Speaking at Vendor Risk Management , Asia Summit
I am happy to announce that I will be part of the Vendor Risk Management, Asia Summit, When : 27-28 January 2021 Register : www.VendorRiskSummit.com Overview of information security standards especially in the light of new regulations • Navigating through the overlapping qualities while complying with multiple frameworks and regulations…
Microsoft Releases New Info on SolarWinds Attack Chain
Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
Smashing Security podcast #211: Fleeking, COVID-19 hacking, and Bitcoin balls-ups
Your privacy may be at risk if you're on Fleek, hackers not only steal COVID-19 vaccine data but then tamper with it to spread mistrust, and the Bitcoin bungles keep on coming... All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by…
Treasury nominee Yellen is looking to curtail use of cryptocurrency
Enlarge / Janet Yellen, Joe Biden's nominee to be Secretary of the Treasury, at a December press conference. (credit: Alex Wong/Getty Images) Cryptocurrencies could come under renewed regulatory scrutiny over the next four years if Janet Yellen, Joe Biden's pick to lead the Treasury Department, gets her way. During Yellen's…
New metamaterial merges magnetic memory and physical changes
Enlarge For applications like robotics, there's usually a clear division of labor between the processors that control the robot's body and the actuators that actually control the physical changes of that body. But a new paper being released today blurs the lines between the two, using a magnetic switch in…
Twitch’s Trump ban sustained after leaving office
Enlarge / Photo illustration of the Twitch logo on a smartphone. (credit: Getty Images | Thomas Trutschel) On Wednesday, an automated alert about Twitch account bans included a somewhat surprising account name: "@DonaldTrump." The surprise came because Twitch had already "indefinitely suspended" the former president's official Twitch channel on January…
Amazon offers Biden help to speed up vaccine distribution
Enlarge / An Amazon warehouse on a sunny day in Germany on April 2, 2020. (credit: Patrick Pleul | picture alliance | Getty Images) Amazon is one of the country's largest businesses—and despite its faults and flaws, the company overall excels at logistics and distribution at scale. Therefore, Amazon suggests,…
Critical Cisco SD-WAN Bugs Allow RCE Attacks
Cisco is stoppering critical holes in its SD-WAN solutions and its smart software manager satellite.
PC fan port of early Sonic games lets you zoom the camera way, way out
The intertwining paths of Chemical Plant Zone are a thing of beauty at this scale. [credit: Sega ] A group of coders has decompiled the source code for Sonic the Hedgehog and its 1992 sequel from their well-regarded 2013 smartphone ports. That means these heavily enhanced versions of the early…
NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs
The company also issued patches for Tesla-based GPUs as part of an updated, separate security advisory.
Security firm Malwarebytes was infected by same hackers who hit SolarWinds
Enlarge (credit: Getty Images) Security firm Malwarebytes said it was breached by the same nation-state-sponsored hackers who compromised a dozen or more US government agencies and private companies. The attackers are best known for first hacking into Austin, Texas-based SolarWinds, compromising its software-distribution system and using it to infect the…
3Mbps uploads still fast enough for US homes, Ajit Pai says in final report
Enlarge / FCC Chairman Ajit Pai says goodbye to members of a Senate Appropriations Subcommittee afters testifying during a hearing on June 16, 2020, in Washington, DC. (credit: Getty Images | Chip Somodevilla) In one of his last acts as Federal Communications Commission chairman, Ajit Pai decided to stick with…
How most large cloud breaches happen revealed in Orca Security report
The world of cybersecurity isn’t fair. Security teams need to secure everything, but attackers need only find one weak link. For most organizations, cloud workload security is dependent upon the installation and maintenance of security agents across all assets. Something that rarely happens, as Orca Security's new report reveals.
LG says it might quit the smartphone market
The LG Velvet is LG's closest thing to a normal flagship right now. With only a non-flagship Snapdragon 765G SoC, the company has opted out of the flagship market. [credit: LG ] As usual, things are not looking good for LG's phone division. As reported by The Korea Herald, LG Electronics CEO Kwon…
Malwarebytes Hit by SolarWinds Attackers
The attack vector was not the Orion platform but rather an email-protection application for Microsoft 365.