the company just closed on $100 million in fresh funding from an investor syndicate that includes Park West Asset Management, Irving Investors and earlier backers Goldman Sachs Investment Partners, Upfront Ventures, Highland Capital Partners and Redpoint Ventures.
As education is becoming an increasingly vital tool in companies’ security toolboxes, the question arises: How can they effectively implement security awareness training? If you had told me a few weeks ago that many business leaders were unaware of a major piece of privacy legislation that’s set to go into effect in a few months,
In a move to protect its users based in Kazakhstan from government surveillance, Google and Mozilla finally today came forward and blocked Kazakhstan’s government-issued root CA certificate within their respective web browsing software. Starting today, Firefox and Chrome users in Kazakhstan will see an error message stating that the certificate should not be trusted when
Disrupt San Francisco 2019, our flagship event on October 2-4, features three full days of programming, more than 10,000 attendees, over 1,200 exhibiting startups and sponsors — and that’s just for starters. That’s a lot of ground to cover. Here’s a hot tip: take advantage of group discounts, saddle up and bring your whole posse
The number of account takeover (ATO) cases going to court in the UK climbed 57% in the first half of 2019 as cybercrime continues to professionalize, according to KPMG. The consulting giant’s biannual Fraud Barometer report has been analyzing crime trends in the UK over the past 30 years, specifically major fraud cases being heard
Researchers found a weakness in the Bluetooth standard that affects all Bluetooth devices and could lead to man-in-the-middle attacks. The researchers — Daniele Antonioli, a PhD student in computer science at the Singapore University of Technology and Design, Nils Ole Tippenhauer, faculty at CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, and Kasper Rasmussen,
by Paul Ducklin For the first time in… well, in ages, anyway… a jailbreak exists for the very latest version of iOS! Jailbreaking is where you exploit a security hole, or more likely a whole series of security holes, in what is essentially a carefully orchestrated cybersecurity attack on yourself, in order to liberate yourself
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping photos to your friend, Bluetooth has a variety of benefits that users take advantage of every day. But like many other technologies, Bluetooth isn’t immune to cyberattacks. According to Ars Technica, researchers have recently discovered
Tandem, one of the most sought after companies to graduate from Y Combinator’s summer batch, will emerge from the accelerator program with a supersized seed round and an uncharacteristically high valuation. The months-old business, which is developing communication software for remote teams after pivoting from crypto, is raising a $7.5 million seed financing at a
The attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor As many as 23 government organizations across Texas are reeling from an apparently “coordinated ransomware attack”, an alert by the Texas Department of Information Resources (DIR) reveals. The incident occurred last Friday and for the
A fully functional jailbreak has been released for the latest iOS 12.4 on the Internet, making it the first public jailbreak in a long time—thanks to Apple. Dubbed “unc0ver 3.5.0,” the jailbreak works with the updated iPhones, iPads and iPod Touches by leveraging a vulnerability that Apple previously patched in iOS 12.3 but accidentally reintroduced
Sunil Rajaraman Contributor More posts by this contributor ‘This is Your Life in Silicon Valley’: Former Pinterest president, Moment CEO Tim Kendall on smartphone addiction ‘This is Your Life in Silicon Valley’: Nomiku Founder CEO Lisa Fetterman on why Silicon Valley doesn’t care about female founders Welcome to this week’s transcribed edition of This is
Facebook has announced an expansion to its bug bounty program covering third-party apps that abuse user data, to include the Instagram ecosystem. First launched in 2018 in response to the Cambridge Analytica scandal, the Data Abuse Bounty program works by “incentivizing anyone to report apps collecting user data and passing it off to malicious parties
by Lisa Vaas A recent court filing indicates that Facebook knew about the bug in its View As feature that led to the 2018 data breach – a breach that would turn out to affect nearly 29 million accounts – and that it protected its employees from repercussions of that bug, but that it didn’t
From today’s smart home applications to autonomous vehicles of the future, the efficiency of automated decision-making is becoming widely embraced. Sci-fi concepts such as “machine learning” and “artificial intelligence” have been realized; however, it is important to understand that these terms are not interchangeable but evolve in complexity and knowledge to drive better decisions. Distinguishing
It’s that time of year, Silicon Valley’s investor technocrati and advice-giving Twitter celebrities descended upon Pier 48 in San Francisco to judge the latest summer batch of Y Combinator startups. TechCrunch was there, as well, and we were tapping away feverishly as co-founders pitched to woo investors. There are 197 companies in total in the
In this digital era, the success of almost every marketing, advertising, and analytics company drives through tracking users across the Internet to identify them and learn their interests to provide targeted ads. Most of these solutions rely on 3rd-party cookies, a cookie set on a domain other than the one you are browsing, which allows
Chad M. Crabtree Contributor There has long been a stigma associated with therapy and mental health coaching, a stigma that is even more pronounced in the business world, despite considerable evidence of the efficacy of these services. One of the organizations that has set out to change this negative association is Torch, a startup that
The state of Texas has come under fire from a coordinated ransomware attack affecting over 20 local authorities. The Texas Department of Information Resources (DIR) released an updated statement over the weekend detailing its response to the attacks, which occurred on Friday morning local time. Some 23 local government agencies were hit by the attacks
by Lisa Vaas A UK man who DDoS-ed police websites was caught and imprisoned after he jeered at police about the attacks on social media. Liam Reece Watts, 20, targeted the Greater Manchester Police (GMP) website in August 2018 and then the Cheshire Police site in March 2019, according to ITV News. Both of the
With summer coming to a close, it’s almost time for back to school! Back to school season is an exciting time for students, especially college students, as they take their first steps towards independence and embark on journeys that will shape the rest of their lives. As students across the country prepare to start or
Singapore-based budget hotel booking startup RedDoorz is tiny in comparison to fast-growing giant Oyo. But it is holding its ground and winning the trust of an ever growing number of investors. On Monday, the four-year-old startup announced it has raised $70 million in Series C financing round, less than five months after it closed its
In recent years, gas stations have become one of the favorite targets for thieves who are stealing customers’ credit and debit card information by installing a Bluetooth-enabled payment card skimmers at gas stations across the nation. The media has also reported several recent crimes surrounding credit card skimmers, including: Gas pump skimmer found at a
When we reviewed “Another Life” last week, we described it as an old-fashioned science fiction space show, something that’s been absent from TV for the past decade or so. “Wu Assassins” is another new Netflix series, and it’s also is a kind of a throwback — this time to ’90s martial arts series like “Vanishing
It’s official: 1.5% of web logins use breached credentials, according to research published by Google. The company analyzed its own data to reach that number, which it presented at the USENIX conference this week. Many websites still rely on only a combination of username and password to grant users access. Large data breaches have leaked billions
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 8
- Next Page »