Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created a toaster that could be turned on and off over the internet for the October ’89 INTEROP conference. Then in 2000, LG announced its first internet refrigerator plans. So on and so forth IoT grew
Microsoft and Adobe have each shipped out their scheduled batches of patches to address security flaws in their respective software. Microsoft’s Patch Tuesday this month is addressing 61 security flaws in Windows and other software, notably in web browsers Internet Explorer and Edge, as well as in Office, Sharepoint, Hyper-V, and the .NET Framework. Seventeen
The European Parliament has just voted to back controversial proposals to reform online copyright — including supporting an extension to cover snippets of publishers content (Article 11), and to make platforms that hold significant amounts of content liable for copyright violations by their users (Article 13). Today’s plenary vote in the European parliament was on
When identity and access management doesn’t get the attention it deserves, there tends to be trouble. For both cloud and on-premises systems, a strong set of security access controls and a tight grasp on identity governance can save enterprises from data exposure or data loss, embarrassment and a damaged reputation. Enterprise systems are becoming increasingly
Microsoft released fixes for over 60 CVEs yesterday as part of its monthly update round, three of which have been publicly disclosed and one which was being actively exploited in the wild. CVE-2018-8440 is an Elevation of Privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) which was disclosed by researcher and Twitter user @SandboxEscaper
by John E Dunn Is the Keybase secure messaging browser extension safe to use or not? Respected researcher Wladimir Palant (of AdBlock Plus fame) is so convinced that it isn’t that he has recommended users “uninstall the Keybase browser extension ASAP,” after he discovered what looks like a gap in its claim to offer end-to-end
Keeping pace with online threats can often feel like you’re plugging holes in a dam with your fingers, as soon as you’ve got one challenge under control, another issue pops up somewhere else. As employers create more flexible work conditions (BYOD, remote workforce, etc. and as mobility increases, organizations are faced with an increasingly complex
Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser, today publicly revealed a critical zero-day flaw in the anonymous browsing software that could reveal your identity to the sites you visit. In a Tweet, Zerodium shared a zero-day vulnerability that resides in the NoScript
The perennial optimists at the Search for Extraterrestrial Intelligence, or SETI, have joined the rest of the world in deploying AI to help manage huge datasets — and their efforts almost instantly bore fruit. 72 new “fast radio bursts” from a mysteriously noisy galaxy 3 billion miles away were discovered in previously-analyzed data by using
British police have arrested a 19-year-old teen who is an alleged member of Apophis Squad cybercriminal group responsible for making hoax bomb threats to thousands of schools and airlines; and DDoSing ProtonMail and Tutanota secure email services. George Duke-Cohan was arrested in his bedroom at his family home in Watford by British National Crime Agency
Reports of Jack Ma’s impending retirement are greatly exaggerated, it seems. Ma, the co-founder and executive chairman of Alibaba, has pushed back on claims that he is on the cusp of leaving the $420 billion Chinese e-commerce firm. The New York Times first reported that the entrepreneur plans to announce that he will leave the firm to pursue
Mobile spyware company mSpy has once again leaked millions of customer records to the public internet. The company develops mobile spyware that customers use to monitor the mobile device activity of their children, partners and others. Security researcher Nitish Shah discovered the mSpy leak via a public-facing database and reached out to cybersecurity journalist Brian
Germany-based researchers found a way to spoof certificates, even those protected with PKI-based domain validation, according to the Register. With nothing more than a laptop, the group was able to steal credentials and eavesdrop on certificate authorities. “We evaluated the attack against a number of CAs and we set up a live (automated) demo against one
British Airways, who describes itself as “The World’s Favorite Airline,” has confirmed a data breach that exposed personal details and credit-card numbers of up to 380,000 customers and lasted for more than two weeks. So who exactly are victims? In a statement released by British Airways on Thursday, customers booking flights on its website (ba.com)
An analysis of ICS (industrial control systems) computers revealed a consistent increase in the percentage of attacks, according to a new ICS CERT report from Kaspersky Lab.   The Kaspersky Lab report, Threat Landscape for Industrial Automation Systems in H1 2018, indicated that 41.2% of ICS computers protected by Kaspersky Lab solutions were attacked by