Month: October 2021

The Centre has defended in the Delhi High Court the legal validity of its new IT rule requiring messaging apps, such as WhatsApp, to “trace” the first originator of the information, saying that the law empowers it to expect such entities to create safe cyberspace and counter illegal content either themselves or by assisting the
0 Comments
In this article FB With an image of himself on a screen in the background, Facebook co-founder and CEO Mark Zuckerberg testifies before the House Financial Services Committee in the Rayburn House Office Building on Capitol Hill October 23, 2019 in Washington, DC. Chip Somodevilla | Getty Images Facebook on Friday was hit with multiple
0 Comments
Enterprise “data observability” is a hot space right now. Over the past couple of months, investors have pumped $200 million into each of Cribl and Grafana Labs, two data observability startups, and lesser amounts into related companies like Acceldata and DeepFactor. What’s behind this frenzy? Well, enterprise data systems are like a busy family household. From room to room,
0 Comments
The financially motivated FIN7 cybercrime gang has masqueraded as yet another fictitious cybersecurity company called “Bastion Secure” to recruit unwitting software engineers under the guise of penetration testing in a likely lead-up to a ransomware scheme. “With FIN7’s latest fake company, the criminal group leveraged true, publicly available information from various legitimate cybersecurity companies to
0 Comments
Microsoft today announced that it acquired Clear Software, a Zionsville, Indiana-based startup developing enterprise software automation technologies. In a blog post, Microsoft partner general manager Stephen Siciliano said that Clear’s solutions will “make it a more seamless experience” to use Microsoft’s Power Apps and Power Automate platforms to build automations for systems such as SAP
0 Comments
A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of commodity remote access trojans (RATs) that allow the adversary to gain complete control over the compromised endpoints. Cisco Talos attributed the cyber campaign to a “lone wolf” threat actor operating a Lahore-based fake
0 Comments
Shares of Snap plummeted 25 percent on Thursday after the owner of photo messaging app Snapchat said privacy changes implemented by Apple Inc on iOS devices hurt the company’s ability to target and measure its digital advertising. The Santa Monica, California-based company, which earns the vast majority of its revenue from selling digital advertising on the
0 Comments
Governments all over the world are looking at energy security as a priority to power their industries, businesses, homes, and offices. But there are finite sources of energy and the technology to harness renewable energy is still decades away from a wider adoption. US-based company Radiant is trying to address this challenge by developing a
0 Comments
Huawei Watch GT 3 smartwatch and Huawei FreeBuds Lipstick truly wireless earbuds were launched on Thursday alongside the Huawei Nova 9 smartphone in Europe. The Huawei Watch GT 3 is very similar to the Huawei Watch 3 series of smartwatch launched in China earlier, but it comes without the eSIM support. Huawei Watch GT 3
0 Comments
Jul.23 — The U.S. Department of Justice said its antitrust division will look at concerns that consumers, businesses and entrepreneurs have expressed about search, social media, and online retail, according to a statement Tuesday. Lerer Hippeau Ventures Managing Director Eric Hippeau and Center for Democracy and Technology Vice President of Policy Chris Calabrese discuss the
0 Comments
WeChat has made its content searchable on some foreign search engines such as Google and Microsoft’s Bing, according to Reuters checks. WeChat’s content, including articles and videos on its popular public accounts page, a function similar to a news portal, has opened to external search engines, other than its own Sogou search engine, in recent
0 Comments
A multi-party breach creates 26 times more financial damage than the damage that can be caused by even the worst single-party breach, according to a new report from Mastercard company RiskRecon and Cyentia Institute. The study, “Ripples Across the Risk Surface,” quantifies how a multi-party data breach impacts numerous organizations in today’s interconnected digital world.
0 Comments
An effective cybersecurity strategy can be challenging to implement correctly and often involves many layers of security. Part of a robust security strategy involves performing what is known as a penetration test (pen test). The penetration test helps to discover vulnerabilities and weaknesses in your security defenses before the bad guys discover these. They can
0 Comments