Philip Choo

0 Comments
A prolific malware, dubbed Ursnif, has resurfaced with new features, including the ability to bypass a popular Japanese antivirus software called PhishWall, according to Cybereason. Described as one of the most prolific information-stealing malware programs, Ursnif has been around since at least 2013. For nearly three months, researchers have been observing a campaign that has
0 Comments
by Lisa Vaas Facebook on Friday sued two Ukrainian men, Andrey Gorbachov and Gleb Sluchevsky, for allegedly scraping private user data through malicious browser extensions that masqueraded as quizzes. The company also alleges that the deceptive extensions injected unauthorized ads into Facebook users’ News Feeds when their victims visited through the compromised browsers. From Facebook’s
0 Comments
Mounir Mahjoubi Contributor On March 12, 2019, we celebrate the 30th anniversary of the “World Wide Web”, Tim Berners-Lee’s ground-breaking invention. In just thirty years, this flagship application of the Internet has forever changed our lives, our habits, our way of thinking and seeing the world. Yet, this anniversary leaves a bittersweet taste in our
0 Comments
Despite Austin’s South by Southwest (SXSW) conference and festival being largely focused on film and music, 2020 presidential candidates arrived in Texas ready to talk about data privacy and cybersecurity. On March 8, Sen. Elizabeth Warren made headlines for her promise to break up big tech companies such as Amazon, Google, Facebook and Apple, while Sen.
0 Comments
by Danny Bradbury The US Army has been forced to clarify its intentions for killer robots after unveiling a new program to build AI-powered targeting systems. The controversy surrounds the Advanced Targeting and Lethality Automated System (ATLAS). Created by the Department of Defense, it is a program to develop: Autonomous target acquisition technology, that will
0 Comments
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to your machine. Thunderbolt ports are convenient for charging other devices using your laptop or desktop’s battery power. However, a new flaw called Thunderclap allows attackers to steal sensitive information such as passwords, encryption keys, financial
0 Comments
Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software This is not the first time the gaming industry has been targeted by attackers who compromise game developers, insert backdoors into a game’s build environment, and then have their malware distributed as legitimate software. In April 2013, Kaspersky Lab reported that
0 Comments
From 3500 feet up California is a glorious patchwork quilt of green and gold, textured by rippling mountains and shining water. Ahead of us we see the Carquinez Bridge and the Bay; behind us, the fingers of Lake Berryessa curl into the steep hills. Twenty minutes ago I stood barefoot in the soft grass on
0 Comments
A September 2018 ransomware attack on Wolverine Solutions Group (WSG) has had widespread impact, resulting in hundreds of thousands of customers being warned that their personal information may have been part of a data breach, according to Detroit Free Press. In a statement to its clients, Wolverine Solutions Group wrote, “On approximately September 25, 2018, WSG
0 Comments
Beatrice Fihn Contributor “Atomic bombs are primarily a means for the ruthless annihilation of cities.” Those are the words of Leo Szilard, one of the scientists who pushed for the development of nuclear weapons. He wrote them as part of a petition signed by dozens of other scientists who had worked on the Manhattan Project
0 Comments
Cybersecurity researcher at Google’s Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified. Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS