admin

0 Comments
Supporters of YouTube sensation PewDiePie have been at it again, this time defacing a Wall Street Journal web page in another bid to boost his subscribers. The page itself, originally sponsored by a technology giant, was apparently fixed promptly by the newspaper’s IT team, but can be viewed here. It references the WSJ’s 2017 investigation
0 Comments
Twitter accidentally exposed the ability to pull an account’s phone number country code and whether the accounts had been locked by Twitter. The concern here is that malicious actors could have used the security flaw to figure out which countries accounts were based in, which could have ramifications for whistleblowers or political dissidents. The issue
0 Comments
Printers around the world appear to have been hijacked again with a message to subscribe to a popular YouTube vlogger, and improve their cybersecurity. Those behind the attack are thought to be the same ones that managed to get a message in support of social media star PewDiePie printed out on 50,000 machines last month.
0 Comments
Maggie Lane Contributor Maggie Lane is a writer and producer of virtual reality experiences and covers the industry for various publications. More posts by this contributor Inside Nickelodeon’s Teenage Mutant Ninja Turtles VR Interview Experience Does Ready Player One reveal the future of VR? [embedded content] You need to stop procrastinating. Maybe it’s time for
0 Comments
Law enforcement agencies across the country spent the better part of yesterday evening investigating a slew of bomb threats delivered by email to businesses and universities across the US and Canada. The hoax email warning that an explosive device was in the recipient’s place of work evoked fear among many Americans yesterday, according to KrebsonSecurity.
0 Comments
by Lisa Vaas Facebook filed a patent, titled “Offline Trajectories,” last week in which it proposes predicting users’ “location trajectories” – in other words, where we’re likely headed. Knowing when we’re about to hurtle into a no-WiFi-connection limbo means Facebook can “prefill” our phones with content and ads. It knows enough to know a lot more
0 Comments
Zack Kanter Contributor Zack Kanter is the co-founder of Stedi. More posts by this contributor Why Amazon is eating the world While serverless is typically championed as a way to reduce costs and scale massively on demand, there is one extraordinarily compelling reason above all others to adopt a serverless-first approach: it is the best
0 Comments
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as ‘Magellan‘ by Tencent’s Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a
0 Comments
It feels like there’s a WeWork on every street nowadays. Take a walk through midtown Manhattan (please don’t actually) and it might even seem like there are more WeWorks than office buildings. Consider this an ongoing discussion about Urban Tech, its intersection with regulation, issues of public service, and other complexities that people have full
0 Comments
An unprotected ElasticSearch server led to a potentially massive data leak for a popular avatar app maker, Boomoji. The app, which is based in China and has 5.3 million users across the globe, allows iOS and Android users to create 3D avatars. The personal data of its entire user base was exposed after Boomoji reportedly left
0 Comments
by Danny Bradbury Google keeps tabs on much of your activity, including your browsing history and your location. Now, it turns out that its YouTube service is also reading what’s in your videos, too. Programmer Austin Burk, who goes by the nickname Sudofox, discovered the issue after discovering a cross-site scripting (XSS) flaw on another site.
0 Comments
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by ideology, politics, or even financial aims. Destructive attacks have a critical impact on businesses, causing the loss of data or crippling business operations. When a company is impacted, the damage can be significant. Restoration can
0 Comments
Ryan Craig Contributor More posts by this contributor Facebook is going back to college Broadening education investments to full-stack solutions Although many of the milestones of the digital revolution have sprung directly from the research output of America’s colleges and universities, like Athena from Zeus’s forehead, on the instructional side, American higher education has taken
0 Comments
The Logitech Options app, which configures the company’s mice and keyboards in Windows, relies on an ineffective authentication mechanism that enables malicious webpages to execute code on a victim’s machine. Tavis Ormandy, vulnerability researcher with Google’s Project Zero, found the flaw in the Logitech Options app when he tried to rebind a button on his