Troubled electric truck maker Nikola adjourned its annual meeting to July 18, giving the company time to lobby shareholders to pass a money-raising measure to issue more shares of common stock. Nikola said the proposal is crucial to support the growth of the business. The company has been slowed in bringing its Tre semi truck
Month: June 2022
Samsung Electronics said Thursday it has kicked off mass production of 3-nanometer chips, becoming the first company to do so globally, as it aims to beat Taiwan Semiconductor Manufacturing Co, or TSMC, the world’s most advanced foundry chipmaker. Samsung said it’s using gate-all-around (GAA) transistor architecture, which allows these first-generation 3-nm chips to have 16%
A man was arrested in Los Angeles yesterday on suspicion of masterminding a multimillion-dollar investment fraud scheme that tricked over 10,000 victims. Neil Chandran, 50, of Las Vegas, was charged with three counts of wire fraud and two counts of engaging in monetary transactions in criminally derived property. He owned several technology companies marketed to
by Paul Ducklin This month’s scheduled Firefox release is out, with the new 102.0 version patching 19 CVE-numbered bugs. Despite the large number of CVEs, the patches don’t include any bugs already being exploited in the wild (known in the jargon as zero-days), and don’t include any bugs labelled Critical. Perhaps the most significant patch
The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022. The finding comes as Harmony confirmed that its Horizon Bridge, a platform that allows users to move cryptocurrency across different blockchains, had
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture European business leadership, especially CISOs, CTOs, and chief data officers (CDOs), are adjusting to the fact that the war in Ukraine is a war in Europe and has global implications. Sanctions, military aid, and even incoming refugees are
Shared micromobility company Bird’s board of directors has appointed Shane Torchiana as president of the company, replacing the company’s CEO and founder Travis VanderZanden. The new roles will begin effective June 29, per a regulatory filing. VanderZanden, who previously served as the chief operating officer (COO) at ride-hailing company Lyft, will stay on as CEO
Three techniques developed by Cisco Talos aim to expose the infrastructure of dark web sites belonging to ransomware operators, a Tuesday blog said. According to the blog post, titled “De-Anonymizing Ransomware Domains on the Dark Web,” the methods are capable of providing additional visibility into dark web sites — a task that is normally challenging
FCC Commissioner Brendan Carr wrote to Apple and Google on Tuesday, requesting the companies to remove TikTok from their app stores for “its pattern of surreptitious data practices.” This comes after BuzzFeed News reported last week that TikTok’s staff in China had access to US-based users’ data up until January. “As you know TikTok is
A leading UK producer of frozen ready meals has revealed its systems are currently down after experiencing a serious cyber-attack. Wiltshire Farm Foods said on Sunday that it is “currently experiencing severe difficulties” with its computer systems. “If you are expecting a delivery this week (w/c 27th June) or have other concerns, please contact your
by Paul Ducklin Sadly, over the years, we’ve needed to write numerous Naked Security warnings about romance scammers and sextortionists. Although those are general-sounding terms, they’ve come to refer to two specific sorts of online crime: Romance scamming. This typically refers to a long-game confidence trick in which cybercriminals court your online friendship under a
Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft’s Service Fabric that could be exploited to obtain elevated permissions and seize control of all nodes in a cluster. The issue, which has been dubbed FabricScape (CVE-2022-30137), could be exploited on containers that are configured to have runtime
Property technology has radically impacted the way we live and travel, but the real estate industry has successfully resisted most attempts to innovate. Prospective homeowners can qualify for mortgages from their mobile phones, but until there are more companies to help them find affordable housing or adequately plan for the largest purchase they’ll ever make,
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe The cybercrime underground is a well-oiled machine worth trillions of dollars annually. On dark web sites hidden from law enforcers and most consumers, cybercriminals buy and sell huge quantities of
Last week I wrote about an AI startup that’s building technology that can alter, in real time, the accent of someone’s speech. But what if the AI goal instead is to make it possible for people speaking in whatever way they do, to be understood just as they are, and to remove some of the
An unidentified hacker group has stolen more than $100m from Californian cryptocurrency firm Harmony. The company made the announcement last Thursday in a Twitter thread, saying they had identified a theft occurring on the Horizon bridge amounting to approximately $100m. “We have begun working with national authorities and forensic specialists to identify the culprit and retrieve the
by Paul Ducklin Another day, another De-Fi (decentralised finance) attack. This time, online smart contract company Harmony, which pitches itself as an “open and fast blockchain”, has been robbed of more than $80,000,000’s worth of Ether cryptocoins. Surprisingly (or unsurprisingly, depending on your point of view), if visit Harmony’s website, you’ll probably end up totally
The internet is a big place. While it’s changed the world for the better — making our daily lives that much easier! — it can also be a playground for cybercriminals who would love to get their hands on our personal information. When this happens, it can result in identity theft. While it can be
A previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said to be in its early stages of development, the malware — dubbed Revive by Italian cybersecurity firm Cleafy — was first observed on June 15, 2022 and distributed by means of phishing campaigns.
Crypto exchange FTX is open to partnering with Robinhood Markets, its CEO Sam Bankman-Fried said in a statement shared with TechCrunch. Bloomberg News reported earlier that people familiar with the matter said FTX was exploring opportunities to acquire Robinhood, but Bankman-Fried denied those claims. “We are excited about Robinhood’s business prospects and potential ways we
Global plastic waste has more than doubled, and 40 percent of that waste comes from packaging. Luckily there are no shortage of sustainable packaging startups in Europe. Just take a look: Circleback (Germany), Recup (Germany), Sourceful (UK), one • five (Germany), Shellworks (UK), Woola (Estonia), Papkot (France), Biotic (Israel), FunCell (France) and Traceless (Germany). The
Rights groups are celebrating after winning a “landmark” legal case against the UK government over its controversial Investigatory Powers Bill. The 2016 law, also known as the Snoopers’ Charter, introduced one of the most draconian surveillance regimes of any Western democracy, despite strong public opposition. Among other things, it required telecoms and internet service providers
The internet makes it easy to get a lot done, but not all of it needs to be public. That’s where incognito mode comes in, letting you hide your search history from others who are using your internet-connected device. For example, imagine searching online for “ideas for a surprise birthday party.” You wouldn’t want the
A week after it emerged that a sophisticated mobile spyware dubbed Hermit was used by the government of Kazakhstan within its borders, Google said it has notified Android users of infected devices. Additionally, necessary changes have been implemented in Google Play Protect — Android’s built-in malware defense service — to protect all users, Benoit Sevens
Despite all the controversy surrounding the crypto world, one obvious bright spot of blockchain technology has been its ability to support creators and artists in monetizing their work. Rapper and visual artist Latashá, our guest on the latest episode of the Chain Reaction podcast, is a living embodiment of web3’s potential to support independent artists.
Secure software development is often interpreted as secure coding practices, such as using code that properly validates input and handles errors. While those are important, there are many other secure software development practices to also follow. NIST’s Secure Software Development Framework (SSDF) version 1.1 is a technology-neutral set of secure software development practices based on
Welcome back to Chain Reaction. Last week, we talked about infinite pessimism in the crypto markets. This week, we’re talking about parties and tattoos and booze and fun. If you want to get this in your inbox every Thursday, you can subscribe on TechCrunch’s newsletter page. Exit opportunity It’s no secret at this point that
The second day of InfoSecurity Europe 2022 saw Geoff White, investigative journalist and author of Penguin Books’ The Lazarus Heist, discuss how government-sponsored cyber-attackers increasingly interact with organized crime gangs, operating seamlessly on a global scale. White also touched upon the emerging world of cryptocurrency theft. In illuminating the increasing connection between cybersecurity and geopolitical
In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix, anyone?), informed, and productive. But it’s important to keep your online activities private and safe, whether you’re checking social media, using a streaming service, or banking online. With the right solutions, you can have a
In cybersecurity, many of the best jobs involve working on government projects. To get a security clearance, you need to prove that you meet NIST standards. Cybersecurity firms are particularly interested in people who understand the RMF, or Risk Management Framework — a U.S. government guideline for taking care of data. The NIST Cybersecurity &
- 1
- 2
- 3
- …
- 7
- Next Page »