Business


Posts filtered by tags: Security[x]


 

Identity platform Auth0 raises $103M, pushing its valuation over $1B

Auth0, a 2013-founded identity and authentication platform, has pushed into unicorn territory with a $1 billion valuation after raising $103 million in its latest Series E round. The round was led by Sapphire Ventures, with participation from K9 Ventures, Telstra Ventures and several others. In all, Auth0 total funding tops $210 million to date. Auth0 — pronounced “auth-zero” — provides authentication-as-a-service to its corporate customers — or, to everyone else, a secure login system use...
Tags: Security, Auth0, Authentication, Buenos Aires, Computer Security, Cryptography, London, Multi-factor Authentication, Password, Sapphire Ventures, Series E, Sydney


Google’s own data proves two-factor is the best defense against most account hacks

Every once in a while someone will ask me what is the best security advice. The long answer is “it depends on your threat model,” which is just a fancy way of saying what’s good security advice for the vast majority isn’t necessarily what nuclear scientists and government spies require. My short answer is, “turn on two-factor.” Yet, nobody believes me. Ask almost any cybersecurity professional and it’ll likely rank as more important as using unique or strong passwords. Two-factor, which adds an ...
Tags: Security, Account, Authenticator, California, Computer Security, Cryptography, Cybercrime, Multi-factor Authentication, Password, Phishing, Security Token


‘Crypto exchange’ Goxtrade caught using other people’s photos on its staff page

Alleged cryptocurrency exchange Goxtrade bills itself as a “trusted platform for trading bitcoins,” but its staff page is filled with photos of people of pulled seemingly at random from the internet. The alleged exchange, which claimed to debut in 2017 yet its website is only a little more than a week old, used photos taken from social media profiles and other company websites not associated with the company. Bizarrely, the alleged exchange didn’t bother to change all of the names of the people ...
Tags: Security, London, Money, Germany, Tech, Economy, Bitcoin, Melbourne, Ryan Gosling, Illinois, Cloudflare, Cryptocurrencies, Phishing, Cryptocurrency, Blockchain, Yandex


Grifty "information security" companies promised they could decrypt ransomware-locked computers, but they were just quietly paying the ransoms

Ransomware has been around since the late 1980s, but it got a massive shot in the arm when leaked NSA cyberweapons were merged with existing strains of ransomware, with new payment mechanisms that used cryptocurrencies, leading to multiple ransomware epidemics that locked up businesses, hospitals, schools, and more (and then there are the state-level cyberattacks that pretend to be ransomware). The boom in ransomware infections is also a boom for companies that provide services to the infe...
Tags: Security, Business, Video, News, Nsa, US, Iran, Fraud, Ransomware, Fbi, John Pistole, Ripoffs, Mueller, Pistole, Late Stage Capitalism, Samsam


Zombieload forces a choice between performance and security. What will you do?

Intel has handled the recent discovery of a security vulnerability in its CPUs with confidence, a contrast to its reaction to Spectre and Meltdown. But with ZombieLoad, performance and security seem to be at odds, and you have to choose. The post Zombieload forces a choice between performance and security. What will you do? appeared first on Digital Trends.
Tags: Security, Trends, Intel, Computing, Spectre, HyperThreading, Zombieload


Google’s Titan Security Keys can be hijacked remotely, replace yours now

It’s not been a great week for security, and after Twitter, WhatsApp and Intel, Google has now joined the list. The internet giant has issued an advisory, stating it is recalling Bluetooth versions of its Titan Security Key after it found a vulnerability that allows attackers in close proximity to take control of the device. The issue, which affects all Titan Bluetooth keys that have a “T1” or “T2” on the back, has been deemed serious enough that it’s willing to offer a free replacement for thos...
Tags: Google, Security, Startups, Tech, Intel Google, Twitter WhatsApp


Egnyte brings native G Suite file support to its platform

Egnyte announced today that customers can now store G Suite files inside its storage, security and governance platform. This builds on the support the company previously had for Office 365 documents. Egnyte CEO and co-founder Vineet Jain says that while many enterprise customers have seen the value of a collaborative office suite like G Suite, they might have stayed away because of compliance concerns (whether that was warranted or not). He said that Google has been working on an API for some...
Tags: Google, Security, Startups, Cloud, Storage, Enterprise, Egnyte, Jain, Vineet Jain, G Suite, Storage Platforms, TechCrunch Jain


Bitcoin scammers net nearly $1M by telling people they can see them masturbate

A new kind of scam has accrued almost $1 million in bitcoin from frightened porn viewers, says a new report — and they’re staining the good names of Shakespeare and Austen to do it. According to the report, from cybersecurity firm Area 1, this scam involves a threatening email, in which the victim is told videos or pictures of them watching pornography will be leaked to their contacts, along with whatever they were watching, unless they pay a ransom in Bitcoin. That hits some soft spots, so I ca...
Tags: Security, Startups, Shakespeare, Austen, Area


ZombieLoad is Meltdown resurrected. Here’s how to secure your PC right now

This year's follow up to Intel's Meltdown and Spectre chipocalypse is the new MDS attack. Four distinct attack methods have been uncovered that could leave your data exposed, but thankfully patches are already available. The post ZombieLoad is Meltdown resurrected. Here’s how to secure your PC right now appeared first on Digital Trends.
Tags: Security, News, Trends, Intel, Computing, MDS, Zombieload


Download this security patch now if your PC is powered by Intel

This year's follow up to Intel's Meltdown and Spectre chipocalypse is the new MDS attack. Four distinct attack methods have been uncovered that could leave your data exposed, but thankfully patches are already available. The post Download this security patch now if your PC is powered by Intel appeared first on Digital Trends.
Tags: Security, News, Trends, Intel, Computing, MDS


Download the latest security patch immediately if your PC is powered by Intel

This year's follow up to Intel's Meltdown and Spectre chipocalypse is the new MDS attack. Four distinct attack methods have been uncovered that could leave your data exposed, but thankfully patches are already available. The post Download the latest security patch immediately if your PC is powered by Intel appeared first on Digital Trends.
Tags: Security, News, Trends, Intel, Computing, MDS


No, end-to-end encryption isn’t a marketing gimmick

There’s bad takes, and then there’s bad takes. An example of the latter comes from Bloomberg Opinion columnist Leonid Bershidsky, who thinks that today’s WhatsApp security woes proves that end-to-end encryption is “a gimmick” and “largely pointless.” WhatsApp is one of the largest messaging apps around. To put Bershidsky’s comments in context, earlier today, it transpired that it was possible to use specially-weaponized phone calls in order to install malware on a target’s phone. The Facebook-ow...
Tags: Security, Startups, Facebook, Leonid Bershidsky, Bershidsky, Bloomberg Opinion


A year after Meltdown and Spectre, security researchers are still announcing new serious risks from low-level chip operations

Spectre and Meltdown are a pair of chip-level security bugs that exploit something called "speculative execution," through which chips boost performance by making shrewd guesses about which computer operations are performed together. Spectre and Meltdown represented a new class of never-seen-before attacks, and as news of their existence percolated through security circles, it sparked a scavenger hunt for more errors of their sort, with many more coming to light. Intel calls these "Microar...
Tags: Amazon, Security, Business, Video, News, Intel, Infosec, Meltdown, Spectre, Fallout, MDS, Vrije Universiteit Amsterdam, Andy Greenberg, Speculative Execution, RIDL, Zombieload


Collecting user data is a competitive disadvantage

Warren Buffet is famous for identifying the need for businesses to have "moats" and "walls" around their profit-centers to keep competitors out, and data-centric companies often cite their massive collections of user-data as "moats" that benefit from "network effects" to make their businesses good investments. In a smart, eye-opening essay, Martin Casado and Peter Lauten from the VC firm Andreesen Horowitz dismantle the idea that data benefits from "network effects" and that it presents any...
Tags: Security, Post, Business, News, Big Data, Data, Netflix, Machine Learning, Warren Buffet, Andreesen Horowitz, Predictive Analytics, Rose, Martin Casado, Network Effects, Walls And Moats, Diseconomies Of Scale


BitDefender researchers discover terrifying security vulnerability in Intel CPUs

Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. An exploit for the vulnerability, which is called microarchitectural data sampling (MDS), has been proven to work on Intel’s Ivy Bridge, Haswell, Skylake, and Kaby Lake processors. This is the most recent CPU-level vulnerability discovered in Inte...
Tags: Security, Startups, Intel, Kaby Lake, MDS, Ivy Bridge Haswell Skylake


The WhatsApp hack proves security should trump consumer choice

The discovery of a zero-day vulnerability in WhatsApp, one of the world’s most widely used messaging apps, is nothing short of frightening. This vulnerability allowed an adversary, who is yet to be identified (but I’d bet my left kidney that it’s some flavor of nefarious state actor), to install sophisticated spyware in a targeted way. I don’t know how else I can say this: this is really bloody bad. But the thing is, it could have been much worse. WhatsApp was able to quickly issue a fix to all ...
Tags: Security, Startups, Facebook


PSA: Update WhatsApp now to prevent spyware from being installed on your phone

WhatsApp, the messaging app used by more than 1.5 billion worldwide, says it’s patched a critical security vulnerability which allowed attackers to secretly infect phones with malicious spyware by just calling phone numbers over an in-app audio call. The Facebook-owned company said the attack targeted a “select number” of users, and was orchestrated by “an advanced cyber actor,” according a statement from a WhatsApp spokesperson. CVE-2019-3568, as the vulnerability has been documented, was disco...
Tags: Security, Startups, Facebook, Tech


Twitter sorry for mistakenly storing and sharing some users’ location data

Twitter has revealed that a bug led to it accidentally storing and sharing location data for a number of iOS users. The issue, which has now been fixed, affected those operating more than one Twitter account from the app. The post appeared first on Digital Trends.
Tags: Security, Mobile, Twitter, News, Privacy, Trends, Social Media


Twitter bug accidentally shared location data of some iOS users

Twitter says it has fixed a bug that resulted in a user’s approximate location information being shared with an unnamed Twitter partner. “We have discovered that we were inadvertently collecting and sharing iOS location data with one of our trusted partners in certain circumstances,” the company said. According to the blog post, the bug only affected iOS users of its Twitter app who had a second account on their phones. So if users had allowed Twitter to access precise location data on one accou...
Tags: Security, Startups, Twitter, Tech


Update WhatsApp! Sophisticated attack installs spyware with just a call

A WhatsApp vulnerability left Android and iOS devices open to attack from sophisticated surveillance software that could be installed simply by calling the targeted person through the app. The post Update WhatsApp! Sophisticated attack installs spyware with just a call appeared first on Digital Trends.
Tags: Security, Mobile, News, Trends, Social Media, Malware, Whatsapp


WhatsApp flaw left phones open to attack from sophisticated spyware

A WhatsApp vulnerability left Android and iOS devices open to attack from sophisticated surveillance software that could be installed simply by calling the targeted person through the app. The post WhatsApp flaw left phones open to attack from sophisticated spyware appeared first on Digital Trends.
Tags: Security, Mobile, News, Trends, Social Media, Malware, Whatsapp


Passwordless web gets a boost from Windows Hello FIDO2 certification

Microsoft‘s attempt to kill the password is going ahead with full steam. The company has announced that Windows Hello, the passwordless authentication method that allows Windows 10 users to sign in to their devices using biometric information, is now a FIDO2 certified authenticator, joining the list of hardware-based security keys like Yubico’s YubiKey. Passwordless authentication leverages the FIDO U2F (Universal 2nd Factor) open standard, making it easy for users of such hardware to seamlessly...
Tags: Google, Security, Startups, Microsoft, Tech, Yubico


Cyber insurance is worth the hype — if you let hackers write your policy

I read Rami Sass’ recent piece here on Podium about how cyber insurance is overhyped. While he raised great questions about the current pricing models and fear-driven tactics used to sell coverage, I wanted to share a different perspective and address his concerns. Insurance exists because of insecurity in the world — health insurance in case you get sick, car insurance in case of an accident, homeowners insurance in case of a fire. The biggest insecurity businesses face today is cyber risk — ph...
Tags: Security, Startups, Podium, Rami Sass


Google I/O: Android Q aims to bring app permissions firmly under control

We've all been there -- an app is asking for permission to access your SMS history, and you're extremely suspicious as to why. Google wants to put an end to permission anxiety and is introducing new controls in Android Q. The post Google I/O: Android Q aims to bring app permissions firmly under control appeared first on Digital Trends.
Tags: Google, Android, Security, Mobile, Business, News, Trends, Permissions, Google I/O 2019


Syndicate Bank Specialist Officer IT Vacancy Recruitment

Recruitment  of Officer Manager IT in Syndicate Bank  Syndicate Bank, Manipal (Karnataka) invites online application  in the prescribed format from young and bright graduates and who are interested in a Banking career for recruitment to the following 14 Lateral latest Government Jobs Vacancies of Specialist Officers  as Managers in Information Technology (IT) discipline... Please Click on the Title to Read Full Details. [Author: [email protected] (Manisha)]
Tags: Security, Jobs, Engineer, Online, Manager, Bank, Officer, Analyst, MCA, Manisha, Specialist, Syndicate Bank, IT(Computer, Syndicate Bank Syndicate Bank Manipal Karnataka, Computer-Engineer-Naukri-job-vacancy


Binance says more than $40 million in bitcoin stolen in ‘large scale’ hack [Updated]

[Update: Changpeng Zhao’s comments on Periscope added to bottom of post] Cryptocurrency exchange Binance has confirmed a “large scale” data breach, in which hackers stole more than $40 million in cryptocurrency In a statement, the company said hackers stole API keys, two-factor codes and other information in the attack. Binance traced the cryptocurrency theft — more than 7,000 bitcoins at the time of writing — to a single wallet after the hackers stole the contents of the company’s bitcoin ho...
Tags: Security, Money, Wallet, Tech, Economy, Hack, Bitcoin, Cryptocurrencies, Dow Jones, Periscope, Digital Currencies, Chao, Stratics Networks, Cryptocurrency Exchange, Binance, Changpeng Zhao


Binance says more than $40 million in bitcoin stolen in ‘large scale’ hack

Cryptocurrency exchange Binance has confirmed a “large scale” data breach, in which hackers stole more than $40 million in cryptocurrency In a statement, the company said hackers stole API keys, two-factor codes and other information in the attack. Binance traced the cryptocurrency theft — more than 7,000 bitcoins at the time of writing — to a single wallet after the hackers stole the contents of the company’s bitcoin hot wallet. Binance, the world’s largest cryptocurrency exchange by volume,...
Tags: Security, Startups, Money, Wallet, Economy, Hack, Bitcoin, Cryptocurrencies, Dow Jones, Digital Currencies, Stratics Networks, Cryptocurrency Exchange, Binance, Changpeng Zhao


What to Consider When Choosing a Home Security System

A home burglary occurs about every 20 seconds in the United States,  the FBI reports . Whether you live in a big city or small town, there’s good reason to implement your own home security monitoring system. But not all home security monitoring systems provide the same protection and features. And oftentimes, security cameras are chosen based on assumptions and home security trends rather than the facts. When it comes to extreme heat or cold temperatures, not all home security systems stand up ...
Tags: Security, Home, Food, Finance, Fbi, United States, Home Security, Security system, Amazon Alexa Keep


Shape Security’s latest product protects smaller businesses from credential stuffing

Shape Security has been helping big companies stay safe from fraudulent activities like password reuse and bot traffic on their publicly facing websites and apps. The company now wants to help smaller companies have that same type of protection, and today it announced a new cloud service called Connect aimed at that market. “We’re an enterprise-focused company that protects the majority of large US banks, the majority of the largest airlines, similar kinds of profiles with major retailers, hotel...
Tags: Security, Startups, TC, Cloud, US, Tech, Department Of Defense, DDOS attacks, Sumit Agarwal, Shape Security, Credential Stuffing, Shuman Ghosemajumder Shape Security CTO, Ghosemajumder


Dell Computers come pre-loaded with 100% vulnerability

Many computers come pre-installed with software or applications that can make your life easier. I have warned you before about some of these types of ‘bloatware’ and why you might want to be wary of it. The idea behind Dells’ SupportAssist app was to warn you about vulnerabilities proactively. In this case, the software application put t...
Tags: Security, Apps, Business, News, Uncategorized, Sem, Computers, Software, Dell, Dell Computers, Dells, SupportAssist



Filters
show more filters
March - 2019
MoTuWeThFrSaSu
    123
45678910
11121314151617
18192021222324
25262728293031
April - 2019
MoTuWeThFrSaSu
1234567
891011121314
15161718192021
22232425262728
2930     
May - 2019
MoTuWeThFrSaSu
  12345
6789101112
13141516171819
20212223242526
2728293031