Philip Choo

by Lisa Vaas Were you one of the dozens of people who got a bizarre Twitter message yesterday? Does anyone know what this twitter notification could possibly mean? https://t.co/iY6hQNLOgy — Nigella Lawson (@Nigella_Lawson) October 16, 2018 The messages were a long string of what looked like random numbers and letters. They were so mystifying that
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time
Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users’ accounts. The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email addresses,
Memory, a startup out of Norway and maker of time tracking app Timely, has raised $5 million in further funding. Leading the round is Concentric, and Investinor, with participation from existing investor SNÖ Ventures. The company had previously raised $1 million in 2016 from 500 Startups, and SNÖ. Founded by Mathias Mikkelsen, a designer by
A new vulnerability discovered in Apple’s latest iOS, 12.0.1, released last week, allows an attacker with physical access to an iPhone entry into photos on a locked phone, according to Jose Rodriguez, a Spanish security researcher. While the bypass bug, reported by The Hacker News, does require that an attacker have physical access to an
by Louisa Hardwick Canberra’s US embassy accidentally exposed details of one of its more enticing get-togethers last week, after an employee distributed a meeting invite to an undisclosed number of email recipients, The Guardian reported. Gavin Sundwall, US Mission to Australia public affairs counsellor, was, however, unperturbed, by what he claimed was a “training error”:
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things Several global book publishing houses and an international literary scouting agency have warned their staff of a flurry of phishing emails that seek authors’ and publishers’ sensitive information, including book manuscripts, The Bookseller reports. Penguin Random
TechCrunch Disrupt is the world’s biggest and most impactful tech startup conference, and we can’t wait to bring the hype to Berlin. We’re very proud of the show we’ve put together and are thrilled to give you a look at what’s in store. Editor’s Note: Not all of our speakers are included on this agenda
Y Combinator has released the results of a survey, completed in partnership with its portfolio company Callisto, highlighting the pervasive role of sexual harassment in venture capital and technology startups. Callisto, a sexual misconduct reporting software built for victims, is a graduate of YC’s winter 2018 class. The company sent a survey to 125 of YC’s
An attack aimed at Central Asian diplomatic organizations, dubbed the Octopus Trojan, is able to disguise itself as a popular online messenger, according to researchers at Kaspersky Lab. The Trojan, a malicious program for Windows, has possible links to DustSquad, a Russian-language cyber-espionage actor that focuses on Central Asian users that Kaspersky researchers have been monitoring
All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon remove support for TLS 1.0 (20-year-old) and TLS 1.1 (12-year-old) communication encryption protocols. Developed initially as Secure Sockets Layer (SSL) protocol, Transport Layer Security (TLS) is an updated cryptographic protocol used to establish a
Entrepreneur First (EF), the London-HQ’d company builder that invests in individuals “pre-team, pre-idea” to enable them to found new startups, is scaling up rapidly, as it promised to so. Already running programs in Paris, Berlin, London, Singapore, and Hong Kong, the so-called talent-first investor is setting up shop in Bangalore, India. Although referred to as
In analyzing global cybercrime patterns ThreatMetrix found that identity spoofing, fueled by stolen identity data, is the most prevalent attack vector for the gaming and gambling industry. Additionally, the Q2 2018 Gaming & Gambling Report discovered that location (IP) spoofing attacks increased 257% year-over-year, making it the fastest growing attack vector in the space. Because
On October 11, 2018, WikiLeaks published AmazonAtlas, a 20-page document from late 2015 containing the addresses and operational details for more than 100 of Amazon’s data centers, one of which indicates an affinity for the comedy of Jerry Seinfeld. In addition to revealing the information about the data centers, located in 15 cities across nine countries,