0 Comments
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability. SandboxEscaper posted a link to a Github page hosting a proof-of-concept (PoC) exploit for the vulnerability that appears to be a privilege escalation flaw
0 Comments
Chinese startups rule the roost when it comes to total reported venture dollars raised so far in 2018. That is, mostly. In one key category at least — software-as-a-service, better known as SaaS — they do not. Ant Financial raised the largest-ever VC round in June, a mind-boggling $14 billion in Series C funding. And nearly a dozen
0 Comments
There’s some turmoil brewing over at Miami-based facial recognition startup Kairos. Late last month, New World Angels President and Kairos board chairperson Steve O’Hara sent a letter to Kairos founder Brian Brackeen notifying him of his termination from the role of chief executive officer. The termination letter cited willful misconduct as the cause for Brackeen’s
0 Comments
As concern over medical device cybersecurity grows, the U.S. Food and Drug Administration has taken additional steps to help hospitals get in front of the issue, an action commended by one medical device company CEO. The FDA recently announced efforts to strengthen the agency’s medical device cybersecurity program to help device manufacturers identify security vulnerabilities
0 Comments
Having a lack of influence in the boardroom is one reason why 84% of CISOs in North America believe there is no way to avoid a cybersecurity breach, according to a new report from Kaspersky Lab. Results from the report What It Takes to Be a CISO: Success and Leadership in Corporate IT Security, an annual survey
0 Comments
You know what takes 17 minutes? Building a piece of Ikea’s 5-minute furniture. Walking one mile if you’re in decent shape. Making £500k (USD $569,000) if you’re Facebook. The Register crunched the numbers because that sliver of Facebook revenue – £500k (about $640k) – is how much the social media giant has been fined by
0 Comments
At least two Twitter accounts linked to the man suspected of sending explosive devices to more than a dozen prominent Democrats were suspended on Friday afternoon. Facebook moved fairly quickly to suspend Sayoc’s account on the platform, though two Twitter accounts that appeared to belong to Sayoc remained online and accessible until around 2:30 p.m.
0 Comments
This year’s MPOWER Americas was packed with innovative keynote speakers, the MPOWER Partner Summit, tons of sessions, technical deep dives, demos, an Innovation Fair, and much more. Take a look at some of the highlights from this year’s event! [embedded content] “Together is Power” in Action at Partner Summit On Tuesday, we hosted Partner Summit,
0 Comments
As the 2018 midterm elections near, many remain concerned about the security of election infrastructure at the national level, though Steve Grobman, CTO at McAfee, said the realistic security risk lies in an attacker tampering with information and targeting individual counties and states. “A realistic attack wouldn’t require mass voting manipulation or the hacking of
0 Comments
WhatsApp is finally adding stickers to its hugely popular messaging app. The company said today that support for stickers will roll out to Android and iOS users over “the coming weeks.” Initially, the app’s 1.5 billion users will have a seemingly limited selection with the first packs provided by WhatsApp’s own design team and some “other
0 Comments
As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to “bait” victims through a variety of platforms. In fact, we’re seeing a rise in the popularity of phishing via SMS messages, or
0 Comments
According to the 2019 Global ICS & IIoT Risk Report published by CyberX, cyber-criminals are increasingly targeting the vulnerabilities of industrial control systems (ICSs) and the industrial internet of things (IIoT).  The report reflects the findings from data captured over the past 12 months from more than 850 production ICS networks across all industrial sectors. While the
0 Comments
by John E Dunn Mozilla’s ambition to turn Firefox into the number one privacy browser was never going to be easy to pull off. Too few, or ineffective, controls and privacy becomes a benefit in name only. Too many blunt controls and there is a danger of making websites difficult to use in ways that
0 Comments
Siemens AG Siclock central plant clocks were recently found to be affected by several vulnerabilities, some of which have been rated critical. What are these Siemens Siclock flaws and how can they be exploited? German manufacturer and tech giant Siemens recently disclosed six vulnerabilities — three classified as critical — that were found in its
0 Comments
A study on the state of software security released today by CA Veracode evidenced improvements in DevOps security, suggesting that DevSecOps is facilitating better security and efficiency. While the report shows promise on the development side, it also analyzed flaw persistence and measured the longevity of flaws after the initial discovery. Though software security is improving,
0 Comments
Have you recently tried to ditch a mobile app, only to have it keep following you around? If so, you may be a victim of a new crop of uninstall trackers that go beyond letting app developers track bugs and poor user experience: they also let developers track app users “the instant” they give them the
0 Comments
The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users Malware authors keep testing the vigilance of Android users by sneaking disguised mobile banking Trojans into the Google Play store. We’ve recently analyzed a set of 29 such stealthy Trojans, found in