Month: August 2019

0 Comments
If you are using LibreOffice, you need to update it once again. LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities. LibreOffice is one of the most popular and open source alternatives to Microsoft Office
0 Comments
The UK Information Commissioner’s Office (ICO) has launched an investigation into the use of facial recognition technology in London’s King’s Cross. The announcement followed news of the technology’s use at Granary Square, a large, private development in the area. Granary Square is a 67-acre development comprising 50 buildings. Press reports detailing the use of facial
0 Comments
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions
0 Comments
It’s true, you’ve got the Galaxy Note to thank for your big phone. When the device hit the scene at IFA 2011, large screens were still a punchline. That same year, Steve Jobs famously joked about phones with screens larger than four inches, telling a crowd of reporters, “nobody’s going to buy that.” In 2019,
0 Comments
Does true Artificial Intelligence even exist yet? Will it ever exist or will it end the world before we reach its full capacity? The hype around Artificial Intelligence (AI) is currently a media frenzy and if we aren’t careful, we will ruin the name before it has had a chance to really prove itself due
0 Comments
Chinese mobile-phone and device maker Transsion is teaming up with Kenya’s Wapi Capital to source and fund early-stage African fintech startups. Headquartered in Shenzhen, Transsion is a top-seller of smartphones in Africa that recently confirmed its imminent IPO. Wapi Capital is the venture fund of Kenyan fintech startup Wapi Pay—a Nairobi based company that facilitates digital
0 Comments
Unlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10 Microsoft issued fixes for four critical vulnerabilities in Remote Desktop Services (RDS) this week, likening two of them to ‘BlueKeep’, another critical flaw in the same Windows component. All four Remote Code Execution (RCE) flaws – tracked as CVE‑2019‑1181, CVE‑2019‑1182, CVE‑2019‑1222 and
0 Comments
A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows XP to the latest Windows 10. The vulnerability, which could allow a low privileged application to read and write data to a higher privileged application, resides in the way MSCTF clients and
0 Comments
Botnets continue to be one of the most prevalent and dangerous forms of malware organizations contend with. That’s in part because botnets tend to target devices that can’t be patched or updated and yet fill a critical function inside an organization. For example, industrial IoT devices can be responsible for monitoring and managing critical systems
0 Comments
by Danny Bradbury Microsoft’s Patch Tuesday bought some very bad news yesterday: more wormable RDP vulnerabilities, this time affecting Windows 10 users. CVE-2019-1181 and -1182 are critical vulnerabilities in Remote Desktop Services (formerly Windows Terminal) that are wormable – similar to the BlueKeep vulnerability that people have already created exploits for. Wormable means that the
0 Comments
ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers We’ve discovered an ongoing campaign in the Balkans spreading two tools having a similar purpose: a backdoor and a remote access trojan we named, respectively, BalkanDoor and BalkanRAT. BalkanRAT enables the attacker
0 Comments
Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices. The vulnerability, assigned as CVE-2019-9506, resides in the way ‘encryption key negotiation protocol’ lets two Bluetooth BR/EDR devices choose
0 Comments
Last year Broadcom, a chipmaker, raised eyebrows when it acquired CA Technologies, an enterprise software company with a broad portfolio of products, including a sizable mainframe software tools business. It paid close to $19 billion for the privilege. Then last week, the company opened up its wallet again and forked over $10.7 billion for Symantec’s
0 Comments
British Airways has come under fire from the security community again, this time after a vulnerability in its e-ticketing system was found to be exposing passenger’s personal information (PII). Security firm Wandera claimed in a blog post yesterday that the airline was sending out unencrypted check-in links to customers which contained booking reference and surname in
0 Comments
by Lisa Vaas Mice can’t vote. They can neither fill in little ovals on ballots nor move voting machine toggles with their itty bitty paws. That’s unfortunate, because the teeny rodents are less inclined than humans to be swayed by the semantics of fake news content in the form of doctored video and audio, according