It still isn’t clear how long LADOT retains the location data, and there aren’t public details on what aggregators can do with that information. What is clear: Companies that don’t share the data won’t be allowed to put as many scooters on the streets as those that do. Companies that declined to provide the data were given a 30-day provisional permit to operate in LA, which were handed out last week, while those that agreed to hand over anonymized location data received permits for a full year.
Security services firm FireEye says two hacker groups known to be sponsored by the Russian government of Vladimir Putin are waging cyber-attacks currently against European government systems.
Hundreds gathered this week at San Francisco’s Pier 48 to see the more than 200 companies in Y Combinator’s Winter 2019 cohort present their two-minute pitches. The audience of venture capitalists, who collectively manage hundreds of billions of dollars, noted their favorites. The very best investors, however, had already had their pick of the litter.
How you respond to a data breach matters.
In today’s world, most companies have documented policies and technologies that can help prepare them for grappling with a cyber intruder, but in many cases those tactics are insufficient — focusing more on answering questions about the incident itself and less about an integrated response that protects reputation, the business and, most importantly, clients.
By Zane Pokorny on March 21, 2019
Everything is connected to everything else.
I’m in Washington, waiting for my flight back to Belgium. I just attended the 2019 edition of the OSSEC Conference, well more precisely, close to Washington in Herndon, VA. This was my first one and I’ve been honoured to be invited to speak at the event. OSSEC is a very nice project that I’m using for a long time. I also contributed to it and I’m giving training on this topic. The conference was already organized for a few years and attracted more people every year. They doubled the number of attendees for the 2019 edition.
Written by Joe Warminsky
The white-hat hacking team of Amat Cama and Richard Zhu, together known as “Flouroacetate,” took home the majority of the prize money available on the first day of this year’s Pwn2Own competition in Vancouver, demonstrating zero-day exploits against Apple’s Safari browser as well as virtualization software from Oracle and VMware.
Privacy Settings / PENDING
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in using weak, stolen, or otherwise compromised credentials.
National Cyber Security Centre and National Crime Agency investigate random attack that locked down the association’s data and deleted backups.
The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe here.
At the climax of 1983’s “WarGames”, the War Operation Plan Response (WOPR) computer famously opines “The only winning move is not to play” when presented with a barrage of no-win scenarios depicting global thermonuclear war. While the stakes aren’t quite as high when it comes to putting on a brand new hacker convention, there’s certainly enough pitfalls that most of us would take WOPR’s advice and never even try. But for those who attended the inaugural WOPR Summit in Atlantic City, it was clear that not only did the team behind it have the tenacity to play the game, but that they managed to prove their supercomputer namesake wrong.
Promo What does it take to reach a leading role in the security field? There are different paths to take to get there: some go directly from analyst to leadership, others have a more technical background in general IT, or excellent tactical skills acquired in a consultancy or vendor role.
“It was a cold and windy night, but the breeze of ill omen blowing across the ‘net was colder. The regular trickle of login attempts suddenly became a torrent of IP addresses, all trying to break into the back-end of the Joomla site I host. I poured another cup of joe, it was gonna be a long night.”
Hundreds of millions of Facebook users had their account passwords stored in plain text and searchable by thousands of Facebook employees — in some cases going back to 2012, KrebsOnSecurity has learned. Facebook says an ongoing investigation has so far found no indication that employees have abused access to this data.
Today, many Chief Information Security Officers and cybersecurity practitioners are looking for an effective cybersecurity strategy that will help them achieve measurably better security for their organizations. AWS has released two new whitepapers to help customers plan and implement a strategy that has helped many organizations protect, detect, and respond to modern-day attacks.