Kepler Communications, the Toronto-based startup that’s focused on developing and deploying shoebox-sized satellites to provide telecommunications services, is opening up registration for those interested in getting their first developer kits. These developer kits, designed to help potential commercial customers take advantage of its Internet of Things (IoT) narrowband connectivity deploying next year, will then be
Month: October 2019
Building a threat hunting team requires finding people who are prepared to be inquisitive of data, are keen to be the first to find a threat and having the right culture for them to work in. Speaking at Bsides Belfast 2019, Martin Lee, outreach manager and Technical Lead at Cisco Talos, said that the team at
by John E Dunn Mirror, mirror on the wall, which is the worst side-channel vulnerability of them all? For a while it was Meltdown and Spectre, the two biggies that kicked off the era of microprocessor security worry in early 2018, followed some months later by another contender, PortSmash. In May this year, news emerged
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!” Just so you know, I’ve been there, done that, and got the T-shirt. And I survived. My kids were the first generation to grow up on social media. Like most teens in the mid-2000s, they
Is the world as we know it ready for the real impact of deepfakes? Deepfakes are rapidly becoming easier and quicker to create and they’re opening a door into a new form of cybercrime. Although the fake videos are still mostly seen as relatively harmful or even humorous, this craze could take a more sinister
Another day, another massive data breach—this time affecting a leading web technology company, as well as both of its subsidiaries, from where millions of customers around the world have purchased domain names for their websites. The world’s top domain registrars Web.com, Network Solutions, and Register.com disclosed a security breach that may have resulted in the
Berlin-based femtech startup Inne is coming out of stealth to announce an €8 million (~$8.8M) Series A and give the first glimpse of a hormone-tracking subscription product for fertility-tracking and natural contraception that’s slated for launch in Q1 next year. The Series A is led by led by Blossom Capital, with early Inne backer Monkfish
The online grocery wars continue. Amazon this week just made grocery delivery free, so Walmart is now touting how its grocery service offers the booze. The retailer today announced a new milestone in terms of giving its customers the ability to shop for alcohol online, noting that over 2,000 Walmart locations across 29 states will
Internet of Things (IoT) devices can still be a serious security threat even when they are off network. Speaking on day three of the (ISC)² Security Congress in Orlando, Florida, 802 Secure CSO Michael Raggo shared research that demonstrated the risks posed by everyday IoT devices. In his talk titled “Cyber Physical Security: Addressing IoT Risks,” Raggo
by John E Dunn If you own an Apple iPhone 5, iPhone 4s or one of the early iPads with cellular connectivity, your device is about to be turned into a vintage technology paperweight by the GPS rollover problem that we wrote about in April. Before we explain why, we should say it is possible
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection strategies, we have recently discovered an interesting approach to detect a targeted attack and the related actor(s). Quite surprisingly, a big part of the solution already exists in
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here’s what your organization should focus on instead When we hear about breaches, we assume that attackers used some never-before-seen, zero-day exploit to breach our defenses. This situation is normally far from the truth. While
Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users. Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted
A lawsuit filed a by former Juul executive alleges that the company knew a batch of contaminated e-liquid had been used in about one million pods shipped to retailers earlier this year, but did not inform customers. The lawsuit, first reported by BuzzFeed, was brought by Siddharth Breja, former senior vice president of global finance
It’s a year since the European Commission got a bunch of adtech giants together to spill ink on a voluntary Code of Practice to do something — albeit, nothing very quantifiable — as a first step to stop the spread of disinformation online. Its latest report card on this voluntary effort sums to the platforms
Attacks on integrity using AI and deepfakes, deployment of anti-surveillance technology and govermment interest in cybersecurity issues will be the main changes to the security industry next year, according to Forrester. The analyst firm’s 2020 predictions claimed that “integrity attacks” such as deepfakes will go on to “cost businesses over a quarter of a billion
Cybersecurity is perhaps the single greatest threat to any organization today. While hardly a new challenge, the proliferation of systems, data, cloud technologies, apps, devices and distributed endpoints has only exacerbated cybersecurity threats. Organizations must work harder than ever to safeguard their assets and customers. This goes beyond automating reactive measures. It now requires infosec
by Paul Ducklin If you’ve been following trendy news sites over the past week, you’ve probably heard of a new – or at least a newly popular – app called Gradient. Gradient pitches itself as “the next big thing in the world of mobile photo editing”, heavily promoting a new feature that supposedly lets you:
Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month has brought a variety of spooky cyberthreats that haunt our networks and devices. From malicious malware to restricting ransomware, October has had its fair share of cyber-scares. Let’s take a look at what ghoulish threats
As Japan gears up for the upcoming 2020 Summer Olympics in Tokyo for the next year, the country needs to brace itself for sophisticated cyberattacks, especially from state-sponsored hackers. Microsoft has issued a short notice, warning about a new wave of highly targeted cyberattacks by a group of Russian state-sponsored hackers attempting to hack over
ByteDance has responded to a report in the Financial Times that said the Chinese Internet startup plans to go public in Hong Kong as early as the first quarter of next year. “There is absolutely zero truth to the rumors that we plan to list in Hong Kong in Q1,” said a spokesperson for the
Denny’s signed an agreement with the plant based food manufacturer, Beyond Meat, to use Beyond’s meat replacement in a new menu item — the Denny’s Beyond Burger. Beyond Meat and its largest rival, Impossible Foods, are engaged in a fierce competition to provide meat alternatives to some of the nation’s largest food companies, but increasingly
Speaking on the opening day of the ninth annual (ISC)² conference in Orlando, Florida, cyber-risk strategist Chris Veltsos said that CISOs need to change their mindset when it comes to communication. Veltsos, aka Dr.InfoSec, said CISOs are bamboozling boards with “techno babble” and failing to explain in real terms what could happen to a business
by Danny Bradbury Johannesburg spent the weekend struggling to recover from its second cyberattack this year as it took key services systems offline. The city first alerted users of the attack via Twitter on Thursday 24 October: The City has detected a network breach in its systems ^TK https://t.co/r43iiJiUya — City of Joburg (@CityofJoburgZA) October
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention 10.5.3+. Expert Rules provide additional parameters and allow much more flexibility than the custom rules that can be created in the Access Protection policy. It also allows system administration to control / monitor an endpoint system
Mobile carriers in the United States will finally offer a universal cross-carrier communication standard for the next-generation RCS messaging service that is meant to replace SMS and has the potential to change the way consumers interact with brands for years to come. All major United States mobile phone carriers, including AT&T, Verizon, T-Mobile, and Sprint, have
French startup Welcome to the Jungle has raised a new $22.3 million funding round (€20 million). The startup is both a media company and a tech startup that wants to empower tech companies when it comes to recruitment. It doesn’t find the right candidate for you, it helps you get exposure, track application and facilitate
Weave, a developer of patient communications software focused on the dental and optometry market, was the first Utah-headquartered company to graduate from Y Combinator in 2014. Now, it’s poised to enter a small but growing class startups in the ‘Silicon Slopes’ to garner ‘unicorn’ status. The business announced a $70 million Series D last week
An app used by drivers to cut the cost of fuel has suffered a data breach that allowed users to view the personal information of other customers. Names, email addresses, cell phone numbers, and dates of birth were exposed following the breach of the 7-Eleven fuel app, which occurred on Thursday. The app, which has been downloaded
by Danny Bradbury If you don’t believe that you could ever fall victim to a social engineering attack, take heed. Last week, a mobile healthcare application vendor reportedly fell victim to a scam that saw criminals send fraudulent mails to everyone in a director’s account. Online criminals launched a cyberattack on healthcare app company Evergreen
- 1
- 2
- 3
- …
- 8
- Next Page »