Security software and services company BlackBerry Limited has announced the launch BlackBerry Advanced Technology Development Labs (BlackBerry Labs), a new business unit operating at the forefront of research and development in the cybersecurity space. The Labs will be led by CTO Charles Eagan and will include a team of over 120 software developers, architects, researchers,
Month: September 2019
Chinese social media and gaming giant Tencent is taking a 29% stake to become the largest shareholder in Oslo-based Funcom. The indie games developer is responsible for multiple adaptations involving the Conan the Barbarian franchise, such as Age of Conan and Conan Exiles, as well as a number of other multiplayer titles — including a
by John E Dunn News for Outlook on the web users who regularly email attachments: Microsoft is about to put another 38 file extensions on its too risky to receive blocklist. Once there – implemented through Outlook’s BlockedFileTypes filter – Outlook for the web recipients will no longer be able to receive attachments using these
A Pakistani hacker who previously made headlines earlier this year for selling almost a billion user records stolen from nearly 45 popular online services has now claimed to have hacked the popular mobile social game company Zynga Inc. With a current market capitalization of over $5 billion, Zynga is one of the world’s most successful
The Delta EcoFlow is a new battery generator available on Kickstarter with incredible claimed features. Most are true, some are not. Device like the Delta offer incredible battery storage capacity. Designed for more than just recharging phones and tablets, these can run refrigerators, pumps, power tools and medical equipment. They’re great for emergencies, camping and
A new piece of spyware, designed to steal sensitive information from users of the messaging app Telegram, is for sale on the black market. Trojan-delivered Masad Stealer and Clipper was clocked by researchers at Juniper Threat Labs. The spyware uses Telegram as a command and control (CnC) channel to cloak itself in a veil of anonymity.
Breach and attack simulation, or BAS, tools help security administrators understand what their infrastructure looks like from an external perspective. Automated attack simulation tools are used to mimic the behavior of someone attempting to break into an organization for malicious purposes. The details of breach attempts are closely monitored, and successful attacks indicate where breach
Hey everyone. This is Week-in-Review, where I give a heavy amount of analysis and/or rambling thoughts on one story while scouring the rest of the hundreds of stories that emerged on TechCrunch this week to surface my favorites for your reading pleasure. Last week, I talked about how streaming networks were undoing their advantages and
by Paul Ducklin Update. Not long after we published this article, Apple announced iOS 13.1.1, fixing yet another bug.See below for the details of which updates came out when. [2019-09-27T18:10Z] Remember the Black Hat conference of 2019? Chances are you didn’t attend – even though it’s a huge event, the vast majority of cybersecurity professionals
Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself reprimanding my kids for doing things that kids do — things I never stopped to teach them otherwise. Like the time I reprimanded my son for not thanking his friend’s mother properly before we left
An iOS hacker and cybersecurity researcher today publicly released what he claimed to be a “permanent unpatchable bootrom exploit,” in other words, an epic jailbreak that works on all iOS devices ranging from iPhone 4s (A5 chip) to iPhone 8 and iPhone X (A11 chip). Dubbed Checkm8, the exploit leverages unpatchable security weaknesses in Apple’s
The right advice at the right time can make all the difference for your company. So this year at Disrupt SF (Oct. 2-4), we’re going to try to help startup founders get an extra level of insight. We’re hosting a set of workshops with experts in fundraising, growth and hiring, where attendees can submit questions
Lawyer, law professor, and civil rights advocate Danielle Keats Citron has been awarded a MacArthur grant for her efforts to address the scourge of cyber-harassment. Citron, a professor at Boston University Law School, is one of 26 individuals this year to receive a so-called genius grant from the John D. and Catherine T. MacArthur Foundation. Citron was awarded $625,000
Active Directory has a number of different components to keep track of user and resource information in an organization…. If one piece starts to fail and a recovery effort falters, it could mean it’s time for a rebuilding process. The system volume (SYSVOL) is a shared folder found on domain controllers in an Active Directory
Hello and welcome back to Startups Weekly, a weekend newsletter that dives into the week’s noteworthy news pertaining to startups and venture capital. Before I jump into today’s topic, let’s catch up a bit. I’ve been on a bit of startup profile kick as of late. Last week, I wrote a little bit about Landline,
by John E Dunn Imagine an Android GIF-making app available on Google Play that automatically charges €214.99 ($253) to continue using it beyond its three-day trial period. Or how about a completely unremarkable QR code reader app, whose developer thinks that a charge of €104.99 is a fair price to continue using it 72 hours
Almost 60% of second-hand hard drives hold leftover data from previous owners, a study shows Have you ever seen a hacker movie? When the other shoe drops, you can see the black hat scrambling for their computer, tearing out their hard drives and trying to erase them. They may even run neodymium magnets over them
Remember the Simjacker vulnerability? Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers. If you can recall, the
At least a dozen people have died of an acute lung condition related to vaping, and while officials aren’t ready to pin it on any one chemical or brand, they are warning that many of the patients reported buying THC cartridges from “informal sources” — which is to say off the street or online. “The
Global consumers overwhelmingly reject government arguments that encryption backdoors will make them safer from terrorists, according to new research from Venafi. The security vendor polled over 4100 consumers in the US, UK, France and Germany to better understand their attitudes to government and social media when it comes to data protection. Law enforcers and governments
DeadHappy, a U.K.-based insurtech startup that wants to offer more flexible life insurance and remove the taboo surrounding death, has raised £4 million in Series A funding. Backing comes from e.ventures, alongside the company’s seed investor Octopus Ventures. Founded in 2017, DeadHappy claims to be the UK’s “first fully digital pay-as-you-go life insurance provider”. It
by Lisa Vaas Did you know that between 2013 and at least mid-2018, between 25% and 30% of profiles on dating site Match.com were reportedly fake? As in, those “people” weren’t looking for love – they were looking to shake down legitimate subscribers, signing up just so they could run romance scams, phish people’s personal
Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried about is running out of battery at the wrong moment. But do these devices actually have a critical vulnerability? Could cutting the cord allow a hacker to take control of your computer?On the latest episode
ESET researchers describe the latest components used in a recent Sednit campaign While summer is usually synonymous with vacations, it seems that the Sednit group has been developing new components to add to the Zebrocy malware family. The Sednit group – also known as APT28, Fancy Bear, Sofacy or STRONTIUM – has been operating since
Malware or computer virus can infect your computer in several different ways, but one of the most common methods of its delivery is through malicious file attachments over emails that execute the malware when you open them. Therefore, to protect its users from malicious scripts and executable, Microsoft is planning to blacklist 38 additional file
Sophia Wood Contributor Sophia Wood is a Principal at Magma Partners, a Latin America-focused seed-stage VC firm with offices in Latin America, Asia, and the U.S. Sophia is also the co-founder of LatAm List, an English language Latin American tech news source. SoftBank did not let up the flow of capital to Brazil this month,
Very few companies are securing the majority of their cloud-native apps with DevSecOps practices, according to new research. According to findings from ESG and Data Theorem, only 8% of companies are securing 75% or more of their cloud-native applications with DevSecOps practices today. However, 68% of companies are expected to be securing 75% (or more) of their cloud-native
A distributed denial of service, or DDoS, attack is a method to bring down a service by sending a flood of legitimate or illegitimate requests from multiple source devices. The goal is to overwhelm the target device so that it can no longer operate normally. Let’s examine two: network layer and application layer DDoS attacks.
As any CFO can attest, corporate finance is extraordinarily complicated. From tax preparation, to financial controls, to cash flow estimation and more, the finance department of any major company often has to turnaround sophisticated analyses with extreme attention to detail — and quick. Most of the time, businesses outsource at least part of those financial
by Danny Bradbury If you’re a WordPress admin using a plug-in called Rich Reviews, you’ll want to uninstall it. Now. The now-defunct plug-in has a major vulnerability that allows malvertisers to infect sites running WordPress and redirect visitors to other sites. Rich Reviews is a WordPress plugin that lets sites manage reviews internally in WordPress,
- 1
- 2
- 3
- …
- 7
- Next Page »