Archives by date

You are browsing the site archives by date.

Security researchers discover Linux version of Winnti malware

For the first time, security researchers have uncovered and analyzed a Linux variant of Winnti, one of the favorite hacking tools used by Beijing hackers over the past decade. Discovered by security researchers from Chronicle, Alphabet’s cyber-security division, the Linux version of the Winnti malware works as a backdoor on infected hosts, granting attackers access to compromised systems. Chronicle says… Read more →

Google pulls Huawei’s Android support following Trump blacklist, claims report

Google has ceased doing business with Chinese hardware maker Huawei, following the Trump administration’s decision to add the company to a trade blacklist, claims a Reuters report. Must read: iOS 12.3: How to keep your iPhone safe from hackers and snoopers According to unnamed sources at Google, Huawei will lose access to updates, and future handsets will “lose access to… Read more →

Google pulls Huawei’s Android support following Trump blacklist, claims report

Google has ceased doing business with Chinese hardware maker Huawei, following the Trump administration’s decision to add the company to a trade blacklist, claims a Reuters report. Must read: iOS 12.3: How to keep your iPhone safe from hackers and snoopers According to unnamed sources at Google, Huawei will lose access to updates, and future handsets will “lose access to… Read more →

Company behind LeakedSource pleads guilty in Canada

Defiant Tech Inc., the company behind the LeakedSource.com portal, pleaded guilty this week, according to a press release from the Royal Canadian Mounted Police (RCMP). The LeakedSource website launched in late 2015 and rose to infamy in 2016. Its operators gathered data from hacked companies, either from the public domain or by buying it from hackers. LeakedSource provided access to… Read more →

Apple lied to me about the MacBook Air and now we have a problem

Apple’s worst product ever? I’d heard the stories. I’d read some of them, too. Apple‘s latest MacBooks, the stories said, had clearly been designed by a bunch of inebriated Beelzebubs who were tired of retrograde customers thinking laptops were still relevant. Or could this have merely been the interns’ summer design project?  We didn’t really have time for this. Maybe… Read more →

Yes, there are security ramifications to serverless computing

At least one in five organizations, 21%, have implemented serverless computing as part of their cloud-based infrastructure. That’s the finding of a recent survey of 108 IT managers conducted by Datamation. Another 39% are planning or considering serverless resources.  Photo: Joe McKendrick The question is, will serverless computing soon gain critical mass, used by a majority of enterprises? Along with… Read more →

Hands-on that Gear4 Platoon case for the Samsung Galaxy S10e

Mother’s Day 2019: The best tech, gadgets, and accessories for mom Smart yoga mats, intelligent candles, and more can be picked up to make this Mother’s Day extra special. Source Article from https://www.zdnet.com/pictures/hands-on-that-gear4-platoon-case-for-the-samsung-galaxy-s10e/#ftag=RSSbaffb68Hands-on that Gear4 Platoon case for the Samsung Galaxy S10ehttps://www.zdnet.com/pictures/hands-on-that-gear4-platoon-case-for-the-samsung-galaxy-s10e/#ftag=RSSbaffb68http://www.zdnet.com/blog/rss.xmlLatest blogs for ZDNetLatest blogs for ZDNethttps://zdnet3.cbsistatic.com/fly/bundles/zdnetcore/images/logos/zdnet-144×144.png

At least 186 EU ISPs use deep-packet inspection to shape traffic, break net neutrality

Despite net neutrality regulation being in effect in the EU since 2016, European internet service providers are already breaking the rules and shaping traffic, according to a conglomerate of NGOs, academics, and private companies. Earlier this week, this group — made up of 45 entities from 15 countries — has sent an open letter to EU authorities expressing concerns about… Read more →

Faulty database script brings Salesforce to its knees

Salesforce is going through one of its biggest outages ever after the company was forced to shut down large chunks of its infrastructure earlier today. At the heart of the outage was a change the company made to its production environment that broke access permission settings across organizations and gave employees access to all of their company’s files. According to… Read more →

Stack Overflow hacker went undetected for a week

The hacker who breached Stack Overflow last week managed to access data on user accounts, the company said today in an update on its investigation into a security breach it disclosed last night. The update comes to shed some light into what happened on the company’s servers last week, after Stack Overflow left many users scratching their heads when it… Read more →

The growing legal and regulatory implications of collecting biometric data

UK’s tax authority forced to delete 5 million biometric records ‘Biggest ever’ deletion of biometric data by government comes after HMRC obtained data “unlawfully” according to privacy regulator. In the last few years, biometric technologies from fingerprint to facial recognition are increasingly being leveraged by consumers for a wide range of use cases, ranging from payments to checking luggage at… Read more →

Three-out-of-five businesses say social is best way to attract new customers

Facebook’s safety overhaul begins with new features for Messenger Facebook debuts some of the intimate yet robust sharing experiences that will put Messenger at the center of Facebook’s more privacy-focused future. As B2B content transitions into a core business function, brands need to understand how they can best use content to acquire new customers, nurture existing relationships, and create real… Read more →