admin

0 Comments
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect of our everyday lives, it’s no wonder IoT-based attacks are becoming smarter and more widespread than ever before. From DDoS to home network exposures, it appears cybercriminals have set their sights on the digital dependence
0 Comments
Latest ESET research describes the inner workings of a recently found addition to OceanLotus’s toolset for targeting Mac users Early in March 2019, a new macOS malware sample from the OceanLotus group was uploaded to VirusTotal, a popular online multi-scanner service. This backdoor executable bears the same features as the previous macOS variant we looked
0 Comments
A cybersecurity researcher at Tenable has discovered multiple security vulnerabilities in Verizon Fios Quantum Gateway Wi-Fi routers that could allow remote attackers to take complete control over the affected routers, exposing every other device connected to it. Currently used by millions of consumers in the United States, Verizon Fios Quantum Gateway Wi-Fi routers have been
0 Comments
Rocket Lab, one of the biggest startups in the NewSpace category of companies providing launch and satellite services, has added satellite manufacturing to the array of services it offers to customers. The company, which already had developed launch capabilities and has begun sending payloads into space, can now deliver fully built satellites to its customers,
0 Comments
With the use of deep learning, researchers Yisroel Mirsky, Tom Mahler, Ilan Shelef and Yuval Elovici at Cyber Security Labs at Ben-Gurion University demonstrated in a video proof of concept (PoC) that an attacker could fool three expert radiologists by falsifying CT scans, inserting or removing lung cancer, the Washington Post reported.  “In 2018, clinics and
0 Comments
The European Commission has announced the launch of a pilot project intended to test draft ethical rules for developing and applying artificial intelligence technologies to ensure they can be implemented in practice. It’s also aiming to garner feedback and encourage international consensus building for what it dubs “human-centric AI” — targeting among other talking shops
0 Comments
Phishing scams and cyberattacks are on the rise, resulting in millions of dollars in company losses with every successful attempt. Hackers break in through a company network and gain access to all connected endpoints. Endpoint devices are internet-capable computer hardware devices on a TCP/IP network and include desktop computers, tablets and thin clients. As the
0 Comments
Regulators in Australia are cracking down on social media sites in the aftermath of the deadly shooting at two mosques in Christchurch that killed 50 people, according to Reuters. The Criminal Code Amendment (Sharing of Abhorrent Violent Material) Act 2019 would prohibit social media sites and internet or hosting services from allowing “abhorrent violent material.” Such material would
0 Comments
by Lisa Vaas Should you “share, share, share” the “urgent warning” that hackers are “posting sexual videos and pictures on your walls” that are completely invisible to you? No, you should not sharedy-sharedy-SHARE-share-share, because this latest viral Facebook copy-and-paste-me warning is just another social media sneeze, spreading its hoaxy germs in spite of the fact
0 Comments
It’s tax season, which has me thinking about one of decentralized technology’s holy grails: self-sovereign identities. It’s a stirring vision, of a world in which control over our driver’s licenses, passports, birth certificates, social security numbers — the table stakes to participate in the modern economy — rests in our hands, rather than that of
0 Comments
Researchers at Cisco Talos detected an excess of 70 Facebook groups that have been selling black-market cyber-fraud services, some of which have managed to remain on Facebook for up to eight years, according to a Talos Intelligence blog post. For several months, researchers have been investigating online criminal flea markets on Facebook, discovering a collective
0 Comments
Let’s start this week’s newsletter with some data. Nationally, startups pulled in $30.8 billion in the first quarter of 2019, up 22 percent year-on-year, according to Crunchbase’s latest deal round-up. A closer look at the numbers shows a big drop in angel funding and a slight decrease in mega-rounds, or financings larger than $100 million.
0 Comments
Photo editing app-maker VSCO has filed a lawsuit against competitor PicsArt. The suit focuses on 19 PicsArt filters that were supposedly “reverse engineered from VSCO’s filters,” with VSCO alleging it’s become a legal issue involving false advertising and violations of the app’s terms of service. “VSCO has invested significant time and resources in developing its presets
0 Comments
Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch, security researcher for Bad Packets. Researchers have detected different types of attacks that are targeting consumer routers, all of which were reportedly traced back to hosts on the Google Cloud Platform
0 Comments
Seemingly the sole government body policing tech platforms, the ole’ European Union, is now taking aim at desktop gaming’s biggest storefront, Steam, and its creator Valve. The commission sent a “Statements of Objections” to Valve and five other video game publishers, raising a fuss over the companies’ habits of “geo-blocking” purchases, i.e. prohibiting users from