Home Blog Page 122
Apple has dropped a controversial feature from its macOS Big Sur 11.2 beta 2 that allowed 53 of its applications to evade security scans, third-party firewalls, and VPNs. The feature, dubbed ContentFilterExclusionList, allowed popular apps like App Store, iCloud,...
In the last three decades, we have seen how innovation in computer technology has transformed human life at a rate which no other invention has done before. This was possible because computers augmented human intelligence and enhanced their capabilities....
AI-based cybersecurity firm Cybereason recently announced a collaboration with Intel Hardware Shield to provide protection against ransomware attacks without disrupting the CPU resource consumption. “The joint solution represents the first instance where PC hardware plays a direct role in...
A German programmer is sitting on a treasure chest that he knows is there and yet cannot open and savor it. Why? Because he has lost its key! It may sound funny, but a computer programmer named Stefan Thomas...
Joker's Stash, an infamous dark web marketplace for trading stolen card data, has surprisingly announced that it is shutting down its operations by February 15, 2021. The site’s operators announced the closure via messages and advertisements posted on various...
With people becoming more dependent on the app ecosystem, threat actors targeting unwitting users with fake mobile apps to compromise their accounts or steal sensitive data have become rampant. Despite multiple security checks and scans, many counterfeits and malicious...
As both a CSO and CIO, I am often asked - what keeps you up at night? Undoubtedly, I, like many of my peers, have insomnia caused by the real and growing challenge facing not just my organization, but...
As a first-year student at Russia’s leading engineering university, the Moscow State Technical University of N.E. Bauman, Dmitry Volkov co-founded Group-IB, a cyber investigations startup back then. Seventeen years on, the company has evolved into one of the cybersecurity...
The Cybersecurity and Infrastructure Security Agency (CISA) has advised users and organizations to strengthen their cloud security configurations after detecting multiple attacks targeting cloud services. In a security advisory, the agency stated that cybercriminals used advanced phishing and other...
Post Huawei’s ban from deploying 5G communications equipment in countries like the U.S., Australia, Taiwan, the U.K., and others, Nokia has now claimed the throne to become the main 5G solutions provider in NCCoE’s 5G Cybersecurity Project. Someone’s Loss is...