-
Using Radar to Read Body Language
PRIVACY PRIVACY Yet another method of surveillance: Radar can detect you moving closer to a computer and entering its personal space. This might mean the computer can then choose to perform certain actions, like booting up the screen without requiring you to press a button. This kind of interaction already exists in current Google Nest…
-
Critical flaws in remote management agent impacts thousands of medical devices
PRIVACY PRIVACY Critical vulnerabilities in a software agent that’s used for remote management could allow hackers to execute malicious code and commands on thousands of medical and other types of devices from healthcare, manufacturing and other industries. Patches have been issued by the software agent’s developer, but most of the affected device vendors will need…
-
Working with MSSPs to optimize XDR
PRIVACY PRIVACY Businesses today have many tools in their security stack and security teams find themselves spending too much time managing the tools and not enough time tackling business-critical projects. Security tool overload creates internal challenges and distracts from the primary business mission. How can companies better protect themselves while staying on track to achieve…
-
Coinbase: We’re Blocking 25,000 Russian Accounts
PRIVACY PRIVACY Crypto firms say digital currency unlikely to be used to evade sanctions Read More
-
Scores of US Critical Infrastructure Firms Hit by Ransomware
PRIVACY PRIVACY FBI reveals concerning new details of RagnarLocker campaigns Read More
-
Clearview AI commercialization of facial recognition raises concerns, risks
PRIVACY PRIVACY The year is 2054 and a man walks into a Gap store. The virtual salesperson greets him by name, “Hello Mr. Yakomoto. Welcome back to the Gap,” from the life-size video monitor. This famous scene is cribbed from the film Minority Report. The prescience displayed in the 2002 film has actually short-changed the…
-
Strangest social engineering attacks of 2021
PRIVACY PRIVACY New research has highlighted the creative and occasionally unusual lengths fraudsters take to carry out social engineering attacks. Proofpoint has listed what it describes as the five strangest social engineering scams it detected last year, with campaigns including the spoofing of soccer coaches and scholars to trick victims into parting with data and…
-
Dirty Pipe Exploit Rings Alarm Bells in the Linux Community
PRIVACY PRIVACY New discovery could give attackers full control over a targeted system Read More
-
Conti Ransomware Group Diaries, Part IV: Cryptocrime
PRIVACY PRIVACY Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured…
-
PressReader Suffers Cyber-Attack
PRIVACY PRIVACY Access blocked to 7000 publications after strike on world’s largest digital newspaper distributor Read More