Reincubate’s Camo launched in 2020 with the aim of fixing webcam quality for all users and offered an efficient way for iPhone users to access the advanced cameras on their device. The company is now launching Camo 2 to bring even more capability to its offering. Most notably, Camo 2 supports any webcam, built-in, connected
Philip Choo
A leading UK security agency has claimed there’s a low risk of ChatGPT and tools like it effectively democratizing cybercrime for the masses, but it warned that they could be useful for those with “high technical capabilities.” National Cyber Security Centre (NCSC) tech director for platforms research, David C, and tech director for data science
by Paul Ducklin Heard of cricket (the sport, not the insect)? It’s much like baseball, except that batters can hit the ball wherever they like, including backwards or sideways; bowlers can hit the batter with the ball on purpose (within certain safety limits, of course – it just wouldn’t be cricket otherwise) without kicking off
Mar 16, 2023Ravie LakshmananCyber Crime / Cryptocurrency A coalition of law enforcement agencies across Europe and the U.S. announced the takedown of ChipMixer, an unlicensed cryptocurrency mixer that began its operations in August 2017. “The ChipMixer software blocked the blockchain trail of the funds, making it attractive for cybercriminals looking to launder illegal proceeds from
Walter Thompson Contributor Editorial Manager Walter Thompson edits staff and guest articles for TechCrunch+ and manages TechCrunch’s guest contributor program. Previously, he worked at a number of startups in various roles and as City Editor of Hoodline. He is the host of The Golden City, a podcast about San Francisco. More posts by this contributor
In pursuing new incident response roles, job candidates may find themselves fielding interview questions likely to challenge even highly experienced IT security practitioners. Hiring managers sometimes contrive stump-worthy questions to separate the most skilled candidates from the pack. Preparation is key, as such questions are often challenging in ways that aren’t entirely intuitive. For example,
NatWest has imposed a daily and 30-day limit on payments from customer accounts to cryptocurrency exchanges, in a bid to reduce their exposure to crypto fraud. The UK lender said it would not allow customers to transfer more than £1000 ($1213) per day, or more than £5000 ($6066) in a month to exchanges. NatWest claimed
by Paul Ducklin Thanks to the precise four-week length of February this year, last month’s coincidence of Firefox and Microsoft updates has happened once again. Last month, Microsoft dealt with three zero-days, by which we mean security holes that cybercriminals found first, and figured out how to abuse in real-life attacks before any patches were
Mar 15, 2023Ravie LakshmananServer Security / Cryptocurrency Cybersecurity researchers have discovered the first-ever illicit cryptocurrency mining campaign used to mint Dero since the start of February 2023. “The novel Dero cryptojacking operation concentrates on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet,” CrowdStrike
Hello, and welcome back to Equity, a podcast about the business of startups, where we unpack the numbers and nuance behind the headlines. This is our Wednesday show, where we niche down to a single person, think about their work and unpack the rest. This week, Natasha interviewed Series CEO Brexton Pham, who has been building a
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group ESET researchers discovered a campaign that we attribute with high confidence to the APT group Tick. The incident took place in the network of an East Asian company
Intellect, the Singapore-based mental health platform that now serves over three million users in 20 countries, is getting ready for a new phase of growth after striking a strategic partnership with IHH Healthcare, Asia’s largest private healthcare group. IHH Healthcare will work with Intellect to develop and customize digital mental health programs for its patients,
The Housing Authority of the City of Los Angeles (HACLA) has finally issued a public notice outlining the impact of a ransomware breach first reported at the start of this year. The public agency, which claims to hold the largest stock of affordable housing in the city, acknowledged a “cyber-event that resulted in disruption to
by Paul Ducklin Linux has never suffered from the infamous BSoD, short for blue screen of death, the name given to the dreaded “something went terribly wrong” message associated with a Windows system crash. Microsoft has tried many things over the years to shake that nickname “BSoD”, including changing the background colour used when crash
Mar 14, 2023Ravie LakshmananNetwork Security / Botnet A new Golang-based malware dubbed GoBruteforcer has been found targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres to corral the devices into a botnet. “GoBruteforcer chose a Classless Inter-Domain Routing (CIDR) block for scanning the network during the attack, and it targeted all IP addresses within that
The UK government has asked the National Cyber Security Centre (NCSC) to review TikTok in a move that could prefigure a ban on the app on government devices. Speaking to Sky News, security minister Tom Tugendhat said the government has asked the NCSC to look into the popular video sharing app — telling the broadcaster
Here’s how to know you have fallen victim to a scam – and what to do in order to undo or mitigate the damage. Online fraud can be thought of as a price we pay for the ubiquity of digital services. These services make our lives easier, healthier, safer and more entertaining. But there are
After a handful of eclectic recent chapters, Fortnite’s latest is taking a theme and running with it. Chapter Four, Season Two of Fortnite went live over the weekend, revamping the game’s central island (which got a full makeover last season) while going full futuristic. The result is a cyberpunk fever dream, with Fortnite’s bucolic rolling
UK law enforcers claimed on Friday to have dismantled a major money laundering gang after its final three members were sentenced following a five-year investigation. Aurimas Bielskis, 41, Vitalijs Slapkins-Slapkovs, 34, and Nedas Kiviliauskas, 34, were sentenced at Kingston Crown Court in west London. Bielskis and Slapkins-Slapkovs were each handed 22 months in prison, suspended for
Mar 13, 2023Ravie LakshmananBrowser Security / Artificial Intelligence A fake ChatGPT-branded Chrome browser extension has been found to come with capabilities to hijack Facebook accounts and create rogue admin accounts, highlighting one of the different methods cyber criminals are using to distribute malware. “By hijacking high-profile Facebook business accounts, the threat actor creates an elite
TuneIn, the radio service that allows users to livestream news, sports, music and podcasts, today rolled out its interactive map feature, TuneIn Explorer, to iOS and Android devices, giving mobile listeners the ability to listen to stations from across the globe. TuneIn Explorer lets users access over 100,000 local AM/FM radio stations from nearly every
As Silicon Valley Bank collapsed before our eyes on Thursday, a founder told me that the world felt like it did when COVID-19 first bared its teeth. I scoffed at his analogy at first: are we really using a still on-going and devastating pandemic to describe the fall of a prominent bank? But then I
Here’s a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them. With more than two billion users, WhatsApp offers a vast pool of potential targets for scammers. To make things more complicated, fraudsters aren’t known for
Editor’s Note: Adam Bertram originally wrote this article and Brien Posey has expanded it. PowerShell is an incredibly comprehensive and easy-to-use language. But administrators need to protect their organization from bad actors who use PowerShell for criminal purposes. PowerShell’s extensive capabilities as a native tool in Windows make it tempting for an attacker to exploit
The White House has allocated a total of $3.1bn to cybersecurity infrastructure in its latest budget report. Published on Thursday, the document shows $145m of this figure will go toward making the Cybersecurity and Infrastructure Security Agency (CISA) “more resilient and defensible.” Of the remaining funds, $98m will be invested in implementing the Cyber Incident Reporting
Mar 11, 2023Ravie LakshmananCyber Threat Intelligence The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. According to cybersecurity company eSentire, malicious ads are used to spoof a wide range of legitimate apps and services such as Adobe, OpenAPI’s ChatGPT, Spotify, Tableau, and Zoom.
Serial entrepreneur and venture capitalist Garry Tan is less than three months into his new job as the CEO of Y Combinator, one of the most famed accelerator programs in tech. And it seems like it’s been an eventful onboarding process thus far. Along with pretty much every other corner of the startup world, YC
Brett Adcock Contributor Brett Adcock is the founder of Figure, an AI robotics company building a general-purpose humanoid robot. Previously, he founded Archer Aviation, an urban air mobility company that went public at $2.7B and Vettery, a machine learning-based talent marketplace that was acquired for $110M. Yesterday, the U.S. experienced its second-largest bank failure in
A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds Have you ever been asked to move an online conversation to another – and supposedly more secure – platform? This technique, often used by romance scammers, was recently used against a number of Indian
A new variant of the Xenomorph Android banking trojan has been spotted by ThreatFabric security researchers and classified as Xenomorph.C. The variant, developed by the threat actor known as Hadoken Security Group, represents a substantial upgrade from the malware previously observed by ThreatFabric, according to an advisory published by the company earlier today. “This new
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 298
- Next Page »