Philip Choo

0 Comments
News of the world’s first ever gene-edited human babies being born in China caused a huge stir on Monday after the MIT Technology Review and the Associated Press brought the project to light. People in and outside China rushed to question the ethical implications of the scientific breakthrough, reportedly the fruit of a Chinese researcher named He Jiankui from a university
0 Comments
Facebook founder Mark Zuckerberg may yet regret underestimating a UK parliamentary committee that’s been investigating the democracy-denting impact of online disinformation for the best part of this year — and whose repeat requests for facetime he’s just as repeatedly snubbed. In the latest high gear change, reported in yesterday’s Observer, the committee has used parliamentary powers
0 Comments
In a statement issued today, Logitech International said that while it had engaged in discussions with Plantronics about a potential transaction, it had terminated the negotiations. Over the weekend we picked up a Reuters report that the two companies were in talks for a potential $2.2 billion merger. The company declined to comment further.
0 Comments
Researchers at Qihoo 360 Netlab discovered hackers using vulnerable MikroTik routers to hijack TaZmen Sniffer Protocol traffic and send it to domains under their control. What is TZSP traffic and how are attackers gaining control of routers with this MikroTik router hack? The TaZmen Sniffer Protocol (TZSP) is an open protocol designed to encapsulate other
0 Comments
LinkedIn, the social network for the working world with close to 600 million users, has been called out a number of times for how it is able to suggest uncanny connections to you, when it’s not even clear how or why LinkedIn would know enough to make those suggestions in the first place. Now, a run-in
0 Comments
Nine out of 10 UK retailers are failing to boost customers’ log-in security with two-factor authentication (2FA), according to new research from LastPass. The LogMeIn company used the Black Friday shopping period this weekend to raise awareness about the continued security failings of many online retailers. Only Amazon passed the 2FA test among the top shopping
0 Comments
The advanced persistent threat (APT) group GreyEnergy has been targeting industrial networks across Ukraine and Eastern Europe for years, and according to analysis of the group’s activity, the attacks begin with a malicious document sent in a phishing email. Nozomi Networks performed analysis on the GreyEnergy advanced ICS malware and found that the tools and tactics used by
0 Comments
A self-proclaimed leader in enabling operational intelligence, OSIsoft, maker of PI system software, announced an ongoing investigation into a data breach that likely compromised all domain accounts. On 16 November, the company reported that it was experiencing a security incident that potentially affected everyone from employees and interns to consultants and contractors. Attackers reportedly stole credentials and
0 Comments
by John E Dunn Are Ethereum’s new-fangled smart contracts the ultimate point of the blockchain or a risky experiment whose vulnerabilities presage trouble? Right now, few doubt that smart contracts – instruction workflows in a language called Solidity that automate complex, profitable processes on Ethereum – require close scrutiny. The latest security flaw was discovered by smart
0 Comments
Emotet starts another massive spam campaign just as Black Friday begins to pick up steam ESET has detected another large Emotet campaign, probably connected with the increased online shopping and email correspondence around Black Friday. Compared to the previous attacks, the operators have slightly modified their modus operandi. Emotet is still being distributed via spam
0 Comments
An unprecedented international grand committee comprised of 22 representatives from seven parliaments will meet in London next week to put questions to Facebook about the online fake news crisis and the social network’s own string of data misuse scandals. But Facebook founder Mark Zuckerberg won’t be providing any answers. The company has repeatedly refused requests
0 Comments
Positive Technologies researchers found two serious vulnerabilities that affect ATMs made by NCR. Researchers were able to launch black box attacks that forced the machines to dispense cash without authorization. What are these ATM vulnerabilities, and how does a black box attack work? Researchers from Positive Technologies What are these ATM vulnerabilities— Vladimir Kononovich and
0 Comments
Only around a third of some of the UK’s top retailers have invested in the most secure web certificates, potentially exposing customers to phishing attacks and missing out on sales, according to Sectigo. Formerly known as Comodo CA, the world’s largest commercial certificate authority audited 25 major high street and online names to see what