On June 1, 2022, the TechCrunch Live crew is hosting an extended TechCrunch Live episode with Columbus investors, founders and business leaders. There’s even a pitch-off with Columbus-area startups. Register for the virtual event here for free! Why Columbus? Because it’s quickly becoming a major startup scene in the Midwest, especially in the areas of
Month: May 2022
Anonymous-affiliated collective Spid3r claims to have attacked Belarus’ government websites in retaliation for the country’s alleged support of Russia’s invasion of Ukraine. The group made the announcement on Twitter, publishing screenshots of various websites connected with the Belarus state being down, including the Ministry of Communications, the Ministry of Justice and the Ministry of Economy. In
by Paul Ducklin The internet is abuzz with news of a zero-day remote code execution bug in Microsoft Office. More precisely, perhaps, it’s a code execution security hole hole that can be exploited by way of Office files, though for all we know there may be other ways to trigger or abuse this vulnerability. Security
It’s no secret that 3rd party apps can boost productivity, enable remote and hybrid work and are overall, essential in building and scaling a company’s work processes. An innocuous process much like clicking on an attachment was in the earlier days of email, people don’t think twice when connecting an app they need with their
HitPay has almost everything SMEs need to run their businesses. In addition to being an online payment gateway, it also offers tools like point-of-sale software with card readers, plugins, payment links and no-code online stores. The Y Combinator alum announced today that it has raised $15.75 million in Series A funding led by Tiger Global,
Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news Manipulation, propaganda, lies and half-truths that even drive a wedge between relatives on either side of the Russia-Ukraine border – a war on truth is playing out on the digital front
Strong Compute, a Sydney, Australia-based startup that helps developers remove the bottlenecks in their machine learning training pipelines, today announced that it has raised a $7.8 million seed round. The round includes a total of 30 funds and angels, including the likes of Sequoia Capital India, Blackbird, Folklore and Skip Capital, as well as Y
Twitter is in the hot seat again for violating users’ privacy by misusing personal data that was submitted for security purposes. Three years ago, Twitter admitted that personal information provided by users for two-factor authentication (2FA) purposes was “inadvertently” used in targeted advertisements. Now, it might be paying the penalty. The Department of Justice (DOJ)
A group of hackers from Russia could be behind the leak of a list of emails between former director of MI6 Sir Richard Dearlove, Gisela Stuart, Robert Tombs, and other political figures within Theresa May’s government between August 2018 and July 2019. According to an investigation by Reuters, the cache of intercepted emails contained alternative
Four high severity vulnerabilities have been disclosed in a framework used by pre-installed Android System apps with millions of downloads. The issues, now fixed by its Israeli developer MCE Systems, could have potentially allowed threat actors to stage remote and local attacks or be abused as vectors to obtain sensitive information by taking advantage of
Indonesia’s sprawling archipelago has long been a headache for logistics companies, but there’s no lack of brave challengers. Jarkata-based Astro, which provides 15-minute grocery delivery, has recently closed a $60 million Series B financing round, lifting its total funding to $90 million since the business launched just nine months ago. The Series B round was
All is not well in smartphone land. The industry was headed for a slowdown well before SARS-CoV-2 entered the picture. The glory days of expanding markets and bi-annual upgrades are seemingly at an end, and things have only been exacerbated by two years of financial hardships and supply chain constraints. For all these reasons, it’s
Twitter has agreed to pay a $150m fine to settle a federal privacy suit over privacy data violations. The row saw the social company reportedly collecting phone numbers and email addresses for account security measures and then using the information for advertising purposes without letting users know. “This practice affected more than 140 million Twitter
New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience Governments around the world are concerned about growing risks of cyberattacks against their critical infrastructure. Recently, the cybersecurity agencies of the countries comprising the ‘Five Eyes’ alliance warned of a possible rise in such attacks “as a response
A 37-year-old man from New York has been sentenced to four years in prison for buying stolen credit card information and working in cahoots with a cybercrime cartel known as the Infraud Organization. John Telusma, who went by the alias “Peterelliot,” pleaded guilty to one count of racketeering conspiracy on October 13, 2021. He joined
ZeroAvia has raised $115 million from United Airlines, Alaska Airlines, British Airways and Amazon on a promise to fly a zero-emission hydrogen fuel cell regional passenger plane as soon as next year. Now the startup has set itself a slightly less high-flying goal: building a hybrid aircraft. This new experimental plane, which is under construction
Sequoia takes things seriously. The storied venture firm is known to react to macroeconomic events with grand memos aimed at portfolio companies and sometimes the entrepreneurship scene at large. Most recently, Sequoia created a 52-slide deck, first reported by The Information, titled “Adapting to Endure.” The document reads like a follow-up course to its infamously ill-timed
As with everything digital, there’s someone, somewhere devising a method to steal the assets away from their rightful owners Are you an NFT investor? If so, watch out, there’s a scammer about! As with everything digital, there’s someone, somewhere devising a method to steal these assets away from their rightful owner. Watch the video to
The Cybersecurity and Infrastructure Security Agency (CISA) has published a new five-step 5G Security Evaluation Process to help companies improve their security posture before deploying new 5G applications. More specifically, the new guidelines include information about relevant threat frameworks, 5G system security standards, industry security specifications, federal security guidance documents and methodologies to conduct cybersecurity
by Paul Ducklin LISTEN NOW Click-and-drag on the soundwaves below to skip to any point. You can also listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. Listen on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher and anywhere that good podcasts are found.Or simply drop the URL
Details have emerged about a recently patched critical remote code execution vulnerability in the V8 JavaScript and WebAssembly engine used in Google Chrome and Chromium-based browsers. The issue relates to a case of use-after-free in the instruction optimization component, successful exploitation of which could “allow an attacker to execute arbitrary code in the context of
To get a roundup of TechCrunch’s biggest and most important stories delivered to your inbox every day at 3 p.m. PDT, subscribe here. Happy Friday, Crunchers! It’s 27 May 2022, and we are slinking into a long weekend because it’s Memorial Day weekend here in the U.S. There’s no newsletter on Monday — Haje is
Manish Maheshwari, the former head of Twitter India, is leaving the startup he co-founded just six months ago following disagreements with co-founder and investors. “I am moving out of Invact to first take a break for a few months and then pursue new opportunities. It is heartbreaking for a founder to leave the startup, like
Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution As Unified Extensible Firmware Interface (UEFI) replaced legacy BIOS as the leading technology embedded into chips of modern computers and devices, it became vital to the security of the
Limited and fragmented ransomware reporting has a negative impact on national security, according to a U.S. Senate report. The report by the Committee on Homeland Security & Governmental Affairs this week noted how “fragmented and incomplete” reporting of ransomware attacks by victims has created a flawed picture of the threat landscape and has put federal
Pro-consumer website Comparitech has released a new report exploring legislation about child data collection in the world’s top 50 countries by gross domestic product (GDP). The document assessed 23 different aspects of these policies to assess whether specific legislation was in place for children’s online data or not. Aspects examined included requirements for privacy policies,
by Paul Ducklin We’ve often warned about the risks of browser extensions – not just for Chrome, but for any browser out there. That’s because browser extensions aren’t subject to the same strict controls as the content of web pages you download, otherwise they wouldn’t be extensions… …they’d basically just be locally-cached web pages. An
Quanta Cloud Technology (QCT) servers have been identified as vulnerable to the severe “Pantsdown” Baseboard Management Controller (BMC) flaw, according to new research published today. “An attacker running code on a vulnerable QCT server would be able to ‘hop’ from the server host to the BMC and move their attacks to the server management network,
Substack, the five-year-old newsletter platform that has aggressively positioned itself as a disruptive force in media, has abandoned efforts to raise a Series C round, the New York Times is reporting today. According to its sources, Substack held discussions with potential investors in recent months about raising $75 million to $100 million at a valuation
It’s a common problem among the superwealthy. Sure they can buy fancy clothes, jewelry and fast cars, but at the end of the day, they’re stuck using the same boring gadgets as the rest of us. How can they possibly extend their expensive and flashy taste to consumer electronics? Fortunately, from the bedazzled Nokias of
- 1
- 2
- 3
- …
- 7
- Next Page »