Fri.Aug 16, 2024

article thumbnail

Millions of Pixel devices can be hacked due to a pre-installed vulnerable app

Security Affairs

Many Google Pixel devices shipped since September 2017 have included a vulnerable app that could be exploited for malicious purposes. Many Google Pixel devices shipped since September 2017 have included dormant software that could be exploited by attackers to compromise them. Researchers form mobile security firm iVerify reported that the issue stems from a pre-installed Android app called “Showcase.apk,” which runs with excessive system privileges, allowing it to remotely execute co

Retail 358
article thumbnail

The Slow-Burn Nightmare of the National Public Data Breach

WIRED Threat Level

Social Security numbers, physical addresses, and more—all available online. After months of confusion, leaked information from a background-check firm underscores the long-term risks of data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft urges customers to fix zero-click Windows RCE in the TCP/IP stack

Security Affairs

Microsoft addressed a critical zero-click Windows remote code execution (RCE) in the TCP/IP stack that impacts all systems with IPv6 enabled. Microsoft urges customers to fix a critical TCP/IP remote code execution (RCE) flaw, tracked as CVE-2024-38063 (CVSS score 9.8), in the TCP/IP stack. The vulnerability impacts all systems with IPv6 enabled (IPv6 is enabled by default).

IT 356
article thumbnail

This $20 Anker power bank solved my biggest problem with portable chargers

Collaboration 2.0

Thanks to its clever form factor, Anker's Nano Power Bank made charging my iPhone or Android effortless. It's available now on Amazon for under $20.

IT 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

CISA adds SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SolarWinds Web Help Desk deserialization of untrusted data vulnerability, tracked as CVE-2024-28986 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.

IT 323

More Trending

article thumbnail

Banshee Stealer, a new macOS malware with a monthly subscription price of $3,000

Security Affairs

Russian cybercriminals are advertising a new macOS malware called Banshee Stealer with a monthly subscription price of $3,000. In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures. The malware authors claim it can steal a broad range of data from compromised systems, including browser data, cryptocurrency wallets, and around 100 browser extensions.

article thumbnail

This $50 Meta Quest 3 accessory is a game-changer for people with glasses

Collaboration 2.0

There are lots of accessories for the Meta Quest 3, but these VR prescription lenses from Zenni solve the problem of wearing glasses with the headset once and for all.

246
246
article thumbnail

Russian national sentenced to 40 months for selling stolen data on the dark web

Security Affairs

A Russian national was sentenced to over three years in prison for selling stolen information and credentials on a dark web marketplace. The 27-year-old Russian national Georgy Kavzharadze (also known as “George,” “TeRorPP,” “Torqovec,” and “PlutuSS”) has been sentenced to over three years in prison for selling financial information, login credentials, and other personal data on the dark web marketplace, Slilpp.

Sales 311
article thumbnail

7 ways to make Windows 11 less annoying

Collaboration 2.0

Here's how to turn off the Windows ads, upsells, and cross-sells, among other things.

190
190
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Russian Sentenced to 3 Years for Selling Stolen Identities

Data Breach Today

FBI Sting Identified Georgy Kavzharadze as Vendor on Illicit Slilpp Markplace Russian national Georgy Kavzharadze, 27, has been sentenced to serve 40 months in U.S. prison after pleading guilty to earning over $200,000 by selling stolen U.S. bank account access credentials via the illicit Slilpp stolen-credential marketplace.

Access 162
article thumbnail

6 reasons why a Chromebook is the best laptop for most anyone

Collaboration 2.0

It remains the tech world's worst-kept secret: Skip the Windows and MacOS bling. If you want a fast, reliable, affordable laptop, get a Chromebook.

IT 189
article thumbnail

UK Software Security Code of Practices Earns Mixed Reviews

Data Breach Today

Voluntary Code Could Be First Step to Regulation A draft set of recommendations published by the U.K. government promoting software resiliency received mixed reviews from British software executives who criticized a lack of specificity and overlap with existing best practices. The measures consist of a 21-step framework.

Security 147
article thumbnail

I revisited the System76 Thelio, and it remains my all-time favorite desktop

Collaboration 2.0

I recently retired my old Thelio desktop and opted for the latest iteration of the same thing instead of getting something new. Boy, did I make the right call.

IT 189
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Cardiology Practice: Hack Affected 281,000 Patients, Docs

Data Breach Today

Breach Spotlights the Cyber Woes Faced by Other Medical Specialty Entities An Alabama cardiology practice is notifying 281,000 current and past patients, physicians and employees that their sensitive information was stolen in a recent hack. The breach is one of many incidents at specialty medical practices, spotlighting the heightened risks these entities face.

Risk 147
article thumbnail

Microsoft is making it easier to share files between Windows and Android - here's how

Collaboration 2.0

The new option, coming soon to Windows 10 and 11, lets you exchange files between your Windows PC and Android device with just a few clicks. You can try it out now.

IT 189
article thumbnail

Unpatched Vulnerabilities Cause 60% of Cyber Compromises

Data Breach Today

Gutsy's John Morello on Ensuring Vulnerability Management Using Process Mining Organizations struggle with vulnerability management, with nearly 60% of cyber compromises caused by unpatched vulnerabilities, says John Morello, co-founder and CTO of Gutsy. He discusses how process mining can streamline remediation efforts and ensure accountability across teams.

Mining 147
article thumbnail

So long, point-and-click: How generative AI will redefine the user interface

Collaboration 2.0

Will 'GenAI-first UX' help transition enterprise applications from rigid, linear user flows to flexible, intuitive experiences? Here's why excitement is brewing.

189
189
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New Windows IPv6 Zero-Click Vulnerability

Schneier on Security

The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets. Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consis

IT 133
article thumbnail

Turn your Meta Quest into a massive display for any HDMI device - here's how

Collaboration 2.0

Now, you can connect your game console, laptop, or phone to any Quest headset. We show you how to set it up. (And explain one small caveat.

IT 189
article thumbnail

News alert: Implementing AI-powered ‘Cisco HyperShield’ requires proper cybersecurity training

The Last Watchdog

Cary, NC, Aug. 16, 2024, CyberNewsWire — The imminent release of Cisco HyperShield this month marks a pivotal evolution in the cybersecurity landscape. As an “AI-native” security architecture, HyperShield promises to redefine traditional security protocols through its automated proactive cybersecurity measures and AI-driven security solutions.

article thumbnail

IBM to set up 'full stack' AI facility at university

Collaboration 2.0

Located at the National University of Singapore, the AI research and development center will focus on sustainability and safety.

189
189
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

KnowBe4

Heads-up: I just proved that unsuspecting call recipients are super vulnerable to AI vishing

article thumbnail

Google tops the Index with Gemini Live and Pixel's AI features

Collaboration 2.0

Made by Google had plenty to offer in terms of innovations, but divided ZDNET's experts and editors. Here's what stood out this week.

189
189
article thumbnail

Asia-Pacific Regulations Keep Pace With Rapid Evolution of Artificial Intelligence Technology

Data Matters

Regulation of artificial intelligence (AI) technology in the Asia-Pacific region (APAC) is developing rapidly, with at least 16 jurisdictions having some form of AI guidance or regulation. Some countries are implementing AI-specific laws and regulation, while others take a more “soft” law approach in reliance on nonbinding principles and standards. While regulatory approaches in the region differ, policy drivers feature common principles including responsible use, data security, end-user protect

article thumbnail

How the latest Kubernetes release now handles AI workloads - and more

Collaboration 2.0

On top of tackling the container software's troubles with AI and ML jobs, Kubernetes 1.31 delivers several key security enhancements.

Security 189
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity protection with Jamf Safe Internet

Jamf

Schools are common targets of cyber attacks, resulting in lost money, student data and learning time. Learn how web threat prevention in Jamf Safe Internet can keep schools secure.

article thumbnail

A 'very large percentage' of Pixel phones have a hidden security vulnerability

Collaboration 2.0

An app for store employees to show off devices had privileges it didn't need. A fix is on the way.

Security 189
article thumbnail

How to Use 1Password: Guide to Getting Started

eSecurity Planet

With cybersecurity becoming increasingly complex, it is necessary to have a good way to handle your passwords to keep all your private stuff safe. Amidst all the many tools available on the market, 1Password stands out as a great pick. It’s got the best security features and is relatively easy to use. Whether you’re a business or just someone trying to keep track of your online accounts, 1Password is like the Swiss Army knife for password management.