0 Comments
Cyberblackmail/sextortion again raises its not-so-pretty little head Vox Emptoris: “Voice of the Customer” For more than 30 years, I’ve had the privilege of assisting people get rid of viruses and other malicious software.  In the course of doing so, I’ve often been asked questions about computer security-related topics that are not product-specific.  Some are simple or
0 Comments
Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its software to patch a total of nine security vulnerabilities. The Libssh2 library is available for all major distributors of the Linux operating systems, including Ubuntu, Red Hat, Debian, and also comes bundled within some distributions and
0 Comments
On the heels of Hyundai becoming the latest investor in Ola, today another key deal was revealed that underscores Hyundai’s ambitions in next-generation automotive services. Yandex, the Russian search giant that has been working on self-driving car technology, has inked a partnership with Hyundai to develop software and hardware for autonomous car systems. While companies like
0 Comments
Before the next WannaCry or NotPetya cyber-attack strikes, potentially resulting in widespread damage for which few are actually prepared, law enforcement in the EU have established an incident response protocol, according to a Europol press release. “To prepare for major cross-border cyber-attacks, an EU Law Enforcement Emergency Response Protocol has been adopted by the Council
0 Comments
The National Security Agency has a history of releasing its tools to open source and the latest in that lineup, a powerful reverse-engineering tool called Ghidra, has been embraced by infosec professionals after some initial hesitation.  Ghidra, the 35th piece of open source software made public by the NSA, is a modular, cross-platform, Java-based tool
0 Comments
The data breach at Wolverine Solutions Group (WSG) continues to plague the healthcare industry, with more organizations, including Spectrum Healthcare, sending security notices to customers. As was the case for many organizations who have already issued security notices, Spectrum said it has no reason to believe its systems or customer information may have been compromised.
0 Comments
Researchers at vpnMentor have discovered a security vulnerability in Gearbest, a Chinese e-commerce business that reportedly processes hundreds of thousands of sales a day. According to a blog post from vpnMentor’s research team, hackers were able to access different parts of Gearbest’s database, during which time they discovered more than 1.5 million records, ranging from
0 Comments
by Lisa Vaas Back in 2012, Sophos picked up a stash of USB keys from a lost property auction as an experiment. It turned out that they were a scary bunch of sticks: 66% of them contained malware, and not a single one was encrypted. Well, the more things change, the more things USB drive-related
0 Comments
If for some reason your WordPress-based website has not yet been automatically updated to the latest version 5.1.1, it’s highly recommended to immediately upgrade it before hackers could take advantage of a newly disclosed vulnerability to hack your website. Simon Scannell, a researcher at RIPS Technologies GmbH, who previously reported multiple critical vulnerabilities in WordPress,
0 Comments
Mital Makadia’s legal career began on the East Coast, with Big Law firms, but she moved into early-stage startup work with long-time Silicon Valley boutique Grellas Shah nearly a decade ago. She’ll work with companies on a range of usual startup issues, but she and the firm also focus on individual founder representation (when it
0 Comments
Amid widespread speculation that a cyber-attack caused the outage of Facebook‘s services earlier this week, the social media platform contends that the issue was the result of a server configuration change. Despite the array of questions about when it made the change to the server and when it realized that the configuration error had triggered the
0 Comments
Users should waste no time in updating to the browser’s latest version Google has revealed that the update for Google Chrome, rolled out late last week, addressed a security hole that attackers were already exploiting in the wild. “Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild,” the company noted
0 Comments
Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn’t have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks. The critical vulnerability (CVE-2018-20250) that
0 Comments
Two days after Spotify announced that it had filed a suit against Apple with the European Commission over anticompetitive practices, Apple today issued its own response of sorts. In a lengthy statement on its site called “Addressing Spotify’s Claims”, Apple walks through and dismantles some of the key parts of Spotify’s accusations about how the App Store