News

  • Using Radar to Read Body Language

    PRIVACY PRIVACY Yet another method of surveillance: Radar can detect you moving closer to a computer and entering its personal space. This might mean the computer can then choose to perform certain actions, like booting up the screen without requiring you to press a button. This kind of interaction already exists in current Google Nest…

    Read More

  • Critical flaws in remote management agent impacts thousands of medical devices

    PRIVACY PRIVACY Critical vulnerabilities in a software agent that’s used for remote management could allow hackers to execute malicious code and commands on thousands of medical and other types of devices from healthcare, manufacturing and other industries. Patches have been issued by the software agent’s developer, but most of the affected device vendors will need…

    Read More

  • Working with MSSPs to optimize XDR

    PRIVACY PRIVACY Businesses today have many tools in their security stack and security teams find themselves spending too much time managing the tools and not enough time tackling business-critical projects. Security tool overload creates internal challenges and distracts from the primary business mission. How can companies better protect themselves while staying on track to achieve…

    Read More

  • Coinbase: We’re Blocking 25,000 Russian Accounts

    PRIVACY PRIVACY Crypto firms say digital currency unlikely to be used to evade sanctions Read More

    Read More

  • Scores of US Critical Infrastructure Firms Hit by Ransomware

    PRIVACY PRIVACY FBI reveals concerning new details of RagnarLocker campaigns Read More

    Read More

  • Clearview AI commercialization of facial recognition raises concerns, risks

    PRIVACY PRIVACY The year is 2054 and a man walks into a Gap store. The virtual salesperson greets him by name, “Hello Mr. Yakomoto. Welcome back to the Gap,” from the life-size video monitor. This famous scene is cribbed from the film Minority Report. The prescience displayed in the 2002 film has actually short-changed the…

    Read More

  • Strangest social engineering attacks of 2021

    PRIVACY PRIVACY New research has highlighted the creative and occasionally unusual lengths fraudsters take to carry out social engineering attacks. Proofpoint has listed what it describes as the five strangest social engineering scams it detected last year, with campaigns including the spoofing of soccer coaches and scholars to trick victims into parting with data and…

    Read More

  • Dirty Pipe Exploit Rings Alarm Bells in the Linux Community

    PRIVACY PRIVACY New discovery could give attackers full control over a targeted system Read More

    Read More

  • Conti Ransomware Group Diaries, Part IV: Cryptocrime

    PRIVACY PRIVACY Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured…

    Read More

  • PressReader Suffers Cyber-Attack

    PRIVACY PRIVACY Access blocked to 7000 publications after strike on world’s largest digital newspaper distributor Read More

    Read More

News, Advisories and much more

Exit mobile version