admin

0 Comments
Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our information and money. By offering prizes, referencing current events, or just creating a sense of urgency, scammers know how to get us to click when we really shouldn’t. Check out these recent scams, so you
0 Comments
Instead of financial gain or other, more usual, goals, the attacker leaves ‘scorched digital earth’ behind An unknown attacker has wrought rare havoc on email service provider VFEmail, wiping out all of the company’s data stored in the United States, according to an announcement on the firm’s website. Describing the incident as “catastrophic”, the company
0 Comments
Smartphone users could be leaving themselves vulnerable to online scams this Valentine’s Day, researchers from ESET have warned. The firm carried out a survey into people’s resolutions for the year and discovered that whilst one in eight are looking for love in 2019, only 39% were sure they had anti-virus software on their mobile phones.
0 Comments
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the ‘privacy’ of social media accounts When Starbucks introduced personalising the coffee shop experience by writing their customer’s names on their coffee cups people felt violated. Why on earth would a coffee
0 Comments
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious program to obtain root privileges and total control over the targeted system. Dubbed “Dirty_Sock” and identified as CVE-2019-7304, the vulnerability was discovered by security researcher Chris Moberly, who privately disclosed it to Canonical,
0 Comments
Speaking at The European Information Security Summit 2019 in London, Condé Nast International CISO Nick Nagle said that threat intelligence is easily collected, but it can also be translated across the business. In his talk ‘Effective threat intelligence communication strategies: Upwards, downwards and outwards’ Nagle explained that threat intelligence is readily available, but turning it into actionable
0 Comments
Johnson & Johnson’s robotic surgery and medical device division, Ethicon, is dropping $3.4 billion in cash to pick up Auris Health, a developer of robotic diagnostics and surgical devices initially focused on detecting and treating lung cancer. The healthcare giant said an additional $2.35 billion in payouts may be possible if Auris hits certain milestones.
0 Comments
Shortly after BuzzFeed News employees revealed that they had voted to unionize, its editor-in-chief said the company wants to meet with them to discuss voluntarily recognition. Employees announced today that they are organizing as BuzzFeed News Union under the NewsGuild of New York. “Our staff has been organizing for several months, and we have legitimate
0 Comments
MongoDB security settings have received significant upgrades recently, yet some users are still accidentally exposing their databases to the public internet. Starting in 2017, MongoDB added several security features for its database products that are enabled by default. But that hasn’t stopped some organizations from running older or free versions of the software that are
0 Comments
Just under half of a surveyed set of British small to medium-sized businesses (SMBs) believe that a cyber-attack would put them out of business. The survey of 501 IT decision makers by Webroot found that 48% have suffered a cyber-attack or data breach in their lifetime, with over one in seven saying this happened more
0 Comments
Biomanufacturing technologies — taking modified versions of existing organisms and bending them to the will of humans — has moved from the world of science fiction to becoming a new reality. Across the startup landscape companies are launching to make synthetic spider silk, or make leather substitutes, or meat substitutes, or novel chemicals and pharmaceuticals.
0 Comments
Serverless platform-as-a-service (PaaS) offerings are being deployed at an increasing rate for many reasons. They relate to information in a myriad of ways, unlocking new opportunities to collect data, identify data, and ultimately find ways to transform data to value. Figure 1. Serverless application models. Serverless applications can cost-effectively reply and process information at scale, returning
0 Comments
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems and could potentially allow attackers to escape container and obtain unauthorized, root-level access to the host operating system. The vulnerability was discovered by open source security researchers Adam Iwaniuk and Borys Popławski and publicly disclosed
0 Comments
Over the last 20 years, smart home gadgets have evolved from fantasy to commodity. Walk into Best Buy and there are dozens of products that take just a few minutes to set up. It’s wonderful. Even better, it’s easy. There are lights and locks and screens from big and small companies alike. And therein lies
0 Comments
Two US senators have called for an urgent investigation into whether foreign-owned Virtual Private Networks (VPNs) represent a risk to national security. Ron Wyden and Marco Rubio signed a joint letter to the director of the Department of Homeland Security’s new Cybersecurity and Infrastructure Security Agency (CISA), Christopher Krebs. It points to the popularity of
0 Comments
Integration: it seems to be all the rage. As technology becomes more sophisticated, we sprint to incorporate these new innovations into our everyday lives. But as we celebrate Safer Internet Day, one can’t help but wonder, is all integration good when it comes to information shared online? Major privacy concerns have been raised surrounding Facebook’s
0 Comments
The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that could have allowed an attacker to coin an infinite number of Zcash (ZEC). Yes, infinite… like a never-ending source of money. Launched in October 2016, Zcash is a privacy-oriented cryptocurrency that claims to