menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

BGR

1M

read

382

img
dot

Image Credit: BGR

Law enforcement has a tool that can break into iPhones running iOS 18

  • Law enforcement has a tool, Graykey, that can break into iPhones running iOS 18 and iOS 18.0.1.
  • The tool can partially unlock most iOS 18 devices, while iPhone 11 models can have their data completely stolen.
  • A 'partial extraction' can only retrieve unencrypted files and some metadata, not all data from modern iPhones.
  • Updating iPhones to the latest iOS versions is the best solution to protect against such hacking tools.

Read Full Article

like

23 Likes

source image

TechCrunch

1M

read

218

img
dot

Image Credit: TechCrunch

Portugal’s Tekever raises $74M for dual-use drone platform deployed to Ukraine

  • Dual-use drone startup Tekever has raised €70 million ($74 million) to develop its product and expand into new markets, specifically the U.S.
  • The funding round was led by Scottish investment company Baillie Gifford & Co. and the NATO Innovation Fund.
  • Tekever's surveillance drones have been used for tracking migrant smugglers in the English Channel and have been deployed in Ukraine.
  • The company's approach of controlling all aspects of its operations, from design to software, allows for quick adaptation to customer needs and changing warfare scenarios.

Read Full Article

like

13 Likes

source image

Tech Radar

1M

read

446

img
dot

Image Credit: Tech Radar

‘Scam Yourself’ attacks have fooled millions — here's how not to fall victim

  • The Gen Q3 Threat Report reveals a 614% increase in 'Scam Yourself Attacks', a type of social engineering tactic tricking users into compromising their own systems.
  • The rise in 'Scam Yourself Attacks' includes threats like FakeCaptcha, fake tutorials, and ClickFix scams.
  • Ransomware attacks saw a 24% increase from the previous quarter, while infostealer activity rose by 39% quarter over quarter.
  • Crypto scams experienced a spike in activity due to the use of evolving deepfake technology, attracting viewers to invest in fake crypto schemes.

Read Full Article

like

26 Likes

source image

Siliconangle

1M

read

287

img
dot

Image Credit: Siliconangle

Cyera raises $300M on $3B valuation to advance AI-driven data security platform

  • Cyera, a data security solutions provider, has raised $300 million in new funding on a $3 billion valuation.
  • The funding will be used to accelerate platform development and make strategic acquisitions.
  • Cyera offers an AI-driven data security platform that provides real-time visibility, automated policies, and data loss prevention capabilities.
  • The company has attracted notable customers and has raised a total of $760 million to date.

Read Full Article

like

17 Likes

source image

Tech Radar

1M

read

309

img
dot

Image Credit: Tech Radar

D-Link is telling users to stop using these routers immediately, or face hacking

  • A critical remote code execution flaw has been found in multiple D-Link router models.
  • Since the affected models have reached end-of-life status, D-Link will not release a patch.
  • D-Link urges users to replace the affected devices with newer supported models immediately.
  • The vulnerability poses a significant security risk as routers are often targeted by hackers.

Read Full Article

like

18 Likes

source image

Softwareengineeringdaily

1M

read

132

img
dot

Image Credit: Softwareengineeringdaily

VC Investing at CRV with James Green

  • CRV is a venture capital firm that invests in early-stage startups.
  • James Green is a general partner at CRV, known for investing in startups focused on security, infrastructure, and financial services.
  • Gregor Vand is a security-focused technologist, founder, and CTO of Mailpass.
  • For more information, click the link to see the transcript of the podcast episode.

Read Full Article

like

7 Likes

source image

Pymnts

1M

read

182

img
dot

Image Credit: Pymnts

Discover Global Network: Future Payment Strategy Should Be Digital and Data-Driven

  • The future of payments will be significantly influenced by demographics, with digital payments and virtual cards replacing the use of plastic cards.
  • Consumers are looking for speedier and more secure payment flows, with protection of their identities and data.
  • Utilizing big data and artificial intelligence can help craft personalized payments strategies and anticipate consumer interests.
  • Companies need to prioritize data control and security, invest in cybersecurity, and adhere to data privacy protections.

Read Full Article

like

10 Likes

source image

Identityiq

1M

read

410

img
dot

Image Credit: Identityiq

6 Ways Parental Controls Help Protect Your Child

  • Parental controls are designed to monitor and manage what children can do and see while they're online.
  • Parental control software can protect every phone, computer, TV, or console connected to your Wi-Fi, helping to ensure online safety for your child.
  • The need for parental controls has become more important than ever in the modern digital age, where the internet is a potentially dangerous space for children.
  • Parental controls help to protect children from online predators by enabling parents to monitor who their child is interacting with online and block unknown or suspicious contacts.
  • By blocking websites or apps with harmful or mature content, parental controls can keep children's internet experience age-appropriate and foster a safer browsing environment.
  • Regulating screen time is critical for parents who want to prevent screen addiction and mental health issues such as depression in their children.
  • Parental controls can be configured to limit access to certain websites and categories, ensuring that the internet serves as a positive learning tool rather than a potential source of harm.
  • New integrated safety features in online gaming platforms such as Roblox now offer enhanced parental controls that allow parents to set limits on online interactions, restrict access to mature content, and place specific boundaries on in-game purchases.
  • Bitdefender® Total Security parental controls offered by IdentityIQ provide advanced features such as tracking location and setting screen time limits.
  • Parental controls can give parents peace of mind, knowing that the internet is a safer space for their children.

Read Full Article

like

24 Likes

source image

Pymnts

1M

read

186

img
dot

Image Credit: Pymnts

For Retailers, Data Simplicity Is All About the SKU

  • Simplicity is the new KPI in payments and particularly important in the retail industry where businesses use data to redefine consumers' expectations.
  • Banyan’s platform eliminates the complexity of transaction data for businesses and provides granular insights into consumer behaviour.
  • The friction points for retailers remain data normalisation and governance, which are vital to unlocking data insights.
  • These challenges arise when the same item is listed differently across various locations, and when merchants aim to harness data in engagement without sacrificing control.
  • Dual data management is necessary for simplicity. All players must seamlessly access insights, and security and privacy standards must also be adhered to.
  • Banyan's embedded loyalty program capability, where users can earn double rewards points for Walgreens-branded purchases for instance, enhances the customer experience.
  • The company also helps eliminate the hassle of manually categorising purchases for health spending accounts (HSAs) and flexible spending accounts (FSAs) through its platform.
  • Banyan’s platform enables businesses to unlock new revenue streams and drive growth by transforming complex data into an accessible, actionable asset.
  • According to Banyan Chief Product Officer Vish Shastry, "By focusing on actionable insights, companies are able to see beyond merchant-level transactional data."
  • Simplicity, safety, and control over data insights are necessary for businesses seeking to move beyond traditional constraints while maintaining security.

Read Full Article

like

11 Likes

source image

The Fintech Times

1M

read

432

img
dot

Digital Document Forgeries Overtake Physical Forgeries For the First Time As Deepfakes on the Rise

  • Digital document forgeries have surpassed physical forgeries for the first time, with deepfake attacks increasing every five minutes.
  • AI-assisted fraud is growing more frequent and sophisticated, with digital attacks accounting for 57% of all document fraud.
  • National ID cards are the most targeted documents, and fraudsters are using generative AI for sophisticated forgery and injection attacks.
  • The gaming industry was previously a top target, but fraudsters have now shifted their focus to cryptocurrency, lending, and traditional banks.

Read Full Article

like

26 Likes

source image

Securityaffairs

1M

read

255

img
dot

Image Credit: Securityaffairs

Unsecured JupyterLab and Jupyter Notebooks servers abused for illegal streaming of Sports events

  • Threat actors are exploiting misconfigured JupyterLab and Jupyter Notebooks servers to illegally stream sports events.
  • Researchers from Aqua observed threat actors using misconfigured servers to hijack environments and duplicate live sports broadcasts.
  • The attackers exploit unauthenticated access to JupyterLab and Jupyter Notebooks to establish initial access.
  • The consequences of such attacks can include denial of service, data manipulation, and reputational damage.

Read Full Article

like

15 Likes

source image

Medium

1M

read

214

img
dot

Image Credit: Medium

Social Progress and Safety — How Secure and Satisfied Is Your Country?

  • High crime rates erode trust in law enforcement and government, while low rates signal effective public safety measures.
  • Reducing poverty is essential for fostering trust and improving quality of life, as poverty correlates with other social issues.
  • Unemployment leads to mental health struggles, social unrest, and distrust in government policies.
  • Lack of access to basic services indicates equity and infrastructure development.
  • Life satisfaction offers insight into how people perceive their quality of life, and can be combined with other metrics to identify root causes.

Read Full Article

like

12 Likes

source image

Cybersecurity-Insiders

1M

read

104

img
dot

Image Credit: Cybersecurity-Insiders

Can Misinformation Lead to Cybersecurity Chaos?

  • Misinformation can compromise cybersecurity protections through methods like phishing, spreading fear, promoting fake news, and malware proliferation.
  • Social media platforms exacerbate the problem by enabling the rapid spread of false information.
  • Businesses and critical infrastructure are particularly vulnerable targets of misinformation-caused cybersecurity risks.
  • To fight the risks, a broad approach is required that includes users' education, media literacy, collaboration with fact-checkers, and sophisticated security systems.
  • Effective education can include cyber literacy and improving critical thinking concerning digital information.
  • Fact checkers and media outlets can help to debunk myths and false claims that are prevalent in cybersecurity.
  • Investing in advanced security infrastructure such as intrusion detection systems and email filters is critical for combatting misinformation.
  • Combating misinformation is necessary for cybersecurity to protect against dangerous and potentially catastrophic consequences.
  • Swiftly addressing and correcting misinformation is key for a secure digital environment.
  • A multifaceted approach that combines cybersecurity awareness, proactive measures, and collaborative efforts is required to combat misinformation.

Read Full Article

like

6 Likes

source image

Cybersecurity-Insiders

1M

read

414

img
dot

Image Credit: Cybersecurity-Insiders

Cybersecurity news headlines trending on Google

  • A new variant of ransomware called Helldown is now targeting Linux and VMware server environments.
  • Helldown shares code with Darkrace and Donex, and it can disrupt Virtual Machines within controlled environments.
  • The group responsible for spreading Helldown ransomware has attacked at least 41 victims in the US and Europe.
  • India has imposed a five-year ban on WhatsApp data sharing and fined it $850 million for inadequate user information.

Read Full Article

like

24 Likes

source image

TechBullion

1M

read

9

img
dot

Image Credit: TechBullion

Securing Voice-Based Chatbots: Understanding Vulnerabilities and Solutions

  • Voice-based chatbots face significant security challenges and vulnerabilities.
  • Speech recognition and Natural Language Processing (NLP) introduce notable security risks.
  • Architectural vulnerabilities and misinformation spreading pose additional risks.
  • Proposed defenses include enhanced audio input validation, robust speech recognition algorithms, adversarial training for NLP, and multi-factor authentication.

Read Full Article

like

Like

For uninterrupted reading, download the app