Month: August 2019

0 Comments
President Donald Trump and the Office of the U.S. Trade Representative have issued technology companies some temporary tariff relief. Citing an unwillingness to hit consumers with higher prices on things like computers, mobile phones, laptops, video game consoles, computer monitors, clothes and shoes before the holidays, the President and his trade reps are holding off
0 Comments
After welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming? I’m building a homebuilt experimental airplane. Yes, I plan to fly in it. Don’t be afraid, lots of others are too, and this segment of inventors could easily prove a valuable
0 Comments
If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. It has been disclosed that the Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the previously-fixed ‘BlueKeep‘ vulnerability. Discovered by Microsoft’s security
0 Comments
by Paul Ducklin Well-known device hacking researchers at cybersecurity company Pen Test Partners have just published an article summarising the 4G hotspot hacking research they presented at last week’s DEF CON event. Simply put, a 4G hotspot is a miniaturised, battery-powered, SIM-card-equipped equivalent to your home router. Home routers typically plug into a mains adapter
0 Comments
Porsche is upping its plug-in hybrid game with several new vehicles added to its lineup, including a power-packing 2020 Cayenne Turbo S E-Hybrid. The plug-in version of this flagship SUV combines a 14.1-kilowatt-hour battery and 134-horsepower electric motor with a 4.0-liter twin turbocharged V8 engine found in the traditional gas-powered Cayenne Turbo. The electric motor
0 Comments
McAfee has announced the acquisition of cloud security start-up NanoSec in a move designed to help reduce container-related risk for its customers and accelerate DevSecOps. Cupertino-based NanoSec is described as a pioneer in simplifying app workload protection, with a zero-trust offering that works across multiple computing and containerized environments irrespective of the underlying infrastructure. The
0 Comments
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. We recently investigated an industrial control system (ICS) produced by Delta Controls. The product, called “enteliBUS Manager”, is used for several applications, including building management. Our research
0 Comments
The competition for control of the burgeoning market for burger replacements (and other alternatives to animal proteins) continues to heat up. Beyond Meat and Impossible Foods the two leading contenders for top purveyor of plant-based patties (and other formulations) have spent most of the typically sleepy summer months jockeying for the position as top supplier
0 Comments
One of the scarier notions in the world today is the prospect of American voting machines being compromised at scale: voters thrown off rolls, votes disregarded, vote tallies edited, entire elections hacked. That’s why the nation’s lawmakers and civil servants flocked (relatively speaking) to Def Con in Las Vegas this week, where hackers at its
0 Comments
by Lisa Vaas A “preferred Facebook Marketing Partner” has secretly tracked millions of Instagram users’ locations and stories, Business Insider reported on Wednesday. Facebook has confirmed that San Francisco-based marketing firm HYP3R scraped huge quantities of data from Instagram in order to build detailed user profiles. Profiles that included users’ physical whereabouts, their bios, their
0 Comments
If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any “.desktop” or “.directory” file for a while. A cybersecurity researcher has disclosed an unpatched zero-day vulnerability in the KDE software framework that could allow maliciously crafted .desktop and .directory files to silently
0 Comments
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to order the others around. This tendency towards centralized authority is not without reason, however – it is often more efficient to have one person, or thing, calling the shots. For an example of the latter,
0 Comments
ESET researchers document malware-distributing spam campaigns targeting people in France In May 2019, ESET researchers observed a spike in ESET telemetry data regarding malware targeting France. After further investigations, we identified malware that distributes various types of spam. One of them is leading to a survey that redirects to a dodgy smartphone promotion while the