Chinese national Xu Jiaqiang pleaded guilty to economic espionage and theft of trade secrets from his former employer in the US.
Time is running out - are you ready for GDPR? We've got some guidance for you
Twitter has tweaked its settings so that you can see what it thinks you're interested in so that advertisers can target you
Are you exhausted by the vast number of measures your organization needs to keep its systems and data safe? You're not alone.
Thieves have used a number of ways to get at cash in ATMs over the years - this latest involves old-fashioned vandalism of the machines
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time
Is your router collects data on your network? Netgear last week pushed out a firmware update for its wireless router model NightHawk R7000 with a remote data collection feature that collects router's analytics data and sends it to the company's server. For now, the company has rolled out the firmware update for its NightHawk R7000, but probably other router models would receive the update in
In order to keep its billions of users safe, Google has introduced another security defense for its Android devices, called Google Play Protect. Google Play Protect, which is part of the Google Play Store app, uses machine learning and app usage analysis to weed out the dangerous and malicious apps, which have always been albatross around the tech giant's neck. Since Google Play Protect
Your daily round-up of some of the other stories in the news
If WannaCry blazed through Windows machines like wildfire, how safe are Android devices from ransomware?
If your PC has been infected by WannaCry â the ransomware that wreaked havoc across the world last Friday â you might be lucky to get your locked files back without paying the ransom of $300 to the cyber criminals. Adrien Guinet, a French security researcher from Quarkslab, has discovered a way to retrieve the secret encryption keys used by the WannaCry ransomware for free, which works on
A security researcher appears to have discovered a flaw in WannaCry that may provide Windows XP victims of the attack with a way to unlock their files.
Meanwhile, threat detection technologies are evolving that can help security teams spot incidents more efficiently.
Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools â allegedly belonged to the NSA's elite hacking team Equation Group â several hacking groups and individual hackers have started using them in their own way. The April's data dump was believed to be the most damaging release by the Shadow Brokers till the date, as it publicly leaked lots of Windows
One good thing about disasters is that we can learn from them and avoid repeating the same mistakes. Here are five lessons that the Yahoo breach should have taught us.
Combining biometrics and wearable technologies opens up new possibilities for future multi-factor authentication systems
WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework â which "provides remote beacon and loader capabilities on target computers" â allegedly being used by the CIA that works against every version of Microsoft's Windows operating systems, from Windows XP to Windows 10. Dubbed Athena/Hera, the spyware has been designed to take full control over the
Say cheese! You'll need to be extra-vigilant that Google's machine-learning doesn't share your photos with the wrong people
There is a lot more our industry should be doing to protect its systems and data from cyber blackmail.
Recorded Future says its research shows clear link between cyber threat group and China's Ministry of State Security.
Some security leaders argue there is little point in worrying about emerging threats when businesses can't defend against today's attacks.
A study finds 98% of Android devices are not running the latest software version, according to a report released today by Zimperium.
Organizations must have a security plan that considers all of their employees.
Your daily round-up of some of the other stories in the news
Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.
Using Bitcoin payments as a measure, the WannaCry attack is not nearly as profitable as the headlines suggest. But you should still patch your Windows systems and educate users.
If your data was exposed in one of two recent breaches, there's a good chance your details have been used by an army of bots to support the proposals to end net neutrality
If you ever ordered food from Zomato, You should be Worried! India's largest online restaurant guide Zomato confirmed today that the company has suffered a data breach and that accounts details of millions of its users have been stolen from its database. In a blog post published today, the company said about 17 Million of its 120 Million user accounts from its database were stolen. What
If your website is based on the popular Joomla content management system, make sure you have updated your platform to the latest version released today. Joomla, the world's second popular open source Content Management System, has reportedly patched a critical vulnerability in its softwareâs core component. Website administrators are strongly advised to immediately install latest Joomla
After the shutdown of Kickass Torrents and Torrentz.eu, it's time for the torrent community to say goodbye to the second most popular torrent site in the world, ExtraTorrent. Yes, the popular torrent site ExtraTorrent has permanently shut down. So, stop searching for 'extratorrents unblock' and 'extratorrents proxy' websites. <!-- adsense --> In a short but clear message on its homepage, the
FireEye CEO Kevin Mandia at Interop ITX discussed changes in the geopolitical threat landscape and how attackers target their victims.
NIST should bring together industry to create a standard set of metrics and develop better ways to share information.
Despite the rise in vulnerabilities, the percentage of unpatched Windows operating systems grew in the first quarter compared to the previous year.
Attackers seeking money, dominance, and data are banding together and sharing infrastructure to target businesses.
Almost 30 years after its inception, it's time to fix the engine that both fuels the modern day Internet and is the root cause of its most vexing security challenges.
While we all were busy in the WannaCry ransomware menace, two separate data breaches have been reported, one in DocuSign, a major provider of electronic signature technology, and another in BELL, Canadaâs largest telecommunications company. In a notice on its website on Tuesday, DocuSign confirmed a breach at one of its email systems when investigating the cause of an increase in
While we all were busy in the WannaCry ransomware menace, two separate data breaches have been reported, one in DocuSign, a major provider of electronic signature technology, and another in BELL, Canadaâs largest telecommunications company. Canadian mobile phone, TV, and internet service provider Bell on Monday confirmed that the company had been hit by an unknown hacker who has managed to
A security researcher has discovered a serious vulnerability in the default configuration of the latest version of Google's Chrome running on any version of Microsoft's Windows operating system, including Windows 10, that could allow remote hackers to steal user's login credentials. Researcher Bosko Stankovic of DefenseCode has found that just by visiting a website containing a malicious SCF
Massive ransomware worm attack appears to have come with a poorly planned anti-analysis feature.
Think of it like a wine of the month club for attack tools and new exploits threat group says.
FireEye report on APT32 puts evidence together of a group attacking private and public targets for the sake of Vietnamese state interests.
A security researcher has just discovered a stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks. According to Kafeine, a security researcher at Proofpoint, another group of cyber criminals was using the same EternalBlue exploit, created by the NSA and dumped last month by the Shadow Brokers,
The infamous hacking collective Shadow Brokers â the one who leaked the Windows SMB exploit in public that led to last weekend's WannaCrypt menace â are back, this time, to cause more damage. In typically broken English, the Shadow Brokers published a fresh statement (with full of frustration) a few hours ago, promising to release more zero-day bugs and exploits for various desktop and mobile
While Windows users are currently in fear of getting their systems hijacked by the WannaCry ransomware outbreak, Apple users are sitting relaxed, thinking that malware attacks are something that happens to Windows users, and not Apple. But you are mistaken â Apple products are also not immune to the hack attacks and malware infections, as an ebook can hack your Mac, iPhone, and iPad. Apple
So far, nobody had an idea that who was behind WannaCry ransomware attacks? But now there is a clue that lies in the code. Neel Mehta, a security researcher at Google, found evidence that suggests the WannaCry ransomware, that infected 300,000 machines in 150 countries over the weekend, is linked to a state-sponsored hacking group in North Korea, known for cyber attacks against South Korean
By now I am sure you have already heard something about the WannaCry ransomware, and are wondering what's going on, who is doing this, and whether your computer is secure from this insanely fast-spreading threat that has already hacked nearly 200,000 Windows PCs over the weekend. The only positive thing about this attack is that â you are here â as after reading this easy-to-understandable
Update âÂ After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article "WannaCry Ransomware: Everything You Need To Know Immediately."Â Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe â which is
Update âÂ After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article "WannaCry Ransomware: Everything You Need To Know Immediately."Â In the wake of the largest ransomware attack in the history that had already infected over 114,000 Windows systems worldwide since last 24 hours, Microsoft
Update âÂ After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article "WannaCry Ransomware: Everything You Need To Know Immediately."Â If you are following the news, by now you might be aware that a security researcher has activated a "Kill Switch" which apparently stopped the WannaCry
Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world, seizing control of affected computers until the victims pay a ransom.Â This widespread ransomware campaign has affected various organizations with reports of tens of thousands of infections in as many as 99 countries, including... Continue Reading...
When the world was dealing with the threat of the self-spreading WannaCry ransomware, WikiLeaks released a new batch of CIA Vault 7 leaks, detailing two apparent CIA malware frameworks for the Microsoft Windows platform. Dubbed "AfterMidnight" and "Assassin," both malware programs are designed to monitor and report back actions on the infected remote host computer running the Windows
A massive malicious email campaign that stems from the Necurs botnet is spreading a new ransomware at the rate of 5 million emails per hour and hitting computers across the globe. Dubbed "Jaff," the new file-encrypting ransomware is very similar to the infamous Locky ransomware in many ways, but it is demanding 1.79 Bitcoins (approx $3,150), which much higher than Locky, to unlock the
Struggling to learn how to code? If youâre looking to 'learn how to code' and seeking a career as an expert-level programmer, you should know how to play with codes and make your own. It's no secret that mastering a coding language or two can put you at the top of the job market â thanks to the boom in technology. Today, you can elevate your programming skills straight from the Internet to
A security researcher has publicly disclosed two critical zero-day vulnerabilities in Vanilla Forums, an open source software that powers discussion on over 500,000 websites, which could allow unauthenticated, remote attackers to fully compromise targeted websites easily. Discovered by Polish security researcher Dawid Golunski of Legal Hackers, two separate unpatched vulnerabilities, a remote
Microsoft has been expressing its love for Linux and Open Source for almost three years now, and this love is embracing as time passes. Just last year, Microsoft made headlines by building support for the Bash shell and Ubuntu Linux binaries into Windows 10, allowing users to run limited instances of Linux directly on top of the OS without installing any virtual machine, as well as developers
There is a bad news for all OnePlus lovers. A security researcher has discovered four vulnerabilities that affect all OnePlus handsets, including One, X, 2, 3 and 3T, running the latest versions of OxygenOS 4.1.3 (worldwide) and below, as well as HydrogenOS 3.0 and below (for Chinese users). Damn, I am feeling bad, I myself use OnePlus. One of the unpatched vulnerabilities allows
In Realpage Inc. v. Enter. Risk Control, LLC, 2017 BL 102339 (E.D. Tex. 2017), the court ordered Enterprise Risk Control, LLC (âEnterpriseâ) to produce forensic images of devices used by a former Realpage employee to a forensic neutral in order to determine whether any source code was recoverable pertaining to Realpageâs allegations of misappropriation. Background... Continue Reading...
Another week, another well-concocted phishing scam.Â The most recent fraudulent activity targeted businesses that use Workday, though this is not a breach or vulnerability in Workday itself.Â Specifically, the attack involves a well-crafted spam email that is sent to employees purporting to be from the CFO, CEO,Â or Head of HR or similar. Â Sometimes the... Continue Reading...
On January 5, 2017, the Federal Trade Commission (FTC) sued for permanent injunction a Taiwan-based computer networking equipment manufacturer D-Link Corporation and its U.S. subsidiary, alleging that D-Linkâs inadequate security measures left its wireless routers and IP cameras used to monitor private areas of homes and businesses vulnerable to hackers, thereby compromising U.S. consumersâ privacy.... Continue Reading...
When: Â Â Â Â Â Monday, April 24, 2017 Where: Â Â Â Â Â Offices of Seyfarth Shaw LLP, Chicago, IL Sign in: Â Â Â Â Â 5:00 â 5:30 pm Event: Â Â Â Â Â Â 5:30 â 6:30 pm Reception: Â Â 6:30 â 7:30 pm Topic: Interactive Dialogue concerning The Sedona ConferenceÂ®... Continue Reading...
In January 2017, The Sedona Conference Working Group on International Electronic Information Management, Discovery, and Disclosure (WG6) issued the much-anticipated International Litigation Principles on Discovery, Disclosure & Data Protection in Civil Litigation (Transitional Edition). This publication updates the 2011 Â International Litigation Principles, which preceded the 2013 Snowden revelations and the Schrems decision invalidating the U.S.-EU... Continue Reading...
Natalya Northrip, Emily Dorner to Present Regarding Litigation Hold Maintenance and Retention of HR Records in AprilNatalya Northrip and Emily Dorner will be presenting on two interesting eDiscovery topics this April; presentations will focus on litigation hold maintenance and best practices, as well as recordkeeping for human resources professionals. Â Presentations will take place on April 6, and April 26, respectively. Â Summaries of presentation content and links to sign up are provided... Continue Reading...
The Sedona Conference Working Group on Electronic Document Retention & Production (WG1) has released its Commentary on Proportionality in Electronic Discovery. The public comment period on the Commentary closed on January 31, 2017. This Commentary was much anticipated given the revamping of Rules 26(b)(1) and 37(e) of the Federal Rules of Civil Procedure in December... Continue Reading...
Key Takeaways from OCRâs Latest HIPAA Fine: Hospital to Pay $3.2 Million for Its Cybersecurity ViolationsEarlier this month, the U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced a Health Insurance Portability and Accountability Act of 1996 (HIPAA) civil money penalty of $3,217,000.00 against Childrenâs Medical Center of Dallas (Childrenâs), a pediatric hospital that is part of Childrenâs Health, the seventh largest pediatric health care... Continue Reading...
In an interesting decision regarding the spoliation of evidence via a mobile device, Magistrate Judge Terry F. Moorer determined that the newly amended Federal Rule 37(e) â enacted on December 1, 2015 â did not apply to the spoliation case, as the case was filed prior to the ruleâs enactment. Â (Morrison v. Charles J. Veale,... Continue Reading...
Please log in to view original contentLogin with Linkedin
Why log in with Linkedin? Because it helps us verify your identity.