Philip Choo

0 Comments
Netflix and Apple TV+ have good news to report following this morning’s release of the Golden Globe nominations. Netflix landed on top with 34 nominations across film and TV, while Apple TV+ earned its first nods only weeks after the service’s launch. Despite lukewarm reviews from critics, Apple TV+ received multiple Golden Globe nominations for
0 Comments
How can people who didn’t grow up with technology protect themselves against some of the most common types of online fraud? The conventional thinking is that aging people tend to be at a higher risk of falling prey to scam artists than their children or grandchildren. Regardless of whether this is true or not, older
0 Comments
Cybersecurity researchers have uncovered a new, previously undiscovered destructive data-wiping malware that is being used by state-sponsored hackers in the wild to target energy and industrial organizations in the Middle East. Dubbed ZeroCleare, the data wiper malware has been linked to not one but two Iranian state-sponsored hacking groups—APT34, also known as ITG13 and Oilrig,
0 Comments
One of the largest data center providers in America has become the victim of a ransomware attack. Texas company CyrusOne confirmed yesterday that an attack involving REvil (Sodinokibi) ransomware had taken place on Wednesday. Customers of the company’s New York data center, located in Wappingers Falls, suffered a loss of service as a result of the incident.  A
0 Comments
US and UK authorities have indicted the leader of a notorious cybercrime gang that stole $70m from bank accounts around the world using malware. Ukrainian-born Russian national Maksim V. Yakubets allegedly headed up an organized crime syndicate that used Bugat malware—also known as Cridex and Dridex—to drain money from the customers of just under 300 organizations
0 Comments
For most enterprise businesses, an effective modern threat management strategy requires a two-pronged approach. Security professionals must protect against traditional threats, while also keeping an eye on future threats and vulnerabilities that may not yet have emerged. From a traditional threat perspective, the need to satisfy regulatory and compliance requirements is a top priority for
0 Comments
I recently had the honor of testifying before the House Financial Services Committee’s Taskforce on Artificial Intelligence about two critical emerging issues in the financial services sector – cloud and artificial intelligence (AI). Both have incredible potential for energizing the financial sector, but they also raise important security concerns. Financial services organizations are migrating to
0 Comments
US presidential candidate Bernie Sanders today released a plan to introduce high-speed internet to every American household if he wins the 2020 election.  The High-Speed Internet for All proposal suggests giving local and state governments $150bn in grants and aid to create publicly owned broadband networks. Of this funding, $7.5bn would be ring-fenced to “expand high-speed broadband in
0 Comments
by John E Dunn The Lazarus hacking group has been caught trying to sneak a new ‘fileless’ Trojan on to Apple macOS computers disguised as a fake cryptocurrency trading application. The discovery was reported by K7 Computing’s Dinesh Devadoss to Mac security expert Patrick Wardle, who immediately spotted similarities to previous attacks. The first of
0 Comments
A team of cybersecurity researchers has disclosed a new severe vulnerability affecting most Linux and Unix-like operating systems, including FreeBSD, OpenBSD, macOS, iOS, and Android, that could allow remote ‘network adjacent attackers’ to spy on and tamper with encrypted VPN connections. The vulnerability, tracked as CVE-2019-14899, resides in the networking stack of various operating systems
0 Comments
Hello and welcome back to Equity, TechCrunch’s venture capital-focused podcast, where we unpack the numbers behind the headlines. This week was a bit different than usual. First, we managed to come close to our old time target (20 minutes) instead of our regular length (30 minutes). And, second, Alex is coming back to TechCrunch starting next
0 Comments
OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security vulnerabilities, one of which is an old-school type authentication bypass vulnerability in BSD Auth framework. The other three vulnerabilities are privilege escalation issues that could allow local users or malicious software to gain privileges of an