With smartphones and tablets in wide use by workers, companies face a growing risk: the potential loss of critical data from lost, stolen, or poorly secured mobile devices.
Assuming you’re still on Facebook—and it’s totally OK if you deleted the service this week, it really is—the company just launched a new update to its Messenger app that gives you and you friends a lot more power over your group conversations (for whoever started them). Here’s how it works.
Pat Tillman was an NFL star linebacker with the Arizona Cardinals when he gave it all up to enlist in the United States Army in June 2002 following the September 11 attacks. Tillman served in Iraq and Afghanistan with the Army Rangers before being killed in a friendly fire incident in the mountains of Afghanistan in 2004.
An Iran-linked cyber-espionage group has been using new malware and data exfiltration techniques in recent attacks, security firm Nyotron has discovered.
Data breaches, phishing attacks, information disclosure – the Internet can be a scary place. Conducting a cybersecurity audit (or getting a third-party assessment) is a great way to understand your organization’s cybersecurity posture. But, like preparing any exam or review, getting ready for a cybersecurity audit can be intimidating. While every security assessment will be a bit different, here are seven ways you can prepare for your next cybersecurity audit.
In 2006, a local pollster in Nepal was kidnapped by Maoist rebels while conducting opinion surveys on behalf of the American political strategist Stan Greenberg. The Maoists, who had been waging a long-running insurgency against the government, did not issue their typical ransom demands—money or weapons in exchange for the prisoner. No, they wanted the polling data that Greenberg’s team had collected, evidently to gauge the political climate in the country for themselves. The researchers eventually handed it over. In his book “Alpha Dogs,” the British journalist James Harding cites this story as an example of how the business of political campaigning is being remade, across the globe, by a profusion of fine-grained data about voters and their habits. Where the consultants of the nineteen-sixties and seventies obsessed over how to use television to beam ideal images of their clients into voters’ homes, today’s spinmasters hope that big data will allow them to manipulate voters’ deepest hopes and fears. “What’s the currency of the world now?” one of Greenberg’s partners asks Harding. “It’s not gold, it’s data. It’s the information.”
now decided to withdraw its advertising from the platform
In this week’s edition of the Transatlantic Cable podcast, Dave and I looked to stay on our usual podcast format, covering four or five stories in 20 minutes or less, but we got a bit sidetracked by the latest Facebook news. After the deep dive, we offer some thoughts on hackers sending bomb threats to schools, a lottery hack, and a PSA about Elon Musk imposters on Twitter. Below are links to the stories we discuss:
How many clicks does it take to keep your Facebook data private?
Each year goes by and we find more ways to own less and less of what it takes to operate our digital infrastructure. Information Technology began as a business having to build data centers owning everything starting with the real estate all the way to the applications, quickly it moved to public clouds whereby the infrastructure itself was a service managed by the provider and you only needed to manage the virtual servers up through your applications. The latest in this trend is serverless computing. As you would guess, this is the latest evolution where the service provider owns and operates everything up to the application and you don’t even manage the servers running your code (thus the name “serverless”).
Schrödinger’s cat you’ve met—the one that is both alive and dead at the same time. Now say hello to Schrödinger’s scientists, researchers who are in an eerie state of being simultaneously delighted and appalled.
The Internet Association has filed to intervene in the ongoing lawsuit against the FCC challenging the repeal of net neutrality protections.
Hanna, a finance director at an international home care retailer, works long hours. She’s usually in the office from 9am to 5pm, but at home, when her three children go to sleep, she’ll work another four hours, not closing her laptop until midnight. She sometimes also works on weekends. But even though she works 60 to 65 hours per week, she told us that she can “switch off” when she needs to, and that she still feels energetic every day. She hasn’t had to worry about her health.
Video games are about to get more photorealistic thanks to new technology from Nvidia. At the Game Developers Conference in San Francisco this week, the graphics card manufacturer announced that it had cracked ‘ray tracing’—an advanced method of rendering computer graphics that delivers cinematic quality images. In conjunction, Microsoft announced a new API—DirectX Raytracing—to help game companies get the most out of the new technology.
TL;DR: UAF in a “non-release” version of ModSecurity for Nginx.
!RCE|DoS, no need to panic.
Plus some old and even older exploitation vector(s).
Organizations and people’s security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries. Over 16 million consumers in the US were victims of identity theft or fraud in 2016 alone. Learning to on-board new data at the speed of the business will ensure your fraud team can detect and investigate data to quickly find anomalies and reduce loss of money, reputation and organizational efficiencies.
Conflict isn’t Pleasant, But Sometimes it Can be Healthy and Necessary When Done Properly and Respectfully
examines the risks and benefits of cryptocurrencies