Wed.Dec 04, 2024

article thumbnail

Experts Warn DHS Surveillance Tech Lacks Privacy Protections

Data Breach Today

Privacy Advocates Warn of Risks from Expanding DHS Use of AI and Facial Recognition The U.S. Department of Homeland Security is reportedly expanding its use of emerging surveillance tools, including drones and artificial intelligence, without proper safeguards as experts warn of potential privacy violations and risks involving facial recognition and third-party data usage.

Privacy 296
article thumbnail

A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

WIRED Threat Level

The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone—and it's already turning up victims.

Access 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Police Disrupt Matrix Encrypted Service

Data Breach Today

Platform Used for Drugs, Arms Trafficking and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.

article thumbnail

Black Basta ransomware gang hit BT Group

Security Affairs

BT Group (formerly British Telecom)’s Conferencing division shut down some of its servers following a Black Basta ransomware attack. British multinational telecommunications holding company BT Group (formerly British Telecom) announced it has shut down some of its servers following a Black Basta ransomware attack. “We identified an attempt to compromise our BT Conferencing platform.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Bug Bounties: Bringing Hackers and Manufacturers Together

Data Breach Today

Researcher Lennert Wouters on Benefits of Device Hacking Contests, Collaboration Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.

More Trending

article thumbnail

Russian Money Laundering Services Busted in UK-Led Operation

Data Breach Today

French Police Reportedly Detain Accused Ryuk Money Launder Ekaterina Zhdanova An international investigation led by the United Kingdom busted Russian money cash-for-crypto laundering networks in an operation that's led to the arrest of 84 individuals and U.S. sanctions against others. One of the network allegedly laundered extortion money paid to the Ryuk ransomware group.

article thumbnail

Phone has bad battery life? I changed these 12 settings on my Android for better endurance

Collaboration 2.0

There are several ways to improve your Android's battery life, and I've sifted through them all to spotlight the most effective options - plus an obvious bonus.

119
119
article thumbnail

Regulator Accuses AI Video Firm of Deceptive Marketing

Data Breach Today

IntelliVision Settles With Federal Trade Commission Over Facial Recognition Claims Facial recognition software maker IntelliVision has reached a settlement with the U.S. Federal Trade Commission after the regulator accused the AI-powered software vendor of deceptive marketing claims, including that its tools have "zero gender or racial bias" and market-leading levels of accuracy.

Marketing 267
article thumbnail

Xreal AR glasses just got a major computing upgrade that puts them at the top for me

Collaboration 2.0

The company continues to push the limits of the smart glasses form factor, and its latest innovations are available now in the Xreal One Series.

IT 117
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Police Shutter Largest German-Speaking Criminal Marketplace

Data Breach Today

Crimenetwork Served as a Platform for Illegal Goods and Services German police arrested the suspected administrator of the largest German-speaking underground markets for illegal goods and services. Crimenetwork, online since 2012, was used to sell stolen data, drugs and forged documents. The platform had more than 100,000 users and 100 sellers.

Marketing 260
article thumbnail

I tested the new Kindle Scribe for two weeks, and it beat my ReMarkable in several ways

Collaboration 2.0

Amazon's new Kindle Scribe lets you mark up and jot down notes on all your favorite e-books, while offering AI to a host of note-taking features.

IT 116
article thumbnail

US FTC Cracks Down GeoLocation Data Brokers

Data Breach Today

Gravy Analytics and Mobilewalla Ordered to Implement Stronger Consent Measures Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.

Analytics 259
article thumbnail

U.S. Offered $10M for Hacker Just Arrested by Russia

Krebs on Security

In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “ Wazawaka ,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

AI in Cybersecurity: Insights from Palo Alto Networks Unit 42®

Data Breach Today

AI is reshaping the fight against digital threats. Learn how attackers are using AI to supercharge malware and social engineering—and how organizations can harness it to predict, detect, and stop cyberattacks in their tracks.

article thumbnail

Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking

WIRED Threat Level

In a letter to the Department of Defense, senators Ron Wyden and Eric Schmitt are calling for an investigation into fallout from the Salt Typhoon espionage campaign.

Security 114
article thumbnail

How Hackers Can Manipulate AI to Affect Health App Accuracy

Data Breach Today

Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.

article thumbnail

4 ways the tech we buy is designed to fail, and why you should be furious

Collaboration 2.0

From glued-in batteries to software lockouts, you're paying more than ever for gadgets that won't last. Here's why and what can do done about it.

IT 111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

World Wide Work: Landing a Cybersecurity Career Overseas

Data Breach Today

Tips for Finding and Getting Security Jobs in a Global Market Organizations ranging from multinational corporations to government agencies and international nonprofits require cybersecurity expertise. These roles often include exciting opportunities for travel or relocation, making them an attractive path for professionals ready to take their careers global.

article thumbnail

Veeam addressed critical Service Provider Console (VSPC) bug

Security Affairs

Veeam addressed a critical vulnerability in Service Provider Console (VSPC) that could allow remote attackers to execute arbitrary code. Veeam released security updates for a critical vulnerability, tracked as CVE-2024-42448 (CVSS score of 9.9) impacting Service Provider Console. Successful exploitation of the flaw can potentially lead to remote code execution on vulnerable installs.

article thumbnail

25% of enterprises using AI will deploy AI agents by 2025

Collaboration 2.0

A Deloitte report makes several notable predictions about next year's generative AI landscape in business.

106
106
article thumbnail

News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget

The Last Watchdog

Cheltenham, England, Dec. 4, 2024 –A majority of senior cybersecurity professionals at the UK’s largest organisations struggle with feelings of helplessness and professional despair, new research by Green Raven Limited indicates. These negative emotions result from practitioners’ anticipation of eventual, inevitable failure to protect their organisation.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

These Xreal AR glasses let you experience spatial computing for a fraction of the cost of Vision Pro

Collaboration 2.0

Xreal continues to push the limits of the smart glasses form factor, and its latest innovations are available now in the Xreal One Series.

IT 105
article thumbnail

Microsoft Announces Security Update with Windows Resiliency Initiative

eSecurity Planet

Microsoft recently announced that they’re making changes to their Windows operating system to improve security and reliability. The company has introduced the Windows Resiliency Initiative, a comprehensive strategy to address critical vulnerabilities and enhance overall system integrity. These new features will be available to the Windows Insider Program community sometime in early 2025.

article thumbnail

I changed these 12 settings on my Android phone to instantly improve battery life

Collaboration 2.0

There are several ways to improve your Android's battery life, and I've sifted through them all to spotlight the most effective options - plus an obvious bonus.

105
105
article thumbnail

Authorities shut down Crimenetwork, the Germany’s largest crime marketplace

Security Affairs

Germany’s largest crime marketplace, Crimenetwork, has been shut down, and an administrator has been arrested. German authorities announced the takedown of Crimenetwork, the largest German-speaking underground marketplace. Since 2012, Crimenetwork facilitated the sale of illegal goods and services, including drugs, forged documents, hacking tools, and stolen data.

Sales 121
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

FTC says AI company Evolv 'falsely hyped' its security scanners

Collaboration 2.0

Evolv's scanners don't work as well as it led schools to believe. Here's what that means for children's safety.

IT 103
article thumbnail

Cyber Threats During the Holidays: How to Stay Safe From Seasonal Scams and Data Breaches

IT Governance

As the year draws to a close, let’s look at: What were some of the biggest breaches in 2024? What threats should you be aware of this Christmas? How can organisations stay safe during the festive season? 3 major data breaches from 2024 COMBs (compilations of many breaches) aside – like the MOAB (mother of all breaches) in January 2024, which leaked more than 26 billion records – let’s look at three major breaches from 2024: 1.

article thumbnail

Spotify Wrapped arrives - now with an AI podcast all about your year in music

Collaboration 2.0

NotebookLM teams up with Spotify to bring you more fun insights into your music tastes. Here's how to hear it.

IT 103