admin

0 Comments
Financial companies continue to innovate with their online products and services, bringing conveniences for customers, but challenges when it comes to security. This is because the current “fintech” (financial technology) landscape doesn’t just include traditional banks with online services. New players, like cryptocurrency sites, robo advisors and online loan providers have all joined the party.
0 Comments
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they
0 Comments
Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malware that works by changing
0 Comments
Employee monitoring to protect against data loss and misuse is becoming mandatory in more industries, but insider security is harder than ever to enforce. As more regulations around data privacy and missteps at high-profile companies generate ongoing headlines, security teams attempt to monitor insider threats without stepping into the quagmire.  Teramind, a startup in Miami
0 Comments
A call for new cybersecurity leadership came from Massachusetts governor Charlie Baker at yesterday’s 2018 Massachusetts Cybersecurity Forum. Hosted by Gov. Baker, the forum brought together more than 200 of the state’s foremost practitioners from the public and private sectors. The forum included thought leaders from cybersecurity companies, universities and research and development centers to
0 Comments
by John E Dunn Researchers have discovered that several leading Android-based password managers can be fooled into entering login credentials into fake phishing apps. Password managers can be used to create, store, enter and autofill passwords into apps and websites. As well as allowing users to maintain scores of strong passwords, password managers can also
0 Comments
An Active Directory deployment may seem straightforward, but it takes a bit of groundwork to set up a Windows Server 2016 domain controller. Active Directory Domain Services needs to be installed and managed by an IT administrator with a background in Windows Server 2016 and Windows environments. They should research the Active Directory (AD) domain
0 Comments
For hobbyist photographers like myself, Hasselblad has always been the untouchable luxury brand reserved for high-end professionals. To fill the gap between casual and intended photography, they released the X1D — a compact, mirrorless medium format. Last summer when Stefan Etienne reviewed the newly released camera, I asked to take a picture. After importing the raw file
0 Comments
by Anna Brading Facebook has suffered a data breach affecting almost 50 million accounts. Another 40 million have been reset as a “precautionary step”. What’s happened? In a post on the site earlier today, Facebook’s VP of Product Management, Guy Rosen, said that the breach was discovered on Tuesday 25 September 2018. Attackers exploited a
0 Comments
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving
0 Comments
The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs Students and staff are suspected to be behind many distributed denial-of-service (DDoS) attacks at colleges and universities in the United Kingdom, recent research suggests. The non-profit Jisc – which among other things
0 Comments
Julian Assange, the founder of popular whistleblower website WikiLeaks, is stepping down from the position of editor-in-chief of the organisation under “extraordinary circumstances.” Assange, the 47-year-old Australian hacker, founded WikiLeaks in 2006 and has since made many high-profile leaks, exposing ‘dirty’ secrets of several individuals, political parties as well as government organisations across the world.
0 Comments
Urban-X, the urban-tech startup accelerator backed by BMW MINI and early-stage urban-tech fund Urban.Us, hosted a demo day today for its fourth cohort of companies at its Brooklyn HQ.  The seven presenting companies offered solutions to issues plaguing modern cities, including toll-road pricing, energy and construction management, and even the inefficiencies of modern cycling helmets. In
0 Comments
Cargo, the startup that helps ridesharing drivers earn money by bringing the convenience store into their vehicles, has raised $22 million in a Series A round led by Founders Fund . Additional investment came from Coatue Management, Aquiline Technology Growth as well as a number of  high-profile entertainment, gaming, and technology executives who include Zynga founder
0 Comments
Joshua Franklin and his father created an election website security research tool, called Election Buster, to study common security failures among congressional websites, as well as fake sites designed to confuse voters. After investigating election website security in 50 states, five territories and Washington, D.C., Franklin discovered malicious activity and poor website security practices. He