admin

0 Comments
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions
0 Comments
It’s true, you’ve got the Galaxy Note to thank for your big phone. When the device hit the scene at IFA 2011, large screens were still a punchline. That same year, Steve Jobs famously joked about phones with screens larger than four inches, telling a crowd of reporters, “nobody’s going to buy that.” In 2019,
0 Comments
Does true Artificial Intelligence even exist yet? Will it ever exist or will it end the world before we reach its full capacity? The hype around Artificial Intelligence (AI) is currently a media frenzy and if we aren’t careful, we will ruin the name before it has had a chance to really prove itself due
0 Comments
A leading open source project has come under fire for issuing misleading security advisories which may have put customers of its software at unnecessary risk. Security vendor Synopsys analyzed 115 separate releases for popular web application framework Apache Struts and matched them up against the relevant advisories from the open source project. In total, 24
0 Comments
Chinese mobile-phone and device maker Transsion is teaming up with Kenya’s Wapi Capital to source and fund early-stage African fintech startups. Headquartered in Shenzhen, Transsion is a top-seller of smartphones in Africa that recently confirmed its imminent IPO. Wapi Capital is the venture fund of Kenyan fintech startup Wapi Pay—a Nairobi based company that facilitates digital
0 Comments
Unlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10 Microsoft issued fixes for four critical vulnerabilities in Remote Desktop Services (RDS) this week, likening two of them to ‘BlueKeep’, another critical flaw in the same Windows component. All four Remote Code Execution (RCE) flaws – tracked as CVE‑2019‑1181, CVE‑2019‑1182, CVE‑2019‑1222 and
0 Comments
Botnets continue to be one of the most prevalent and dangerous forms of malware organizations contend with. That’s in part because botnets tend to target devices that can’t be patched or updated and yet fill a critical function inside an organization. For example, industrial IoT devices can be responsible for monitoring and managing critical systems
0 Comments
by Danny Bradbury Microsoft’s Patch Tuesday bought some very bad news yesterday: more wormable RDP vulnerabilities, this time affecting Windows 10 users. CVE-2019-1181 and -1182 are critical vulnerabilities in Remote Desktop Services (formerly Windows Terminal) that are wormable – similar to the BlueKeep vulnerability that people have already created exploits for. Wormable means that the
0 Comments
ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers We’ve discovered an ongoing campaign in the Balkans spreading two tools having a similar purpose: a backdoor and a remote access trojan we named, respectively, BalkanDoor and BalkanRAT. BalkanRAT enables the attacker
0 Comments
Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices. The vulnerability, assigned as CVE-2019-9506, resides in the way ‘encryption key negotiation protocol’ lets two Bluetooth BR/EDR devices choose
0 Comments
British Airways has come under fire from the security community again, this time after a vulnerability in its e-ticketing system was found to be exposing passenger’s personal information (PII). Security firm Wandera claimed in a blog post yesterday that the airline was sending out unencrypted check-in links to customers which contained booking reference and surname in
0 Comments
by Lisa Vaas Mice can’t vote. They can neither fill in little ovals on ballots nor move voting machine toggles with their itty bitty paws. That’s unfortunate, because the teeny rodents are less inclined than humans to be swayed by the semantics of fake news content in the form of doctored video and audio, according
0 Comments
President Donald Trump and the Office of the U.S. Trade Representative have issued technology companies some temporary tariff relief. Citing an unwillingness to hit consumers with higher prices on things like computers, mobile phones, laptops, video game consoles, computer monitors, clothes and shoes before the holidays, the President and his trade reps are holding off
0 Comments
After welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming? I’m building a homebuilt experimental airplane. Yes, I plan to fly in it. Don’t be afraid, lots of others are too, and this segment of inventors could easily prove a valuable
0 Comments
If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. It has been disclosed that the Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the previously-fixed ‘BlueKeep‘ vulnerability. Discovered by Microsoft’s security
0 Comments
Industry stakeholders are considering reducing the lifespan of HTTPS certificates to just 13 months, around half of the current duration, in order to improve security. The CA/Browser Forum proposal would seek to make the changes from March 2020. It comes after certificate lifetimes were reduced from 39 to 27 months back in March 2018. Proponents
0 Comments
by Paul Ducklin Well-known device hacking researchers at cybersecurity company Pen Test Partners have just published an article summarising the 4G hotspot hacking research they presented at last week’s DEF CON event. Simply put, a 4G hotspot is a miniaturised, battery-powered, SIM-card-equipped equivalent to your home router. Home routers typically plug into a mains adapter