Month: August 2019

0 Comments
Silence APT, a Russian-speaking cybercriminal group, known for targeting financial organizations primarily in former Soviet states and neighboring countries is now aggressively targeting banks in more than 30 countries across America, Europe, Africa, and Asia. Active since at least September 2016, Silence APT group’s most recent successful campaign was against Bangladesh-based Dutch-Bangla Bank, which lost
0 Comments
The IT security community overwhelmingly believes that government-mandated encryption backdoors will put countries at a greater risk of election hacking, according to new Venafi research. The security vendor polled over 380 security professionals at Black Hat USA 2019 in Las Vegas earlier this month, following recent comments by attorney general, William Barr. Like his predecessors, Barr
0 Comments
ThredUp, the 10-year-old fashion resale marketplace, has a lot of big news to boast about lately. For starters, the company just closed on $100 million in fresh funding from an investor syndicate that includes Park West Asset Management, Irving Investors and earlier backers Goldman Sachs Investment Partners, Upfront Ventures, Highland Capital Partners and Redpoint Ventures.
0 Comments
In a move to protect its users based in Kazakhstan from government surveillance, Google and Mozilla finally today came forward and blocked Kazakhstan’s government-issued root CA certificate within their respective web browsing software. Starting today, Firefox and Chrome users in Kazakhstan will see an error message stating that the certificate should not be trusted when
0 Comments
Researchers found a weakness in the Bluetooth standard that affects all Bluetooth devices and could lead to man-in-the-middle attacks. The researchers — Daniele Antonioli, a PhD student in computer science at the Singapore University of Technology and Design, Nils Ole Tippenhauer, faculty at CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, and Kasper Rasmussen,
0 Comments
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping photos to your friend, Bluetooth has a variety of benefits that users take advantage of every day. But like many other technologies, Bluetooth isn’t immune to cyberattacks. According to Ars Technica, researchers have recently discovered
0 Comments
Tandem, one of the most sought after companies to graduate from Y Combinator’s summer batch, will emerge from the accelerator program with a supersized seed round and an uncharacteristically high valuation. The months-old business, which is developing communication software for remote teams after pivoting from crypto, is raising a $7.5 million seed financing at a
0 Comments
The attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor As many as 23 government organizations across Texas are reeling from an apparently “coordinated ransomware attack”, an alert by the Texas Department of Information Resources (DIR) reveals. The incident occurred last Friday and for the
0 Comments
Sunil Rajaraman Contributor More posts by this contributor ‘This is Your Life in Silicon Valley’: Former Pinterest president, Moment CEO Tim Kendall on smartphone addiction ‘This is Your Life in Silicon Valley’: Nomiku Founder CEO Lisa Fetterman on why Silicon Valley doesn’t care about female founders Welcome to this week’s transcribed edition of This is
0 Comments
From today’s smart home applications to autonomous vehicles of the future, the efficiency of automated decision-making is becoming widely embraced. Sci-fi concepts such as “machine learning” and “artificial intelligence” have been realized; however, it is important to understand that these terms are not interchangeable but evolve in complexity and knowledge to drive better decisions. Distinguishing
0 Comments
Chad M. Crabtree Contributor There has long been a stigma associated with therapy and mental health coaching, a stigma that is even more pronounced in the business world, despite considerable evidence of the efficacy of these services. One of the organizations that has set out to change this negative association is Torch, a startup that
0 Comments
It’s official: 1.5% of web logins use breached credentials, according to research published by Google. The company analyzed its own data to reach that number, which it presented at the USENIX conference this week. Many websites still rely on only a combination of username and password to grant users access. Large data breaches have leaked billions