0 Comments
by Paul Ducklin In the past few days, we’ve written about both Mozilla and Google adopting DNS-over-HTTPS in their browsers. We’re supposed to use HTTPS wherever we can, so “something-over-HTTPS” sounds as though it ought to be more secure than “the-same-something-not-encrypted-at-all”… …and yet not everyone is happy about this whole DNS-over-HTTPS thing. Can more security
0 Comments
Shares of Cloudflare rose 20% today in its first day of trading on the public market, opening trading at $18 after it priced its IPO at $15 a share yesterday and holding steady through the day. Put another way, the performance of the nine-year-old company — which provides cloud-based network services to enterprises — was relatively
0 Comments
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers: Endgame” actor Robert Downey Jr. was added to the list of celebrities whose social media accounts have been compromised. According to Bleeping Computer, a hacker group managed to take control of the actor’s Instagram account, sharing
0 Comments
Speaking at 44CON, Pen Test Partners researchers Tony Gee and Vangelis Stykas demonstrated vulnerabilities in GPS trackers, which enabled them to call premium rate phone numbers, and possibly influence the outcome of television talent shows. Gee said that there is demand for GPS trackers, which are used in watches for kids, cars and even on
0 Comments
It’s time for two important disciplines — business continuity and its related initiatives and cybersecurity — to collaborate better. Typically, cybersecurity and business continuity operate in different silos, but I’m keen to move them closer together, as they are both important elements of an organization’s resilience. For example, a cybersecurity event, which is initially addressed
0 Comments
Felicis Ventures has, in its roughly 13 years of existence, established a reputation in venture circles as a smart early-stage investment firm that’s willing to make bets almost anywhere in the world. Founded by ex-Googler Aydin Senkut, the San Francisco-based firm has also demonstrated a knack for attracting talented investors into the fold, including another
0 Comments
The past 15 years has seen huge changes in the cybersecurity-related search terms internet users are deploying to find out more about the industry, with anti-virus supplanted by emerging next-gen solutions, according to new data from RedScan. Taking its cue from Google’s Year in Search report, the security vendor decided to analyze the past decade-and-a-half of
0 Comments
by Danny Bradbury Following hot on Mozilla’s trail, Google officially announced its own DNS-over-HTTPS (DoH) experiment in Chrome this week. Mozilla recently announced that it would turn on DoH by default for users of the Firefox browser’s desktop version in the US. This provides some privacy protections compared with regular DNS queries, although as Paul
0 Comments
This year, we’re excited to host the 12th annual MPOWER Cybersecurity Summit at the ARIA in Las Vegas, where fellow security experts will strategize, network, and learn about the newest and most innovative ways to ward off advanced cyberattacks. With the show nearly upon us, I’m sharing a “survival guide” for first-time attendees and anyone
0 Comments
Are you – and especially your children – aware of the risks that may come with sharing selfies? Social media sites are brimming with instant self-portraits, and children and teens are especially adept at taking and sharing images of themselves online. But it can be just as safely assumed that tweens and teens, and not
0 Comments
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with every changing detail. Finding the right balance that enables them to clearly grasp the big picture required in making sound decisions is a task many security executives find challenging. Threat actors
0 Comments
Keeping a unified communications environment secure is no small task as the different communications tools that comprise a UC system have their own security needs. And organizations can’t push all the security responsibilities onto their UC vendor. Organizations must take steps to lock down their networks to support unified communications security. Learn how to build
0 Comments
Relativity Space, the startup developing manufacturing technologies for entirely 3D printed rockets and space equipment, has signed its latest paying customer, the orbital transportation startup, Momentus. Relativity’s Terran 1 rocket will carry Momentus’ small and medium-sized satellite payloads on its rocket and Momentus will then move those satellites into geosynchronous orbit using its own in-space
0 Comments
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s largest dedicated cybersecurity firm, McAfee, has revealed that two thirds (67%) of Aussies are embarrassed by the content that appears on their social media profiles. Yikes! And just to make the picture even more complicated,
0 Comments
The new Apple Watch is even harder to distinguish from its predecessor than the new iPhone. Given the fact that Fitbit’s smartwatches appear more and more Apple-like with every new generation, however, maybe the company’s onto something here. Like the iPhone, Apple hasn’t touched the Watch’s design for a while now, leading one to wonder
0 Comments
by John E Dunn A ‘critical’ security vulnerability has been discovered in the Exim mail server that requires admins’ urgent attention. Affecting all versions from 4.80 up to and including 4.92.1, Exim’s maintainers have offered a general description of the flaw (CVE-2019-15846) discovered in July 2019 by a researcher identified as ‘Zerons’. Subsequently confirmed by