Cyber Security

This is where news and updates on Cyber Security are published on a daily basis.

0 Comments
An executive order and cooperation from the Department of Commerce will effectively ban Huawei from dealing with U.S. businesses. Following months of lobbying by the White House, President Donald Trump signed an executive order late Wednesday aimed at “securing the information and communications technology and services supply chain.” In the executive order, Trump declared a
0 Comments
A high-risk vulnerability in Cisco‘s secure boot process was disclosed earlier this week by Cisco and Red Balloon Security and is believed to have affected an estimate 100 or more devices. The vulnerability (CVE-2019-1649) is “in the logic that handles access control to one of the hardware components in Cisco’s proprietary Secure Boot implementation could allow
0 Comments
Kyle Fugere Contributor More posts by this contributor The Importance Of Design Thinking For Big Data Startups Over the past five years, there has been a clear drop in seed investing. Between 2010 and 2014 there was an influx of “micro” VCs, perfectly equipped to deploy seed capital. Since then, we have seen a gradual
0 Comments
In a joint effort by several law enforcement agencies from 6 different countries, officials have dismantled a major global organized cybercrime behind GozNym banking malware. GozNym banking malware is responsible for stealing nearly $100 million from over 41,000 victims across the globe for years. GozNym was created by combining two known powerful Trojans—Gozi ISFB malware,
0 Comments
Calling all startup fans across Europe and around the world. The TechCrunch crew’s planning return-trip number seven to host Disrupt Berlin 2019 on 11-12 December. The official registration doesn’t open until June, but we’ve got a little sumpin’ sumpin’ to save you serious money right now. Are you in? Simply sign up for our mailing list before registration
0 Comments
After analyzing the top three breaches from the past three years, Bitglass found that in the aftermath of a data breach, a decrease in stock price was a notable repercussion identifiable for publicly traded companies. The report, Kings of the Monster Breaches, identified the extensive damage done by improper security by looking specifically at the Marriott
0 Comments
Alex Chuang Contributor Alex Chuang is the Managing Partner of Shape Immersive, a boutique studio that helps enterprise and brands transform their businesses by incorporating VR/AR solutions into their strategies. More posts by this contributor The fall of the unicorns brings a new dawn for water bears British science fiction writer, Sir Arther C. Clark,
0 Comments
Academic researchers today disclosed details of the newest class of speculative execution side-channel vulnerabilities in Intel processors that impacts all modern chips, including the chips used in Apple devices. After the discovery of Spectre and Meltdown processor vulnerabilities earlier last year that put practically every computer in the world at risk, different classes of Spectre
0 Comments
Lawmakers in San Francisco will vote today on legislation that would ban the use of facial recognition technology among city departments, according to NPR. If approved, the law would make San Francisco the first city to ban the technologies use, a ban that would extend to police body cameras. “Governments have used the technology for
0 Comments
We’re looking for fearless early-stage startup founders who want to launch their business on a global stage. We’re talking about competing in Startup Battlefield, our legendary, life-altering pitch-off that takes place at Disrupt San Francisco 2019 on October 2-4. Do you have what it takes to be legendary? Apply right here and find out. What
0 Comments
ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software In July 2018 we discovered that the Plead backdoor was digitally signed by a code-signing certificate that was issued to D-Link Corporation. Recently we detected a new activity involving the
0 Comments
In the world of enterprise IT, it’s not uncommon for people to incorrectly refer to the terms identity management with access management while in conversation. In reality, the two terms cover completely different areas. The main reason people get confused about an identity and access management framework is that the two processes work in tandem
0 Comments
Malicious or criminal attacks accounted for nearly twice as many data breaches as those resulting from human error during the first quarter of 2019, according to the Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC). The report, published today, marks the start of Australia’s Privacy Awareness Week. “By understanding the