Thousands of electric vehicle charging stations will be built around the country over the next decade. ChargerHelp!, founded in January 2020 by Kameale C. Terry and Evette Ellis, wants to make sure they stay up and running. The idea for the on-demand repair app for EV charging stations came to Terry when she was working
Month: May 2021
In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we make equal attention, and we take mental shortcuts known as biases. These biases allow us to react quickly, but they can also lead to mistakes and oversights. Because we all have biases that shape who
There are more than 400 million Arabic speakers globally and that number isn’t slowing down anytime soon. Arabic, to most people, is a tough language even to those who speak it. According to Duolingo, someone fluent in Egyptian Arabic might not fully understand Yemeni Arabic speakers because of the vast difference in dialect. While individuals
Microsoft on Thursday disclosed that the threat actor behind the SolarWinds supply chain hack returned to the threat landscape to target government agencies, think tanks, consultants, and non-governmental organizations located across 24 countries, including the U.S. “This wave of attacks targeted approximately 3,000 email accounts at more than 150 different organizations,” Tom Burt, Microsoft’s Corporate
American multinational technology company Microsoft says that the threat group behind the Microsoft and SolarWinds hack has launched a massive new phishing campaign targeting government agencies, NGOs and think tanks. Last year, an advanced persistent threat (APT) group exploited vulnerabilities in Microsoft and SolarWinds programs to carry out a supply-chain attack that trojanized SolarWinds’ Orion business software
Delhivery, India’s largest independent e-commerce logistics startup, has raised $277 million in what is expected to be the final funding round before the firm files for an IPO later this year. In a regulatory filing, the Gurgaon-headquartered startup disclosed it had raised $277 million in a round led by Boston-headquartered investment firm Fidelity. Singapore’s sovereign
BYOD sets up a huge productivity improvement for workers and a huge challenge for IT staff. IT departments need to secure business applications and data on personal mobile devices without affecting personal data. They also must deploy devices, patches and updates and account for lost devices. Apple’s introduction of the iPhone in 2007 caused a
As people turn to the Internet for news and answers to tough questions, it only makes sense that it would come to know you better than your closest friends and family. When we go online for answers to personal questions, we’re sharing our deepest secrets with search engines. While some people are happy to share that level of
Welcome back to The TechCrunch Exchange, a weekly startups-and-markets newsletter. It’s broadly based on the daily column that appears on Extra Crunch, but free, and made for your weekend reading. Want it in your inbox every Saturday? Sign up here. Ready? Let’s talk money, startups and spicy IPO rumors. Hello from Friday, I presume that
Cybersecurity researchers have disclosed two new attack techniques on certified PDF documents that could potentially enable an attacker to alter a document’s visible content by displaying malicious content over the certified content without invalidating its signature. “The attack idea exploits the flexibility of PDF certification, which allows signing or adding annotations to certified documents under
A scammer who defrauded elderly American computer users by tricking them into believing that their computers had suffered a cyber-attack will be spending the next three years in federal prison. Himanshu Asri, of Delhi, India, took part in a five-year telemarketing scheme that conned around 2,000 computer users, most of whom were seniors. The 34-year-old
A venture capitalist once told me candidly that whenever you see the phrase “democratization” in tech marketing material, think of it as a red flag. Democracy, generally speaking, often comes with an ironic caveat: It disproportionately benefits white and male participants. Now, you know me well enough to know that I wouldn’t start off your
Digital transformation is creating a wealth of STEM jobs faster than they can be filled by qualified professionals. Cybersecurity has been disproportionately affected by the workforce shortage, with an estimated 3.5 million open positions globally, according to Cybersecurity Ventures. Among the strategies proposed to combat this issue include hiring people from diverse, nontraditional backgrounds and
Believe it or not, the baby turns 3 today! And like with every three-year-old, there is a lot to watch out for. Granted, when GDPR was born it was after a 2-year gestation (transition) period. What followed were many sleepless nights with the new baby when it was born on May 25, 2018; not to
Wejo, the connected vehicle data startup backed by GM and Palantir, plans to go public through a merger with special purpose acquisition company Virtuoso Acquisition Corp. The agreement, announced in a regulator filing Friday, will give the combined company an enterprise valuation of $800 million, which includes debt. The deal raises $330 million in proceeds
by Paul Ducklin Apple’s AirTag product has been hacked twice since its recent launch, in a pair of fascinating and informative stories that give you some great insights into how cybersecurity researchers think. The good news is that you don’t need to ditch your AirTags if you already splashed out and bought some – these
Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux systems. The malware dropper has been dubbed “Facefish” by Qihoo 360 NETLAB team owing its capabilities to deliver different rootkits at different times and the use of Blowfish cipher to encrypt communications to
The United States Federal Bureau of Investigation issued a flash warning Thursday over the exploitation of Fortinet vulnerabilities by advanced persistent threat (APT) groups. According to the FBI, an APT actor group has “almost certainly” been exploiting a FortiGate appliance since at least May 2021 to access a web server hosting the domain for a US municipal
Patches to remedy the vulnerabilities should be released over the coming weeks Cybercriminals could exploit several vulnerabilities in Bluetooth to carry out impersonation attacks and masquerade as a legitimate device during the pairing process, according to the Bluetooth Special Interest Group (SIG). The security flaws, which affect the Bluetooth Core and Mesh Profile specifications, were discovered by researchers
As AI has grown from a menagerie of research projects to include a handful of titanic, industry-powering models like GPT-3, there is a need for the sector to evolve — or so thinks Dario Amodei, former VP of research at OpenAI, who struck out on his own to create a new company a few months
May 2021 has been an extraordinary month in the cybersecurity world, with the DoD releasing its DoD Zero Trust Reference Architecture (DoDZTRA), the Colonial Pipeline being hit with a ransomware attack, and the White House releasing its Executive Order on Improving the Nation’s Cybersecurity (EO). Add to that several major vendors that our government depends
Fintech and proptech are two sectors that are seeing exploding growth in Latin America, as financial services and real estate are two categories in particular dire need of innovation in a region. Brazil’s QuintoAndar, which has developed a real estate marketplace focused on rentals and sales, has seen impressive growth in recent years. And today,
by Paul Ducklin It’s all over the news! Apple’s brand new Mac has a security hole, right inside the processor itself! The official name for the bug is CVE-2021-30747, but the developer who discovered it prefers to call it M1RACLES, all in caps. Like every BWAIN (our own impressive name for bugs with impressive names,
Cybersecurity researchers on Wednesday publicized the disruption of a “clever” malvertising network targeting AnyDesk that delivered a weaponized installer of the remote desktop software via rogue Google ads that appeared in the search engine results pages. The campaign, which is believed to have begun as early as April 21, 2021, involves a malicious file that
A hacker who launched a long-running cyber-attack against a New Hampshire police department has been sent to prison for a year and a day. Wayne Kenney Jr. broke into the computer systems of the Farnum Center, the Auburn Police Department (APD) and several department employees in 2015 after receiving a suspended sentence for heroin possession.
Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack Just how easy is it to conduct a SIM swap attack and what can the attacker do once they have taken control
Tokyo-based ispace has been selected to deliver rovers from Canada and Japan to the lunar surface after they launch aboard SpaceX rockets. The company will use its recently revealed Hakuto-R lander for both missions, currently scheduled for 2022 and 2023. The Canadian Space Agency selected three private Canadian companies, each with separate scientific missions, to
Google researchers have uncovered a new variation on the Rowhammer hardware attack that allows an adversary to flip transistor states from further distances than previously thought possible. The new take on Rowhammer, dubbed “Half-Double,” shows how the attacker can turn a targeted transistor to an on or off state by repeatedly flipping transistors one and
The security industry is engulfed in the most asymmetric cyberwarfare we have ever seen. The outcome of an Attacker’s mission may depend entirely upon a single misplaced charge on a single memory chip on a single server, perhaps the difference between a vulnerable and secure setting in a registry key, and the difference between success
French startup Agicap has raised a new $100 million funding round led by Greenoaks. With today’s funding round, the company has reached a valuation of more than $500 million (€415 million). Agicap is building a service that lets you track your cash flow in real time, build reports and get forecasts. In addition to Greenoaks,
- 1
- 2
- 3
- …
- 8
- Next Page »