Home Blog Page 353
Video making service provider Animoto has revealed a data breach that occurred on July 10 which compromised users’ personal information like names, dates of birth, and email addresses. According to the official statement, on July 10, 2018, Animoto discovered and...
The Government of Australia recently opened a new headquarters of the Australian Cyber Security Center (ACSC) in Canberra. The fifth cybersecurity-focused center of the country is aimed to be a central hub for the cybersecurity information, advice, and assistance...
A recent survey from analytics software company FICO revealed that 62 percent of UK firms lack complete cybersecurity insurance. According to the research, only 38 percent of UK firms surveyed have cybersecurity insurance that covers all risks. Telecommunications firms lag...
A security researcher from technology company Nuix revealed that police body cameras are easy to hack and manipulate. Speaking at the DEFCON hacker conference in Las Vegas, cybersecurity expert Josh Mitchell demonstrated how to manipulate a footage from police body...
Cybersecurity startup Exabeam recently raised $50 million in a series D round of funding led by Lightspeed Venture Partners. The other investors in the round included Cisco Investments, Norwest Venture Partners, Aspect Ventures, Icon Ventures, and Shlomo Kramer. The...
BusinessWire: Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner, Inc. While cloud computing presents organizations with novel opportunities, a number of new risks —...
The Department of Defense recently ran a bug bounty program dubbed ‘Hack the Marine Corps’, a challenge focused on the Corps’ public-facing websites and services. The event was jointly created by the Department of Defense and HackerOne, vulnerability disclosure...
A security team from Tencent Blade exposed new security vulnerabilities around smart speakers. Researchers Wu HuiYu and Qian Wenxiang gave a live demonstration at the DEFCON security conference on how to hack a smart speaker. The team used Amazon...
A new research from cybersecurity solutions provider Check Point revealed how organizations and individuals are vulnerable to hacking through their fax machines. Researchers at Check Point stated that fax machines have security vulnerabilities which could possibly allow a hacker to...
Election hacking is now a child’s play, or at least that is what Democratic National Committee (DNC) of United States is trying to show at the DEFCON in Las Vegas. Inspired by last year’s DEFCON’s Voting Village, where attendees got...