Supporters of President Trump who want to date like-minded individuals had Emily Moreno, a former aide to Sen. Marco Rubio, to thank for creating the Donald Dater app, but their gratitude might have fallen flat after their information was leaked on the day the app was launched. According to Time, Monero confirmed the leak was discovered on
Philip Choo
by Lisa Vaas Were you one of the dozens of people who got a bizarre Twitter message yesterday? Does anyone know what this twitter notification could possibly mean? https://t.co/iY6hQNLOgy — Nigella Lawson (@Nigella_Lawson) October 16, 2018 The messages were a long string of what looked like random numbers and letters. They were so mystifying that
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select few, however, can go undetected by a handful of antimalware products. Meet GandCrab ransomware, a strain that somehow manages to accomplish all of the above. Our McAfee Labs team has found that the ransomware, which
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time
Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users’ accounts. The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email addresses,
Memory, a startup out of Norway and maker of time tracking app Timely, has raised $5 million in further funding. Leading the round is Concentric, and Investinor, with participation from existing investor SNÖ Ventures. The company had previously raised $1 million in 2016 from 500 Startups, and SNÖ. Founded by Mathias Mikkelsen, a designer by
A new vulnerability discovered in Apple’s latest iOS, 12.0.1, released last week, allows an attacker with physical access to an iPhone entry into photos on a locked phone, according to Jose Rodriguez, a Spanish security researcher. While the bypass bug, reported by The Hacker News, does require that an attacker have physical access to an
by Louisa Hardwick Canberra’s US embassy accidentally exposed details of one of its more enticing get-togethers last week, after an employee distributed a meeting invite to an undisclosed number of email recipients, The Guardian reported. Gavin Sundwall, US Mission to Australia public affairs counsellor, was, however, unperturbed, by what he claimed was a “training error”:
Not very long ago, people could be seen walking around waving their mobile phones in the air, looking for a network connection. Today, we are talking 5G! Our kids just can’t imagine a world without gadgets and internet! Little kids as young as four can turn on and instruct Alexa, search for new games on
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things Several global book publishing houses and an international literary scouting agency have warned their staff of a flurry of phishing emails that seek authors’ and publishers’ sensitive information, including book manuscripts, The Bookseller reports. Penguin Random
A security enthusiast who discovered a passcode bypass vulnerability in Apple’s iOS 12 late last month has now dropped another passcode bypass bug that works on the latest iOS 12.0.1 that was released last week. Jose Rodriguez, a Spanish amateur security researcher, discovered a bug in iOS 12 in late September that allows attackers with
TechCrunch Disrupt is the world’s biggest and most impactful tech startup conference, and we can’t wait to bring the hype to Berlin. We’re very proud of the show we’ve put together and are thrilled to give you a look at what’s in store. Editor’s Note: Not all of our speakers are included on this agenda
Y Combinator has released the results of a survey, completed in partnership with its portfolio company Callisto, highlighting the pervasive role of sexual harassment in venture capital and technology startups. Callisto, a sexual misconduct reporting software built for victims, is a graduate of YC’s winter 2018 class. The company sent a survey to 125 of YC’s
By: Darius, Sales & Marketing Rotation Engineer “The sky is the limit.” It’s a phrase I heard frequently growing up, in school, college and university. To me, the phrase means there are endless opportunities. So, my nine-year-old self desired to be a racecar driver, my freshman year ambition was to be a developer and then
Email phishing is one of the most common attack vectors that organizations have to worry about, and the attacks are getting smarter. Email phishing attacks involve an attacker pretending to be someone else to get personal information from a user through an email. Modern attackers use public information from social media sites such as LinkedIn
An attack aimed at Central Asian diplomatic organizations, dubbed the Octopus Trojan, is able to disguise itself as a popular online messenger, according to researchers at Kaspersky Lab. The Trojan, a malicious program for Windows, has possible links to DustSquad, a Russian-language cyber-espionage actor that focuses on Central Asian users that Kaspersky researchers have been monitoring
by Paul Ducklin What is this Facebook breach? The breach was announced by Facebook itself on 28 September 2018. It worked something like this… Facebook has a View As feature that lets you preview your profile as other people would see it. This is supposed to be a security feature that helps you check whether
While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed Facebook has disclosed that 30 million people had their Facebook access tokens swiped in the breach uncovered and disclosed in late September. Of the total, 29 million also had at least some
All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon remove support for TLS 1.0 (20-year-old) and TLS 1.1 (12-year-old) communication encryption protocols. Developed initially as Secure Sockets Layer (SSL) protocol, Transport Layer Security (TLS) is an updated cryptographic protocol used to establish a
Entrepreneur First (EF), the London-HQ’d company builder that invests in individuals “pre-team, pre-idea” to enable them to found new startups, is scaling up rapidly, as it promised to so. Already running programs in Paris, Berlin, London, Singapore, and Hong Kong, the so-called talent-first investor is setting up shop in Bangalore, India. Although referred to as
In 1883, Krakatoa erupted, spewing volcanic ash and gas into the stratosphere, making clouds more reflective and cooling the entire planet by roughly 1° C that year. In 2018, the UN reported that human activity has already raised Earth’s temperature by 1°, and if we don’t do something drastic soon, the results will be catastrophic.
Searching the internet has become as much a part of daily life as pouring that first cup of coffee each morning. We rely on it, we expect it to deliver, and often, we do it without much thought. McAfee’s annual Most Dangerous Celebrity list gives us a chance to hit pause on our habits and
In analyzing global cybercrime patterns ThreatMetrix found that identity spoofing, fueled by stolen identity data, is the most prevalent attack vector for the gaming and gambling industry. Additionally, the Q2 2018 Gaming & Gambling Report discovered that location (IP) spoofing attacks increased 257% year-over-year, making it the fastest growing attack vector in the space. Because
by Lisa Vaas Last year was a rough time for consumers whose personal information was handled with, shall we say, less than due diligence by the credit bureaus. In an aftershock following the epic Equifax data-quake last year, it was revealed that the PINs used to protect frozen credit files (frozen by victims to protect
Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API Google will “sunset” Google+ for consumers, according to the company’s blog post, in a move precipitated by a bug in the social network’s API that may have exposed the data of half a million users to outside developers.
Yes, it is official. The massively popular battle royale video game from Epic Games, Fortnite: Battle Royale is finally available for Android devices. Epic announced Thursday that the Android version of Fortnite is now available for everyone to download for free, so you no longer require an invite to play the most popular battle royale
There’s no shortage of interesting electronics kits out there to occupy an idle Sunday, but with this one you get a phone out of the bargain. The MakerPhone is a kit looking for funds on Kickstarter that lets you assemble a working mobile phone from a number of boards and pieces, and the end result
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks in China utilized stolen Apple IDs to break into customers’ accounts and steal an undisclosed amount of money, according to a Bloomberg report. Almost immediately, Chinese e-transaction giants Tencent Holdings and Alipay warned their customers
The time has come. Electric scooter sharing services are returning to the streets of San Francisco — this time with explicit permission from the SF Municipal Transportation Agency. On Monday, we’ll see both Skip and Scoot deploy their respective electric scooters throughout the city. And if you remember what it was like earlier this year,
On October 11, 2018, WikiLeaks published AmazonAtlas, a 20-page document from late 2015 containing the addresses and operational details for more than 100 of Amazon’s data centers, one of which indicates an affinity for the comedy of Jerry Seinfeld. In addition to revealing the information about the data centers, located in 15 cities across nine countries,