admin

0 Comments
The state of Texas has come under fire from a coordinated ransomware attack affecting over 20 local authorities. The Texas Department of Information Resources (DIR) released an updated statement over the weekend detailing its response to the attacks, which occurred on Friday morning local time. Some 23 local government agencies were hit by the attacks
0 Comments
It’s official: 1.5% of web logins use breached credentials, according to research published by Google. The company analyzed its own data to reach that number, which it presented at the USENIX conference this week. Many websites still rely on only a combination of username and password to grant users access. Large data breaches have leaked billions
0 Comments
Developers often see security as a drag on software projects, both in terms of time and budget. Time is a particularly critical component in modern continuous development practices, so adding security into DevOps can cause friction if not done well. One of the biggest hurdles is integrating security testing tools into the pipeline that can
0 Comments
The UK Information Commissioner’s Office (ICO) has launched an investigation into the use of facial recognition technology in London’s King’s Cross. The announcement followed news of the technology’s use at Granary Square, a large, private development in the area. Granary Square is a 67-acre development comprising 50 buildings. Press reports detailing the use of facial
0 Comments
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions
0 Comments
It’s true, you’ve got the Galaxy Note to thank for your big phone. When the device hit the scene at IFA 2011, large screens were still a punchline. That same year, Steve Jobs famously joked about phones with screens larger than four inches, telling a crowd of reporters, “nobody’s going to buy that.” In 2019,
0 Comments
Does true Artificial Intelligence even exist yet? Will it ever exist or will it end the world before we reach its full capacity? The hype around Artificial Intelligence (AI) is currently a media frenzy and if we aren’t careful, we will ruin the name before it has had a chance to really prove itself due
0 Comments
A leading open source project has come under fire for issuing misleading security advisories which may have put customers of its software at unnecessary risk. Security vendor Synopsys analyzed 115 separate releases for popular web application framework Apache Struts and matched them up against the relevant advisories from the open source project. In total, 24
0 Comments
Chinese mobile-phone and device maker Transsion is teaming up with Kenya’s Wapi Capital to source and fund early-stage African fintech startups. Headquartered in Shenzhen, Transsion is a top-seller of smartphones in Africa that recently confirmed its imminent IPO. Wapi Capital is the venture fund of Kenyan fintech startup Wapi Pay—a Nairobi based company that facilitates digital
0 Comments
Unlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10 Microsoft issued fixes for four critical vulnerabilities in Remote Desktop Services (RDS) this week, likening two of them to ‘BlueKeep’, another critical flaw in the same Windows component. All four Remote Code Execution (RCE) flaws – tracked as CVE‑2019‑1181, CVE‑2019‑1182, CVE‑2019‑1222 and
0 Comments
Botnets continue to be one of the most prevalent and dangerous forms of malware organizations contend with. That’s in part because botnets tend to target devices that can’t be patched or updated and yet fill a critical function inside an organization. For example, industrial IoT devices can be responsible for monitoring and managing critical systems
0 Comments
by Danny Bradbury Microsoft’s Patch Tuesday bought some very bad news yesterday: more wormable RDP vulnerabilities, this time affecting Windows 10 users. CVE-2019-1181 and -1182 are critical vulnerabilities in Remote Desktop Services (formerly Windows Terminal) that are wormable – similar to the BlueKeep vulnerability that people have already created exploits for. Wormable means that the