Like many others, do you also believe that the popular system-cleaning tool CCleaner was performing well before Avast acquired the software from Piriform last year? If yes, then pop-up advertisements in the previous CCleaner software version was not the last thing you have to deal with. Avast has released a new version of CCleaner 5.45
I’m proud to say that McAfee has received recognition from our customers with the 2018 Gartner Peer Insights Customers’ Choice for the Security Information and Event Management (SIEM). This is a recognition of high satisfaction from a number of reviews by verified end-user professionals. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors
Amazon Rapids, the chat fiction that encourages kids to read by presenting stories in the form of text message conversations, is now going free. Previously, Amazon had been charging $2.99 per month for a subscription that allows unlimited access to its story collection, which now numbers in the hundreds. First launched in November 2016, Amazon
Starbucks is palling up with Alibaba as it seeks to rediscover growth for its business in China. China has been a bright spot for some time for the U.S. coffee giant, but lately it has struggled to maintain growth — its China business dragged on its Q3 financials — and it is up against some
The White House published the Cybersecurity National Action Plan, or CNAP, in February to address what the president sees as weakness in cybersecurity preparedness across the country — problems within the federal government, private sector business, even within citizens’ private lives. The cybersecurity plan is a continuation of the Obama administration’s efforts to increase the
The Department of Homeland Security (DHS) has announced the creation of a new cyber-risk management center intended to protect the nation’s banks, energy companies and other industries from potentially crippling cyber-attacks on critical infrastructure, according to agency officials who spoke at the 31 July cybersecurity summit hosted by DHS. DHS Secretary Kirstjen Neilsen led a
by Lisa Vaas On 12 July, Los Angeles police arrested a 20-year-old college student from Boston at the LA International Airport. Bound for Europe, he was lugging a Gucci bag: only one piece of swag among many that prosecutors allege were bought with the proceeds of cryptocurrency that he ripped off in SIM swap scams.
But don’t get too excited just yet: the first-of-its-kind bug bounty program for printers is invite-only for now Researchers can earn up to $10,000 for identifying security flaws in printers made by HP in what is the first bug bounty program aimed specifically at printers, according to an announcement by the tech giant on Tuesday.
After an eight-year-long absence from the most populated country in the world, Google search is going to dramatically make a comeback in China. Google is reportedly planning to launch a censored version of its search engine in China that is going to blacklist certain websites and search terms to comply with Chinese government’s attempts to
With the tagline, “giving you the best of the internet in one place,” Reddit is a popular website designed for discussion, news aggregation, and the creation of social content. Boasting over 330 million users, the platform is characterized by an engaged community. Which also means it contains treasure troves of consumer data. Unfortunately, there’s now
CBS is today debuting a new portfolio of streaming services designed to deliver local news to cord cutters and other digital media consumers. The services, branded CBSN Local, will live under the CBSN brand – the 24/7 news channel first launched in November 2014 that made its way to the CBS All Access streaming service last August.
Uber is making calls to some of its customers in New York City, offering to connect them to local council members to express their opposition to the proposed legislation that would cap the number of ride-hailing drivers in the city, BuzzFeed first reported. Meanwhile, Lyft is also reaching out to its NYC-based riders, asking them to
Check Point Research uncovered an extensive malvertising campaign that has ties to legitimate online advertising companies. Check Point’s report, titled “A Malvertising Campaign of Secrets and Lies,” detailed how a threat actor group used more than 10,000 compromised WordPress sites and multiple exploit kits to spread a variety of malware, including ransomware and banking Trojans.
Attackers are leveraging a new technique that allows them to run a specious file that looks legitimate but is actually malicious, according to the research team at Cyberbit. The component object model (COM) hijacking technique, usually used for attackers as a persistence mechanism, also has evasive capabilities. A proof-of-concept experiment run by the Cyberbit research
by Paul Ducklin Fake support scams aren’t new – they’ve been plaguing our phones, our ears and our wallets for years. They generally follow one of two main patterns: active or reactive. Active support scams rely on unlawfully acquired lists of phone numbers – the scammers call you, in blind disregard of any Do Not
With this update, Microsoft is bringing a feature for Android users that has been available on iOS devices for quite a while now Android users can now use their fingerprints as digital keys to their OneDrive cloud storage after Microsoft has added support for fingerprint authentication to its OneDrive app for Android. The new feature
Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example. New research revealed that the SamSam ransomware had extorted nearly $6 million from its victims since December 2015, when the cyber gang behind the ransomware started distributing the malware in the wild. Researchers at Sophos have tracked Bitcoin addresses
The GandCrab ransomware first appeared in January and has updated itself rapidly during its short life. It is the leading ransomware threat. The McAfee Advanced Threat Research team has reverse engineered Versions 4.0 through 4.2 of the malware. The first versions (1.0 and 1.1) of this malware had a bug that left the keys in
Real estate developers and their properties are getting an opportunity to cash in on power management and surplus energy production thanks to a new company called Blueprint Power. It’s a new twist on an old idea dating back to the first clean tech boom based on ideas of demand response and power management. Companies like
Civil, the blockchain-based journalism organization, is casting its eye to Asia after it set up a $1 million fund that’s aimed at seeding 100 new media projects across the continent over the next three years. The organization has teamed up with Splice, a Singapore-based media startup which will manage the fund, according to an announcement. There’s
Struggling against competition from Chinese smartphones, Samsung Electronics posted a lackluster second-quarter earnings report with its slowest profit growth in more than a year. On the bright side, the Korean tech giant said its semiconductor business is doing well. Operating profit rose 5.7% year-over-year to 14.9 trillion won (about $13.3 billion), representing Samsung Electronic’s slowest
Logitech today announced its intention to acquire Blue Microphones, the hardware company behind popular podcasting microphones like the Yeti and Snowball. It’s a pretty logical acquisition, as far as these things goog –Logitech already operates in the audio space, with speakers and gaming headsets. The acquisition of Blue would add an important dimension to that
When you think of “Firefox,” you probably think of something that looks like this: Or, perhaps, something like this: That logo (or some iteration between the two) has been the browser’s logo since it launched back in 2002. Its time for change, Mozilla says. In a blog post about “evolving the Firefox brand,” Mozilla Creative
Google has hired Richard Marks, Sony’s Magic Lab head who was behind much of the company’s VR efforts, to a position in its Advanced Technology and Projects group, VentureBeat reports. Google confirmed the hire to TechCrunch, sending along a statement from ATAP head Dan Kaufman. “ATAP is at the intersection of science and application where our
I know a guy named Ben. Ben is a white-hat hacker who works to protect billion-dollar assets. The adversaries he defends against are hardcore. Ben and I worked at the same place a few years back. He taught me a very important lesson about deployment security: Never trust a pre-compiled binary. Ben had a justifiable
By using the HiBids advertising platform, cyber-criminals have been delivering malicious advertisements to millions of victims worldwide in a large-scale malvertising and banking Trojan campaign, according to researchers at Check Point. These malicious ads can infect the PC or mobile device of the person viewing the ads with malware, such as a crypto-miner, ransomware or a banking
by Lisa Vaas Idaho prison officials said on Thursday that 364 inmates in five of the state’s prisons exploited vulnerable software in the JPay tablets they use for email, music and games in order to pump up the cash balances of their accounts. The inmates transferred nearly $225K into their JPay accounts, according to the
Another day, Another data breach! This time-sensitive and personal data of hundreds of thousands of people at Boys Town National Research Hospital have been exposed in what appears to be the largest ever reported breach by a pediatric care provider or children’s hospital. According to the U.S. Department of Health and Human Services Office for
Hot on the heels of the effective legalization of 3D models used to print firearm components, 21 states have filed a joint lawsuit against the federal government, alleging not only that decision is dangerous but also that it’s illegal for a number of reasons. But the lawsuit may backfire via the so-called Streisand Effect, further
The sequel to the legendary, and legendarily difficult, indie sleeper hit La-Mulana has finally been released, and all gamers with a penchant for retro-style platforming and a broad masochistic streak are encouraged to descend into its depths. If there were a gaming achievement hall of fame, surely one of the rarest feats would be beating