Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as well. Smominru, an infamous cryptocurrency-mining and credential-stealing botnet, has become one of the rapidly spreading computer
How brands and marketers can harness the power of new messaging and productivity apps Colin Bendell 7 hours Colin Bendell Contributor Colin is Senior Director of Analytics and Strategy for Cloudinary, the co co-author of High Performance Images, and passionate about data, web performance and user experience. Brands are often left to act like the
A new government-backed report has warned that the growing use of automation and machine learning algorithms in policing could be amplifying bias, in the absence of consistent guidelines. Commissioned by the Centre for Data Ethics and Innovation (CDEI), which sits in the Culture Department, the report from noted think tank the Royal United Services Institute
by Lisa Vaas An Ohio gamer who got into a spat over a $1.50 wager that led to the death-by-swatting of an innocent man has been sentenced to 15 months in prison, the Department of Justice (DOJ) announced on Friday. Casey S. Viner, 19, pleaded guilty to one count of conspiracy and one count of
The boom in popularity for podcasting has given a new voice to the world of spoken word content that had been largely left for dead with the decline of broadcast radio. Now riding the wave of that growth, a startup called Descript that’s building tools to make the art of creating podcasts — or any
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22 billion2 – play their game of choice on a PC. The sheer number of PC gamers throughout the world, however, has sparked the interest of cybercriminals and cyberthreats targeting gamers have spiked. Threats including malware,
The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists Almost every single citizen of Ecuador, a country of some 16.6 million people, is believed to have been affected by a new massive data leak, reads a report from vpnMentor. Two weeks ago, the firm discovered
The United States government today filed a lawsuit against Edward Snowden, a former employee of the CIA and NSA government agencies who made headlines worldwide in 2013 when he fled the country and leaked top-secret information about NSA’s global and domestic surveillance activities. And you would be more surprised to know the reason for this
Navin Chaddha Contributor Navin Chaddha leads Mayfield. The firm invests in early-stage consumer and enterprise technology companies and currently has $2.7 billion under management. More posts by this contributor The renaissance of silicon will create industry giants A people-first view of investing in innovation or entrepreneurs who take people for granted will fail We face
A new testing service has been launched with the aim of gauging and ranking job candidates based on their technical skillsets. TechRank, created by Pioneer Labs, is run by tech consultants and sources, tests and objectively ranks tech talent, helping companies hire the best and most capable person for tech-based roles. TechRank seeks to eliminate the subjectivity
After nine years running, DerbyCon held its ninth and final show, and attendees and a co-founder looked back on the conference and discussed plans to continue the community with smaller groups around the world. DerbyCon was one of the more popular small-scale hacker conferences held in the U.S., but organizers surprised the infosec community in
by Danny Bradbury Kyle Milliken is back from jail, and he has some advice for you. The 30-year-old hacker from Arkansas, according to his blog, at age 17 began phishing celebrity Myspace accounts and using them to send internet marketing spam. After earning $5,000 per week, he evolved to hack millions of email, forum, and
Let’s get this out of the way right up front: iPhone 11’s Night Mode is great. It works, it compares extremely well to other low-light cameras and the exposure and color rendition is best in class, period. If that does it for you, you can stop right here. If you want to know more about
According to an analysis by McAfee’s cloud division, log data tracking the activities of some 200,000 government workers in the United States and Canada, show that the average agency uses 742 cloud services, on the order of 10 to 20 times more than the IT department manages. The use of unauthorized applications creates severe security
The massive data breach at Capital One – America’s seventh-largest bank, according to revenue – has challenged many common assumptions about cloud computing for the first time. Ironically, the incident, which exposed some 106 million Capital One customers’ accounts, has only reinforced the belief that the cloud remains the safest way to store sensitive data.
Waymo transported 6,266 passengers in self-driving Chrysler Pacifica minivans in its first month participating in a robotaxi pilot program in California, according to a quarterly report the company filed with the California Public Utilities Commission. In all, the company completed 4,678 passenger trips in July — plus another 12 trips for educational purposes. It’s a
Israeli police have arrested several employees of a domestic company that makes cyber-surveillance tools and raided its offices over the weekend, according to local reports. Although a court order has prevented many details of the case from making it into the public domain, including the identity of the suspects, the arrests were apparently made under
by Lisa Vaas The Republic of the Marshall Islands (RMI) is forging ahead with its plans to issue a blockchain-based, national currency – the Marshallese sovereign (SOV). This is in spite of naysayers (including the US government) predicting that it will be unstable, and/or will crash the local telecom system of this tiny Pacific island
Mitto, a debit card and app designed for “Generation Z” teens, has raised €2 million in seed funding. Backing the round is Spanish bank Banco Sabadell via its innovation and venture arm InnoCells, along with Athos Capital, and Spanish social media influencers “AuronPlay” and “Wismichu”, amongst others. Claiming to plug a gap in existing payment
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole
Estonian based web security startup WebARX, the company who is also behind open-source plugin vulnerability scanner WPBullet and soon-to-be-released bug bounty platform plugbounty.com, has a big vision for a safer web. It built a defensive core for websites which is embedded deep inside the company’s DNA as even ARX in their name refers to the
Julian Shapiro Contributor Julian Shapiro is the founder of BellCurve.com, a growth marketing agency that trains you to become a marketing professional. He also writes at Julian.com. More posts by this contributor How to work with top influencers and avoid ad blockers The secret of content marketing: avoid high bounce rates We’ve aggregated the world’s
Two employees of a Colorado cybersecurity firm hired to test the security of an Iowa courthouse have been charged with burglary after allegedly breaking into the building. Gary Edward Demercurio, 43, of Seattle, Wash., and Justin Lawson Wynn, 29, of Naples, Fla., were arrested at approximately 1 a.m. on Wednesday morning after being found inside
by Danny Bradbury There’s another vulnerability in Intel chips, with another catchy name: NetCAT. The researchers who discovered it say that attackers could use it to find out what other users on a server are typing. Don’t recoil in horror yet, though – exploiting it would be a challenge. The attack revolves around a technology
In its first half-decade of existence, PopSocket has grown into one of the most popular — and imitated — smartphone accessories on the market. In 2018 alone, the company generated $90 million in profit. Not to bad for a little Colorado-based upstart. So, where does an utterly dominated accessory maker go from here? Beverages, naturally.
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase.
The United States Treasury Department on Friday announced sanctions against three state-sponsored North Korean hacking groups for conducting several destructive cyberattacks on US critical infrastructure. Besides this, the hacking groups have also been accused of stealing possibly hundreds of millions of dollars from financial institutions around the world to ultimately fund the North Korean government’s
Julian Shapiro Contributor Julian Shapiro is the founder of BellCurve.com, a growth marketing agency that trains you to become a marketing professional. He also writes at Julian.com. More posts by this contributor The secret of content marketing: avoid high bounce rates How to see another company’s growth tactics and try them yourself We’ve aggregated the
American software giant Symantec is cutting hundreds of jobs at four different sites across the US as part of a $100 million restructuring program. Government filings of notices made by the company in August under the Worker Adjustment and Retraining Notification (WARN) Act indicate that the roles of 230 Symantec employees will be terminated on October 15,
Network bridges and switches are distinctly different, serving separate functions. A bridge is a point-to-point… connection joining two LANs using the same protocol, such as Ethernet. A switch is a multiport bridge that connects multiple clients and chooses the packet path on the network. Every switch is a bridge, but bridges are not truly switches.