0 Comments
Investors are still pouring millions into scooter startups, albeit sometimes at flat valuations. At the same time a little cash is flowing the other way, in cases where cities have realized the importance of prioritizing the needs of the local environment and its citizens, over and above the ambitions of VCs for a swift and lucrative
0 Comments
Security researchers have identified a global DNS hijacking campaign, which they say is likely the work of Iranian hackers. According to researchers from FireEye’s Mandiant Incident Response and Intelligence team, the DNS hijacking campaign targeted entities for the past two years across the Middle East and North Africa, Europe and North America “on an almost
0 Comments
For the second time in less than two months, the New York Times has reported that a progressive group of Democrats allegedly leveraged social media sites in a secret project intended to spread false information and sway the 2017 Senate race in Alabama. According to the New York Times, “The ‘Dry Alabama’ campaign, not previously
0 Comments
by Danny Bradbury Old Twitter posts could reveal more about you than you think, according to a research paper released this month. Tweets could reveal places you visited and things you did, even if you didn’t explicitly mention them. Researchers from the Foundation for Research and Technology in Greece and the University of Illinois found
0 Comments
Romero Rodrigues Contributor More posts by this contributor Brazil’s fintech boom offers new vertical opportunities for investors Brazil’s tech-sector bright spots beckon as it begins to emerge from long economic crisis In late October following a significant victory for Jair Bolsonaro in Brazil’s presidential elections, the stock market for Latin America’s largest country shot up. Financial
0 Comments
The widespread popularity of SaaS applications, BYOD and millions of unsecure IoT devices has effectively eliminated the notion of a hardened perimeter where IT and security organizations can control access to their sensitive data. Software-defined perimeter (SDP) technology makes users and devices invisible and inaccessible to outside attacks. An alternative to VPN technology, SDP can
0 Comments
The healthcare sector continues to be the target of cyberattacks, with Managed Health Services (MHS) of Indiana Health Plan announcing recently that a third-party data breach potentially exposed up to 31,000 patients’ personal data in one of two security incidents the company has disclosed in the past month. The organization reportedly manages Indiana’s Hoosier Healthwise
0 Comments
This week, the Las Vegas Convention Center was packed with many of the year’s biggest new devices. But over the last several years, The Sands has become the place where the real magic happens. The segment of the show known as Eureka Park is where the startups and accelerators congregate, often times showing off products
0 Comments
The US government shutdown is having a chilling effect on national cybersecurity, with 80 government web certificates having already expired without being renewed and FBI agents issuing a stark warning. Vendor Netcraft claimed on Thursday that the lapsed certificates include those affecting “sensitive government payment portals and remote access services” at agencies like NASA, as
0 Comments
by Lisa Vaas It’s time to crown a new sysadmin From hell. Or from heaven, if you’re law enforcement. His name is Cristian Rodríguez: a Colombian IT geek who wound up working for drug kingpin “El Chapo” Joaquin Guzmán, got flipped by the FBI, and is likely going to go down in history as being
0 Comments
Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability is being exploited in the wild and was originally reported by a researcher from Google’s Threat Analysis Group. Microsoft released an out-of-band patch to fix the vulnerability before the normal patch cycle. McAfee products received
0 Comments
The world’s highest-valued artificial intelligence startup SenseTime has set foot in Japan. The Beijing-based firm announced on Friday that it just opened a self-driving facility in Joso, a historic city 50 kilometers away from Tokyo where it plans to conduct R&D and road test driverless vehicles. The initiative follows its agreement with Japanese auto giant Honda in
0 Comments
Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week. The unprotected 854.8 gigabytes of the database was stored in an instance of MongoDB, a NoSQL high performance and cross-platform document-oriented database, hosted by an
0 Comments
A simplified interpretation of Moore’s Law is that the overall processing power of computers will double every two years — and will lead to quantum computing. Although many experts believe physical and economic limitations are finally beginning to slow down this rate of progression, the incredible increase in computing power over the last 50 years
0 Comments
Security researchers have spotted a new series of DNS hijacking attacks successfully targeting organizations globally on a large scale and traced back to Iran. The attacks have managed to compromise “dozens” of domains run by government, telecommunications and internet infrastructure in the Middle East and North Africa, Europe and North America. In so doing, they
0 Comments
by John E Dunn For decades hot tubs were simple water-bearing garden luxuries that owners looked forward to relaxing in of an evening. More recently, manufacturers started adding exciting Internet of Things (IoT) features that product marketing departments worked themselves into a lather promoting as the next must-have. These IoT-enabled hot tubs look identical to
0 Comments
What’s in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large? There is a certain singularity to CES (Consumer Electronics Show), where vehicles, security, and a host of other technologic doodads unite around a given platform, in this case the car. As these converge,