by Lisa Vaas Step aside Amazon, drone deliveries are already a thing in prisons. There are many things that conspirators on the outside can do drone-wise: drop mobile phones, chargers, batteries, drugs, knives, memory cards, earphones, saws, or even drills. There are also many ways for those drone drops to be duds: sometimes they crash
Striking the balance between supply, demand and safety is a major concern With the pressure to ship as early as possible, especially when it comes to hardware, what assurances do we have that the hardware is really clean, and that future updates won’t be hacked? Here at Virus Bulletin 2018, the conversation of how to
Do you know what is the latest version of Wi-Fi? It’s okay if you don’t know. It is — Wi-Fi is 802.11ac. I am sure many of us can’t answer this question immediately because the Wi-Fi technology doesn’t have a traditional format of version numbers… at least until yesterday. The Wi-Fi Alliance—the group that manages
Adults, not teens. Messaging, not Stories. Developing markets, not the US. These are how Snapchat will make a comeback, according to CEO Evan Spiegel . In a 6,000-word internal memo from late September leaked to Cheddar’s Alex Heath, Spiegel attempts to revive employee morale with philosophy, tactics, and contrition as Snap’s share price sinks to
The European Parliament has voted in favor of a new quota for content on streaming services. Services, such as Netflix and Amazon Prime Video, will have to make sure that at least 30 percent of their catalogs in Europe come from European countries. Many European countries already have quotas for movie theaters and TV networks.
Advancements in the motoring industry need to be replicated in cybersecurity to provide a safer online future. Speaking in the cybersecurity keynote at IP Expo in London, BH Consulting CEO Brian Honan related a recent instance where we was speaking to his father about buying a new car, and how car safety had increased since
by Mark Stockley Over the summer I decided to give my kids an old Apple laptop to share. We use laptops for school homework from time to time but my kids spend most of their screen time poking and swiping tablets. I wanted to broaden their horizons a little: do a bit of coding; a
Cloud awareness and adoption continues to grow as more enterprises take advantage of the benefits that come with multiple cloud platforms. As this trend continues its upward trajectory, we see more tech vendors coming to market with new tools designed to address a variety of different challenges. Whether you are switching up your multi-cloud strategy
Answers could help raise awareness of situations that people fear Cybersecurity involves protecting the digital technologies upon which we depend against criminals who seek to abuse them for their own ends. Public support for efforts to reduce cybercrime is critical to society’s efforts to preserve the benefits of digital technologies. That is why I am
A media report today revealed details of a significant supply chain attack which appears to be one of the largest corporate espionage and hardware hacking programs from a nation-state. According to a lengthy report published today by Bloomberg, a tiny surveillance chip, not much bigger than a grain of rice, has been found hidden in
Fitbit data may have helped catch one of its customer’s killers, and not for the first time. According to numerous media reports, a 90-year-old visited his stepdaughter at her home in San Jose, Ca. earlier this month, where he says he brought her pizza and visited briefly. But according to data provided to authorities by
DigiCert Inc., Gemalto and ISARA Corp. have teamed up develop quantum-proof digital certificates and secure key management for IoT devices. The partnership will combine ISARA’s quantum-proof algorithms with Gemalto’s SafeNet hardware security modules and DigiCert’s public key infrastructure (PKI) to offer certificates that are resistant to quantum computing threats. Scott Totzke, CEO at ISARA, based
Speaking at IP EXPO Europe, Ray Pompon, principal threat researcher at F5, said that applications are now at the center of business, the reason people use the internet and the gateway to data. Pompon said F5 research showed that 34% of web apps are considered mission critical, with 765 web apps used in the average organization.
by Lisa Vaas Taking work-related documents home to study might get you a promotion and pay raise at some jobs, but not when your employer is the National Security Agency (NSA) – and most certainly not when those materials are classified. Former NSA employee Nghia Hoang Pho, 68 – a naturalized US citizen who was
When it comes to internet security, we all suffer from a condition known as optimism bias. It’s the simple idea that we, individually, won’t be affected negatively by an externality compared to others. The same mental distortion happens in the digital world. We read a lot about cybercrime and assume the consequences of those attacks
The social networking behemoth is expected to face a formal investigation by Ireland’s Data Protection Commission in what could be the “acid test” of GDPR since the law became effective in May Facebook has announced that it found no evidence that attackers had used stolen account access tokens on other websites or apps that enable
The US-CERT has released a joint technical alert from the DHS, the FBI, and Treasury warning about a new ATM scheme being used by the prolific North Korean APT hacking group known as Hidden Cobra. Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by the North Korean
A federal judge denied Tesla’s motion to dismiss charges in a lawsuit claiming that it mistreated foreign workers. This means the automaker will have to defend itself at trial against allegations that foreign workers at its Fremont factory worked shifts that violated forced labor laws and were threatened with deportation if they reported injuries. The
Walmart is expanding further into apparel with today’s announcement of its plans to acquire the digitally native, women’s plus-size clothing brand ELOQUII for an undisclosed amount. The deal includes ELOQUII CEO Mariah Chase, her executive team and its 100 employees, who will continue to be based in Long Island City, NY and Columbus, OH. They’ll
US financial services firms suffered three-times more data breaches in the first six months of 2018 than during the same period in 2016, according to new data from Bitglass. The security vendor aggregated data from the Identity Theft Resource Center (ITRC) and the Privacy Rights Clearinghouse (PRC) to gain insight for its Financial Breach Report
by Danny Bradbury Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, it was revealed this week. At least four influencers have lost control of their accounts and received demands to send bitcoin for their return, but in some cases the attackers retained control or deleted the accounts. Motherboard reported that
Every rose has its thorn, right? Apparently, the same goes for actress Ruby Rose, as her newfound popularity from “Orange is the New Black” has made her both famous, and maybe even dangerous. At least when it comes to online interactions. You heard correctly, the newly announced Batwoman has also been crowned McAfee’s Most Dangerous
WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals Information and communications technologies permeate our day-to-day lives and are vital for the daily operations of both enterprises and governments. This
Looking for a hack to bypass the passcode or screen lock on iPhones? Jose Rodriguez, an iPhone enthusiast, has discovered a passcode bypass vulnerability in Apple’s new iOS version 12 that potentially allows an attacker to access photos and contacts, including phone numbers and emails, on a locked iPhone XS and other recent iPhone models.
Shares of Stitch Fix plunged more than 20 percent in after-hours trading on Monday following the release of a tepid fourth-quarter earnings report. The online retailer and personal styling service’s adjusted earnings exceeded analyst expectations, but its revenue and active users fell short of estimates. In the quarter ending July 28, Stitch Fix reported a net
Bespoke Post says it has more than 100,000 subscribers signed up to receive a monthly “box of awesome” (that’s what it calls its bundles of curated men’s products). Next up: Creating brands and products of its own. It’s a common move for retailers and ecommerce companies to launch their own brands, but it sounds like
The Information Commissioner’s Office (ICO) has fined Bupa Insurance Services Limited (Bupa) £175,000 for its failure to protect the personal information of its customers. Had the timing of the breach been different, Bupa would have faced fines under the General Data Protection Regulations (GDPR), but the security incident occurred prior to those regulations going into
by Maria Varmazis It’s crucial to arm kids with knowledge of how to protect themselves and their information online, not only in the moment, but also for the future – a concept many kids may not really care about or even grasp. If you’re looking for the best way to start a conversation with your
Financial companies continue to innovate with their online products and services, bringing conveniences for customers, but challenges when it comes to security. This is because the current “fintech” (financial technology) landscape doesn’t just include traditional banks with online services. New players, like cryptocurrency sites, robo advisors and online loan providers have all joined the party.
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they