Month: September 2019

Security software and services company BlackBerry Limited has announced the launch BlackBerry Advanced Technology Development Labs (BlackBerry Labs), a new business unit operating at the forefront of research and development in the cybersecurity space. The Labs will be led by CTO Charles Eagan and will include a team of over 120 software developers, architects, researchers,
by John E Dunn News for Outlook on the web users who regularly email attachments: Microsoft is about to put another 38 file extensions on its too risky to receive blocklist. Once there – implemented through Outlook’s BlockedFileTypes filter – Outlook for the web recipients will no longer be able to receive attachments using these
The Delta EcoFlow is a new battery generator available on Kickstarter with incredible claimed features. Most are true, some are not. Device like the Delta offer incredible battery storage capacity. Designed for more than just recharging phones and tablets, these can run refrigerators, pumps, power tools and medical equipment. They’re great for emergencies, camping and
Breach and attack simulation, or BAS, tools help security administrators understand what their infrastructure looks like from an external perspective. Automated attack simulation tools are used to mimic the behavior of someone attempting to break into an organization for malicious purposes. The details of breach attempts are closely monitored, and successful attacks indicate where breach
An iOS hacker and cybersecurity researcher today publicly released what he claimed to be a “permanent unpatchable bootrom exploit,” in other words, an epic jailbreak that works on all iOS devices ranging from iPhone 4s (A5 chip) to iPhone 8 and iPhone X (A11 chip). Dubbed Checkm8, the exploit leverages unpatchable security weaknesses in Apple’s
Lawyer, law professor, and civil rights advocate Danielle Keats Citron has been awarded a MacArthur grant for her efforts to address the scourge of cyber-harassment.  Citron, a professor at Boston University Law School, is one of 26 individuals this year to receive a so-called genius grant from the John D. and Catherine T. MacArthur Foundation. Citron was awarded $625,000
Active Directory has a number of different components to keep track of user and resource information in an organization…. If one piece starts to fail and a recovery effort falters, it could mean it’s time for a rebuilding process. The system volume (SYSVOL) is a shared folder found on domain controllers in an Active Directory
Global consumers overwhelmingly reject government arguments that encryption backdoors will make them safer from terrorists, according to new research from Venafi. The security vendor polled over 4100 consumers in the US, UK, France and Germany to better understand their attitudes to government and social media when it comes to data protection. Law enforcers and governments
DeadHappy, a U.K.-based insurtech startup that wants to offer more flexible life insurance and remove the taboo surrounding death, has raised £4 million in Series A funding. Backing comes from e.ventures, alongside the company’s seed investor Octopus Ventures. Founded in 2017, DeadHappy claims to be the UK’s “first fully digital pay-as-you-go life insurance provider”. It
ESET researchers describe the latest components used in a recent Sednit campaign While summer is usually synonymous with vacations, it seems that the Sednit group has been developing new components to add to the Zebrocy malware family. The Sednit group – also known as APT28, Fancy Bear, Sofacy or STRONTIUM – has been operating since
Very few companies are securing the majority of their cloud-native apps with DevSecOps practices, according to new research. According to findings from ESG and Data Theorem, only 8% of companies are securing 75% or more of their cloud-native applications with DevSecOps practices today. However, 68% of companies are expected to be securing 75% (or more) of their cloud-native
As any CFO can attest, corporate finance is extraordinarily complicated. From tax preparation, to financial controls, to cash flow estimation and more, the finance department of any major company often has to turnaround sophisticated analyses with extreme attention to detail — and quick. Most of the time, businesses outsource at least part of those financial