View Post

U.S. Department of Justice shuts down dark web marketplace AlphaBay

In Education, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

The U.S. Justice Department said on Thursday it had shut down the dark web marketplace AlphaBay, working with international partners to knock offline the site accused of allowing a global trade in drugs, firearms, computer hacking tools and other illicit goods. Authorities said the law enforcement action was one of the largest ever taken against criminals on the dark web, part of the internet that is accessible only through certain software and typically used anonymously. AlphaBay allowed users to sell and buy opioids, including fentanyl and heroin, contributing to a rising drug epidemic in the United States, Attorney General Jeff Sessions said at a news briefing in Washington, D.C. to announce the action. “The dar... Read More
View Post

Fomer FBI agent heads experienced RMF cyber group

In Business, Education, Government, Healthcare, Legal, Science & Nature, Security by Innovate LILeave a Comment

Tech News Keywords: , , , , , , ,

By GREGORY ZELLER // A former FBI special agent will help lead Ruskin Moscou Faltischek’s beefed-up cybersecurity group. A “major expansion” of the Uniondale law firm’s Cybersecurity and Data Privacy practice group places two recent acquisitions – partner Steven Kuperschmid and Richard Frankel, of-counsel – in charge of a nine-attorney squad focused on data security, regulatory compliance and breach response. Ruskin Moscou Faltischek’s cybersecurity practice actually launched several years ago to focus on issues related mostly to healthcare privacy. The rebirth, announced Thursday, reflects the changing face of data and its role in mod... Read More
View Post

State Department moves to downgrade cyber-diplomacy office

In Business, Education, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge / Rex Tillerson, US secretary of state, has decided to merge the State Department's Office for the Coordination of Cyber Issues into the department's economic bureau, as State's chief cyber-diplomat departs.Inga Kjer/Photothek via Getty Images ... Read More
View Post

Valve patches exploit that allowed hackers to hijack computers by fragging opponents

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

Valve patches exploit that allowed hackers to hijack computers by fragging opponents - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Ch... Read More
View Post

Feds have taken down two major dark web marketplaces

In Business, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

Feds have taken down two major dark web marketplaces - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddS... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1personal digital assistant0.74electronic device, personal digital assistant
2electronic device0.751
3telephone0.611telecommunication, telephone
4blue color0.937

Apple’s latest security patch fixes a bug that lets hackers take over your phone via Wi-Fi

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , ,

Apple’s latest security patch fixes a bug that lets hackers take over your phone via Wi-Fi - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Choru... Read More
View Post

Surprise: pairing your Segway hoverboard to an app isn’t a great idea

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Surprise: pairing your Segway hoverboard to an app isn't a great idea - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoad... Read More
View Post

San Francisco’s biggest public radio station was forced offline by ransomware

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

San Francisco’s biggest public radio station has been battling ransomware for over a month - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Choru... Read More
View Post

The US is reportedly close to separating military-focused Cyber Command from the NSA

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

The US is reportedly close to separating military-focused Cyber Command from the NSA - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Ch... Read More
View Post

StackRox Unveils First Container Security Platform That Adapts to Evolving Threats

In Business, Education, Events, Finance, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Startup Emerges from Stealth with Global 2000 Customers and Sequoia Capital Backing MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–July 18, 2017– StackRox today announced its platform delivering adaptive threat protection for container technologies, including Docker and Kubernetes. Co-founded in 2014 by industry veterans Sameer Bhalotra (former Sr. Director for Cybersecurity at the White House) and Ali Golshan (co-founder... Read More
View Post

Adelphi University Students Win Second Place At MobileMonday NYC API-First Hackathon

In Business, Education, Emerging Technology, Government, Healthcare, Science & Nature, Security by LongIsland.comLeave a Comment

Tech News Keywords: , , , , , , , , ,

Adelphi University computer science students come in second at MobileMonday NYC API-First Hackathon. Garden City, NY - July 17, 2017 - You probably know supercomputer Watson as the master answering machine from Jeopardy, but did you know that it’s also the perfect gift finder?  For Adelphi University computer science students Sarthak Arora ‘18 from Brooklyn, Prasanth Venigalla ‘18 from Glen Head, Jai Punjwani ‘18 from Bell... Read More
View Post

Qatar lashes out at UAE over QNA hacking

In Business, Government, Legal, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , ,

Qatar lashes out at UAE over QNA hackingThe United Arab Emirates has denied accusations that it was behind the hacking of the Qatar News Agency, which contributed to the political crisis in the Gulf. The controversy started on May 23, when alleged hackers reportedly posted fake remarks on Qatar's official media platform criticising US foreign policy and attributing the statement to the country's emir. The Washington Post says US intelligence agencies have confirmed the UAE was responsible for the cyber attack in May. In response, Qatar called it a crime and a violation of international law. Al Jazeera's David Chater reports from Doha.- Subscribe to our channel: ... Read More
View Post

DataFort invests $5.4mn in Dubai data centre

In Business, Government, Security by The StackLeave a Comment

Tech News Keywords: , , , , , ,

eHosting DataFort announced that it has invested $5.4 million in T3 data center upgrades over the past 12 months. Upgrades were made to infrastructure, cooling, power, and security. The investment in the T3 data center in Dubai was made to meet the growing demand for data center space in the Middle East, and to expand the services portfolio for the facility. The data center deployed Cisco’s Application-Centric Infrastructure (ACI), a software-defined networking (SDN) solution that maps hardware and software through application-based policy, for automation, security, agility and efficiency. This change allows eHDF to provide agile... Read More
View Post

Myspace lets you hijack any account just by knowing the person’s birthday

In Business, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Myspace lets you hijack any account just by knowing the person’s birthday - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.wind... Read More
View Post

A major global cyber attack could cause $53 billion in economic losses, on par with a natural disaster

In Business, Events, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

(Reuters) — A major, global cyber attack could trigger an average of $53 billion of economic losses, a figure on par with a catastrophic natural disaster such as U.S. Superstorm Sandy in 2012, Lloyd’s of London said in a report on Monday. The report, co-written with risk-modeling firm Cyence, examined potential economic losses from the hypothetical hacking of a cloud service provider and cyber attacks on computer operating systems run by businesses worldwide. Insurers are struggling to estimate their potential exposure to cyber-related losses amid mounting cyber risks and interest in cyber insurance. A lack of historical data on which insurers can base assumptions is a key challenge. “Because cyber is ... Read More
View Post

Dark Web drug marketplace AlphaBay was shut down by law enforcement

In Business, Government, Legal, Mobile Technology, Science & Nature, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , ,

Dark Web drug marketplace AlphaBay was shut down by law enforcement - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded... Read More
View Post

McAfee CTO says human-machine teams will stop cybercrime better

In Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , ,

Cybersecurity firm McAfee was born before the current artificial intelligence craze. The company recently spun out of Intel at a $4.2 billion valuation, and it has become a giant among tech security firms. But lots of rival AI startups in cybersecurity (like Deep Instinct, which raised $32 million yesterday) are applying the recent advances in deep learning to the task of keeping companies secure. Steve Grobman, chief technology officer at McAfee, believes that AI alone isn’t going to stop cybercrime, however. That’s in part because the attacke... Read More
View Post

Former DC staffer charged for distributing nude photos of sitting Congresswoman

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

Former DC staffer charged for distributing nude photos of sitting Congresswoman - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.... Read More
View Post

China may not be blocking VPNs after all

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

China may not be blocking VPNs after all - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=functi... Read More
View Post

Verizon partner data breach exposes millions of customer records

In Business, Events, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

Verizon partner data breach exposes millions of customer records - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1... Read More
View Post

Amazon’s biggest-selling product on Prime Day was the Echo Dot

In Business, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Amazon’s third annual, “WOW, look how cheap we are” Prime Day came and went, and the ecommerce giant has announced some interesting nuggets about the 2017 firesale. Perhaps most notably, the best-selling item on Amazon was the Amazon Echo Dot, which was available for $35, compared to the usual $50. This was despite its bigger brother, the Amazon Echo, going on sale at half-price — $90, compared to its standard $180. Though the bigger incarnation offered more value for the money, the difference between $35 and $90 is still too large a gulf for many, especially for a relatively new product line that people may not be completely sold on. It is worth stressing here that although the Echo Dot was the “m... Read More
View Post

Symantec to acquire Israeli mobile security startup Skycure

In Business, Mobile Technology, Security, Start Up by The StackLeave a Comment

Tech News Keywords: , , , , , ,

U.S. antivirus software giant Symantec has acquired Israeli mobile security firm Skycure in a bid to bolster its Cyber Defense platform for enterprise customers. The predictive threat detection platform, which is specifically designed for mobile devices, will be made available to Symantec Endpoint Protection and Norton Antivirus customers and partners once the deal closes. While Symantec has not yet revealed any financial details, reports are suggesting that the sum could total $270 million (approx. £210 million). ‘Mobile is a core component of our strategy and the acquisition of Skycure is a major step forward in executing it. To... Read More
View Post

Symantec to acquire mobile cybersecurity startup Skycure

In Business, Mobile Technology, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , ,

Security software giant Symantec is continuing its recent spate of acquisitions with the news that it plans to buy U.S / Israeli cybersecurity company Skycure. Terms of the deal were not disclosed. Founded in 2012, Skycure specializes in predicting, detecting, and preventing a range of attacks, including malware, network, and vulnerability exploits. More specifically, the company focuses on mobile threat defence (MTD), which is particularly crucial to enterprises in an age where “bring your own device” (BYOD) policies are in... Read More
View Post

AI cybersecurity startup Darktrace raises $75 million, now valued at $825 million

In Business, Education, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , ,

Darktrace, a cybersecurity platform that detects threats in real time using machine learning that adapts and learns over time, has raised $75 million in a series D round of funding led by Insight Venture Partners, with participation from Summit Partners, KKR, and TenEleven Ventures. The latest raise comes exactly a year after the U.K. outfit announced a $64 million funding round, which also included participation from Japanese telecom giant Softbank. Darktrace has raised $180 million in total since its inception, and the company now claims a post-funding valuation of $825 mi... Read More
View Post

Examining AI’s role in Amazon’s Prime Day

In Business, Finance, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

With Amazon’s third Prime Day kicking off tomorrow, Prime consumers can look forward to another day of Black Friday-esque deals. Last year, Prime Day 2016 was Amazon’s biggest sales day ever, surpassing Black Friday, Cyber Monday, and Prime Day 2015. In fact, Prime Day 2016 produced 60 percent more orders worldwide and 50 percent more orders in the U.S. compared to Prime Day 2015. Prime Day 2016 sold more than than two million toys, one million pairs of shoes, approximately 90,000 TVs, and hundreds o... Read More
View Post

Zeldin: Brookhaven attack demonstrates need for improved cybersecurity

In Business, Emerging Technology, Finance, Government, Legal, Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , , , , ,

With the rise in digital breaches domestically and abroad, from identity theft, to government and corporate hacking, it’s increasingly clear that cyber-attacks are a growing threat to our security. Just recently, on June 25, 2017, we were reminded of this risk too close to home when outside agents accessed the Town of Brookhaven’s website, as well as several websites belonging to the Ohio state government, and displayed pro-ISIS propaganda. Immediately following this breach, I was in touch with Brookhaven Town officials to offer my assistance in any way possible making introductions to the Ohio governor’s office and securing necessary support and resources from the federal government. Boosting our cybersecurity capabilities ... Read More
View Post

GOP leaders skewer cyber unit Trump discussed

In Business, Government, Security, Video by NewsyLeave a Comment

Tech News Keywords: , ,

President Donald Trump appeared to walk back an idea for a joint cybersecurity unit he discussed with Russian President Vladimir Putin.Learn more about this story at www.newsy.com/70457/Find more videos like this at www.newsy.comFollow Newsy on Facebook: www.facebook.com/newsyvideosFollow Newsy on Twitter: www.twitter.com/newsyvideos... Read More
View Post

While world moves on from Petya hack, Ukraine still suffering aftershocks

In Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

The Petya hack may not have turned out to be the global phenomenon many feared, but the ransomware attack still has Ukraine reeling. Nick Bilogorskiy, a Ukrainian cybersecurity expert and cofounder of San Jose-based Cyphort, said in a recent email interview that his native country is still trying to fully recover from an attack that hit companies, bank machines, and its infrastructure. The country was forced to extend its tax deadline to July 15, he noted, due to the attack. Indeed, many have now concluded, as Ukrainian officials asserted, that Petya was an attack on the country rather than an attempt to extort mone... Read More
View Post

Trump’s son met Russian lawyer for Clinton information

In Business, Government, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , , , , ,

US President Donald Trump appears to have gone back on a plan to set up a joint cyber-crime unit with Russia.He had announced the initiative after meeting Russian President Vladimir Putin at the G20 summit in Hamburg.The idea was ridiculed by the opposition Democrats and within the President's own Republican party.Meanwhile, there are new allegations of collusion between Trump's presidential campaign and Moscow.Al Jazeera's Heidi Zhou-Castro reports from Washington.- Subscribe to our channel: ... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1person0.783
Number of Faces Detected: 2
Face #Max AgeMin AgeAge CertaintyGenderGender CertaintyIdent NameIdent ClassificationIdent Score
164550.502284MALE0.182426Phil Taylorgreat darts players0.817574
224180.251071FEMALE0.924142Agnes Giebel0.924142

Some questions about the impenetrable Trump / Putin ‘Cyber Security unit’

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , ,

Some questions about the impenetrable Trump / Putin ‘Cyber Security unit’ - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.wi... Read More
View Post

Digitising the NHS: Creating a single source of truth

In Healthcare, Security by The StackLeave a Comment

Tech News Keywords: , ,

Andrew Morrison, managing director for Xerox UK and Ireland, discusses why creating a single shared system is critical to the ongoing progression of the NHS… With the digitisation of the NHS in full swing, steady strides are being taken towards a paper-lite system. The recent ransomware cyber-attack, however, raises questions about the institution’s paperless ambitions. Does converting to digital increase security risk? And if so, can the NHS continue to reap the transformative power of data and technology without threatening patient information? The temptation is to throw money at locking down the information held within the system. One priority, and the key to optimising the health system, h... Read More
View Post
Number of Items Identified: 16
Item #Item NameScoreItem Classification
1person0.654
2gray color0.979
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.502411MALE0.993307

Researchers Found They Could Hack Entire Wind Farms

In Business, Education, Government, Security, Start Up by Wired NewsLeave a Comment

Tech News Keywords: , , , , , ,

On a sunny day last summer, in a vast cornfield somewhere in the large, windy middle of America, two researchers from the University of Tulsa stepped into an oven-hot, elevator-sized chamber within the base of a 300-foot-tall wind turbine. They’d picked the simple pin-and-tumbler lock on the turbine’s metal door in less than a minute and opened the unsecured server closet inside. Jason Staggs, a tall 28-year-old Oklahoman, quickly unplugged a network cable and inserted it into a Raspberry Pi minicomputer, the size of a deck of cards, that had been fitted with a Wi-Fi antenna. He switched on the Pi and attached another Ethernet cable from the minicomputer into an open port on a programmable automation ... Read More
View Post

Austin startups raised over $100 million in June

In Business, Government, Healthcare, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , ,

Funding increased in June by more than $25 million compared to May’s numbers. This month, Austin tech companies collectively raised over $102 million, spread across 17 rounds from industries that include IoT, fintech, healthtech and artificial intelligence. The last time Austin tech raised north of $100 million was June 2016 led by Spredfast’s $50 million round. Take a look who... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1atomic reactor0.852apparatus, nuclear reactor, atomic reactor
2nuclear reactor0.98
3apparatus0.98
4gray color0.978

FBI-DHS “amber” alert warns energy industry of attacks on nuke plant operators

In Business, Events, Government, Healthcare, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , ,

Nuclear Regulatory Commissionreader comments 0 Share this story ... Read More
View Post

Symantec to acquire Fireglass, an Israeli cybersecurity startup that thwarts malware and phishing attacks

In Business, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , ,

Security software giant Symantec has announced plans to acquire Israeli enterprise cybersecurity company Fireglass. Terms of the deal were not disclosed. Founded out of Tel Aviv in 2014, Fireglass specializes in helping companies thwart malware and phishing attacks by preventing harmful content from breaching a company’s defences. Even if an employee does click on a spurious link in an email or visit an insecure website, for example, all content and attachments are executed in an environment separate and isolated from that in which the compa... Read More
View Post

Congress Casts A Suspicious Eye On Russia’s Kaspersky Lab

In Business, Government, Legal, Security by National Public RadioLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge this image Eugene Kaspersky, founder and chief executive officer of Kaspersky Lab, at his office in Moscow last December. Kaspersky and his firm have ties to the Russian government, but say that should not be cause for concern in the West, where the company's cybersecurity software is widely used. ... Read More
View Post

Petya ransomware authors demand $250,000 in first public statement since the attack

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Petya ransomware authors demand $250,000 in first public statement since the attack - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Cho... Read More
View Post

In the age of streaming TV, who needs title sequences?

In Business, Education, Events, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

Until Tony Soprano took viewers on a strange journey over the New Jersey Turnpike for the very first time in 1999, television title sequences were mostly straightforward affairs. There was an establishing shot: a barrel wave off the coast of Hawaii, or choppers carrying wounded vets over a mountain in Korea. Then a theme song swelled, an earworm that would echo in your brain like an advertising jingle: “Here’s the story, of a lovely lady…” Some names appeared alongside corresponding actors, who often turned to smile — or brood, depending on their character — in a weirdly stagey way. The audience was told the central premise in no uncertain terms. The n... Read More
View Post

UK public cloud adoption lags in EMEA region

In Government, Security by The StackLeave a Comment

Tech News Keywords: ,

A recent survey by Barracuda Networks shows that UK public cloud adoption is lagging behind other countries in the EMEA region. While the 550 survey respondents across the region showed increasing investment in the public cloud, UK respondents showed the lowest proportion of total IT in the public cloud at 29%. This falls well behind the leader Belgium/Netherlands, which has 41% of IT data and services in the cloud. On average, 35% of the survey respondent IT functions are currently cloud-based, with that number expected to rise to 50% by 2019, and 62% ove... Read More
View Post

A Remote Chinese Province Uses Its Climate To Grow A Big-Data Industry

In Business, Energy, Events, Gaming, Government, Legal, Mobile Technology, Science & Nature, Security by National Public RadioLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge this image Visitors look at a booth explaining the Chinese government's plans for the big-data industry at an expo in southwest China's Guizhou province. Anthony Kuhn/NPR hide caption toggle caption Anthony Kuhn/NPR ... Read More
View Post

Ukranian company that spread Petya could face criminal charges for vulnerability

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Ukranian company that spread Petya could face criminal charges for vulnerability - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus... Read More
View Post

Germany prepares for cyberattacks ahead of G20 summit

In Business, Finance, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — Germany is girding itself for possible cyber attacks on next week’s G20 summit in Hamburg, by hacker groups or cells linked to foreign governments, its top cyber official told Reuters. Arne Schoenbohm, president of Germany’s Federal Office for Information Security (BSI), said authorities had set up a 24/7 special command center to defend against such attacks, just as it was preparing for any physical violence. “We’re preparing intensively for every form of protest,” Schoenbohm said in an interview. “As the national cyber security agency … we’re concerned about everything from (persistent threats) to groups like Anonymous and Lulzsec that could be planning political protests usin... Read More
View Post

NATO could be forced to respond to the Petya attack, says new report

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

NATO could be forced to respond to the Petya attack, says new report - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoade... Read More
View Post

India pushes Microsoft for cheaper Windows 10 upgrades after cyberattacks

In Business, Emerging Technology, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , ,

(Reuters) — India is pressing Microsoft to offer a sharply discounted one-time deal to the more than 50 million Windows users in the country so that they can upgrade to the latest Windows 10 operating system in the wake of ransomware attacks. Microsoft officials in India have “in principle agreed” to the request, Gulshan Rai, India’s cyber security coordinator, told Reuters over the phone on Friday. A spokeswoman for Microsoft in India declined to comment on the matter. Officials at the company’s headquarters in the United States and regional headquarters in Asia also declined to comment. If Microsoft agreed to such a discount, it could open up the global software giant to similar requests from aro... Read More
View Post

AI Weekly: Facebook cannot please all the people all the time

In Business, Education, Emerging Technology, Gaming, Government, Legal, Mobile Technology, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Facebook’s flawed approach to censorship reveals a challenge faced by AI. According to leaked documents, human censors at the social network have devised well-intentioned ... Read More
View Post

Kinetica Raises $50 Million in Series A Financing

In Business, Emerging Technology, Events, Government, Healthcare, Legal, Mobile Technology, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Its GPU Database, Battle Tested by the Military, Gains Momentum in the Enterprise SAN FRANCISCO–(BUSINESS WIRE)–June 29, 2017– Kinetica, provider of the world’s fastest GPU-accelerated relational database, today announced it has closed a $50-million Series A financing. The round was co-led by ... Read More
View Post

The evolution of apps at the heart of the business ecosystem

In Business, Emerging Technology, Finance, Government, Healthcare, Legal, Mobile Technology, Science & Nature, Security by The StackLeave a Comment

Tech News Keywords: , , , , , , , , ,

Michael Brown, Systems Engineering Manager at F5 Networks, discusses the role of apps at the heart of ever-complex business environments… It is now widely accepted that we are on the verge of the Fourth Industrial Revolution. The fast, emerging technologies, such as artificial intelligence (AI), machine learning, robotics and the IoT, are set to dramatically change society. Opportunities for unprecedented productivity and efficiencies at a corporate and individual level will unfold, but such progress also brings significant risks. Apps sit at the heart of our rapidly evolving digital landscape. At one level, they are time-saving functions for consumers that sit as clustered icons on the ... Read More
View Post

Fears of hackers targeting hospitals, medical devices | ABC News

In Business, Healthcare, Security, Video by ABC NewsLeave a Comment

Tech News Keywords: , , ,

"Nightline" was on-site for the first-ever hospital cyber attack simulation designed to help doctors prepare for what cybersecurity experts say is a very real threat.--SUBSCRIBE to ABC NEWS: https://www.youtube.com/ABCNews/Watch More on http://abcnews.go.com/LIKE ABC News on FACEBOOKhttps://www.facebook.com/abcnewsFOLLOW ABC News on TWITTER:... Read More
View Post

Fears of hackers targeting hospitals, medical devices | ABC News

In Business, Healthcare, Security, Video by ABC NewsLeave a Comment

Tech News Keywords: , , ,

"Nightline" was on-site for the first-ever hospital cyber attack simulation designed to help doctors prepare for what cybersecurity experts say is a very real threat.--SUBSCRIBE to ABC NEWS: https://www.youtube.com/ABCNews/Watch More on http://abcnews.go.com/LIKE ABC News on FACEBOOKhttps://www.facebook.com/abcnewsFOLLOW ABC News on TWITTER:... Read More
View Post

Fears of hackers targeting hospitals, medical devices | ABC News

In Business, Healthcare, Security, Video by ABC NewsLeave a Comment

Tech News Keywords: , , ,

"Nightline" was on-site for the first-ever hospital cyber attack simulation designed to help doctors prepare for what cybersecurity experts say is a very real threat.--SUBSCRIBE to ABC NEWS: https://www.youtube.com/ABCNews/Watch More on http://abcnews.go.com/LIKE ABC News on FACEBOOKhttps://www.facebook.com/abcnewsFOLLOW ABC News on TWITTER:... Read More
View Post

Inside Story – How to stop cyber attacks? – Inside Story

In Business, Education, Government, Science & Nature, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , ,

Cyber security has become one of the most important aspect of life in the 21st century. Which means, keeping computer systems secure becomes paramount for governments and companies. Now, a major cyber attack that began in Ukraine has crippled computer systems around the world. It's shut down government agencies and impacted thousands of businesses from India to Denmark. It's linked to the so-called WannaCry ransomware, a virus that holds data hostage until a payment is made.No one knows who's behind this attack yet but the US says it's investigating. So, what will it take to stop attacks like these? and will it get worse before it gets better? Presenter: Riche... Read More
View Post

How AI and IoT must work together

In Business, Healthcare, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , ,

As artificial intelligence (AI) and Internet of Things (IoT) become more commonplace, it is both useful and important to understand how these two important trends work together to benefit specialists and the average person alike. How can AI control and potentially improve the rollout of IoT? For starters, IoT creates a tremendous amount of data. That data can be captured (enter: big data) and analyzed. But it is not realistic to do this tracking by human effort, given the sheer volume of data. ... Read More
View Post

The Petya ransomware is starting to look like a cyberattack in disguise

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

The Petya ransomware is starting to look like a cyberattack in disguise - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLo... Read More
View Post

How to stop cyber attacks? – Inside Story

In Business, Education, Government, Science & Nature, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , ,

Cyber security has become one of the most important aspect of life in the 21st century. Which means, keeping computer systems secure becomes paramount for governments and companies. Now, a major cyber attack that began in Ukraine has crippled computer systems around the world. It's shut down government agencies and impacted thousands of businesses from India to Denmark. It's linked to the so-called WannaCry ransomware, a virus that holds data hostage until a payment is made.No one knows who's behind this attack yet but the US says it's investigating. So, what will it take to stop attacks like these? and will it get worse before it gets better? Presenter: Riche... Read More
View Post

Ransomeware explainer – Analyst says spread of cyber attack due to poor security

In Business, Government, Healthcare, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , ,

The data-scrambling software epidemic that paralyzed computers globally is under control in Ukraine, where it likely originated, officials said Wednesday, as companies and governments around the world counted the cost of a crisis that is disrupting ports, hospitals and factories.Watch CGTN LIVE on your computer, tablet or mobilehttp://america.cgtn.com/livenewsSubscribe to CGTN America on YouTubeFollow CGTN America:Twitter: @cgtnamericaFacebook: @cgtnamericaGoogle+: CctvamericaTvnews»» Watch CGTN ««Washington, DC (and greater area)... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1web site0.884machine, computer, web site
2computer0.884
3machine0.884
4coal black color0.946
5black color0.714

Petya ransomware: the latest news from the global cyberattack

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: ,

Petya ransomware: the latest news from the global cyberattack - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Ch... Read More
View Post
Number of Items Identified: 16
Item #Item NameScoreItem Classification
1gray color0.724

FedEx’s Dutch operations have been ‘significantly affected’ by the Petya virus

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

FedEx’s Dutch operations have been ‘significantly affected’ by the Petya virus - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Ch... Read More
View Post

Petya virus is something worse than ransomware, new analysis shows

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Petya virus is something worse than ransomware, new analysis shows - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=... Read More
View Post

Cyberattacks causing widespread computer chaos across Europe

In Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

Published on Jun 27, 2017It's a world-wide web of chaos. Hackers unleashed a cyber-attack across Europe. This electronic outbreak is similar to last month's ransomware rampage. CGTN's Julia Lyubova explains the digital disruption. Category License Standard YouTube License ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1official0.604person, official
2person0.799

News Wrap: Ransomware attacks European company, Ukraine power grid

In Business, Government, Security, Video by PBS NewsHourLeave a Comment

Tech News Keywords: , , ,

In the our news wrap Tuesday, a new cyber attack caused massive disruptions across Europe and elsewhere. Ukraine was hit hard, where banks, government computers and the power grid were breached. Also, the U.S. State Department declared China to be among the worst countries tolerating human trafficking in the world.... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1photo with bars0.698building, institution, photo with bars
2institution0.698
3building0.698
4hand0.606person, hand
5person0.606

Today’s global ransomware attack weaponized software updates

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Today's global ransomware attack weaponized software updates - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Cho... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1surveillance system0.95telecommunication system, television, surveillance system
2television0.965
3telecommunication system0.967
4telecommunication0.968
5azure color0.901

Australian police blame WannaCry for spoiling 8,000 traffic cam tickets

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Australian police blame WannaCry for spoiling 8,000 traffic cam tickets - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLo... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1computer user0.606person, computer user
2person0.606
3coal black color0.921

It’s already too late for today’s ransomware victims to pay up and save their computers

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

It’s already too late for today’s ransomware victims to pay up and save their computers - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus... Read More
View Post

New cyberattack causes mass disruption globally

In Business, Emerging Technology, Government, Legal, Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , ,

A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across the world, hitting companies and governments in Europe especially hard. Officials in Ukraine reported serious intrusions of the country’s power grid as well as at banks and government offices, where one senior executive posted a photo of a darkened computer screen and the words, “the whole network is down.” The prime minister cautioned that the country’s “vital systems” hadn’t been affected. Russia’s Rosneft oil company also reported falling victim to hacking and said it had narrowly avoided major damage, as did Danish shipping giant A.P. Moller-Maersk. “We are talking about a cybera... Read More
View Post

Large Cyberattack Hits Ukraine, Snarling Electric Grids And Banks

In Business, Government, Legal, Science & Nature, Security by National Public RadioLeave a Comment

Tech News Keywords: , , , , , , , , ,

A large and coordinated malware attack hit key parts of Ukraine's infrastructure Tuesday, taking a toll on government agencies, electric grids, stores, and banks. Computers are being hit by a ransomware program called Petya that demands a $300 bitcoin payment to retrieve files. "You became victim of the PETYA RANSOMWARE!" reads the text on a red screen in a photo posted by Ukraine's government portal on Facebook. "The harddisks of your computer have been encrypted with an military grade encryption algorithm," the message continues. "There is no way to restore your data without... Read More
View Post

A new ransomware attack is devastating airlines, banks and utilities across Europe

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

A new ransomware attack is devastating airlines, banks and utilities across Europe - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chor... Read More
View Post

Ex-FBI advisor raises $12 million for cybersecurity startup JASK

In Business, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , ,

JASK, which provides companies with software to monitor cyber threats, came out of stealth today and announced funding of $12 million in a round co-led by Dell Technologies Capital and TenEleven Ventures. Existing investors Battery Ventures and Vertical Venture Partners also joined. The San Francisco-based startup deploys software sensors on customer networks to monitor threats and suspicious activity. “Our technology monitors a customer’s entire network internally and externally, while most organizations just monitor externally,” wrote JASK cofounder and CEO Greg Martin, in an email to VentureBeat. “Our AI doesn’t just learn from your network and its vulnera... Read More
View Post

What Is Steganography?

In Business, Events, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , ,

You know all too well at this point that all sorts of digital attacks are lurking on the internet. You could encounter ransomware, a virus, or a sketchy phish at any moment. Even creepier, though, some malicious code can actually hide inside other, benign software—and be programmed to jump out when you aren't expecting it. Hackers are increasingly using this technique, known as steganography, to trick internet users and smuggle malicious payloads past security scanners and firewalls. Unlike cryptography, which works to obscure content so it can't be understood, steganography's goal is to hide the fact that content exists at all by embedding it in something else. And since ... Read More
View Post

Westminster hack: Media accuses Russian hackers of breaching UK parliament accounts

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , ,

The UK’s Houses of Parliament have been hit by a cyber-attack according to a parliamentary spokesperson.RT LIVE http://rt.com/on-airSubscribe to RT! http://www.youtube.com/subscription_c...Like us on Facebook http://www.facebook.com/RTnewsFollow us on Twitter ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1picture frame0.709supporting structure, framework, picture frame
2framework0.825
3supporting structure0.825
4iPod0.649audio system, stereo system, iPod
5stereo system0.733
6audio system0.733
7frame0.621supporting structure, framework, frame

Alexa’s new calling feature means it’s really time to set up two-factor authentication

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

Alexa’s new calling feature means it's really time to set up two-factor authentication - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{... Read More
View Post

Obama Failed to Punish Russian Hacking, and Other Security News This Week

In Business, Events, Government, Legal, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Before state-sponsored Russian hackers set their sights on the US election, they targeted a whole country: the Ukraine. In our cover story this month, WIRED's own Andy Greenberg dives into the cyber war Russia has been fighting with its neighbor, and how the tactics it honed there–how to take down a power grid, for instance–are a blueprint for what it could do to the United States. You should read it, and you should watch ... Read More
View Post

How blockchain-based apps and sites resist DDoS attacks

In Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Sometimes, truth is stranger than fiction! The recent Distributed Denial-of-Service (DDoS) attacks on Final Fantasy XIV’s gaming platform are quite surreal, yet a timely signpost of where things are heading. Using traditional cyber security technology, we are playing “whack a mole” against the ever-changing DDoS attacks. We live in an age where DDoS attacks will only grow over time, while becoming more mature in the process. It’s no longer just a script kiddie activity. Considering a rising number of unsecured IoT devices are connected to one another, the potential for DDoS attacks to creep in and overpower an organization is very real. Just last year, KrebsOnSecurity.com experienced the largest recorded DDoS attack... Read More
View Post

The British Parliament has been hit by a cyberattack

In Business, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

The British Parliament has been hit by a cyberattack - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddS... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1politician0.609person, politician
2person0.787
3orange color0.967
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender CertaintyIdent NameIdent ClassificationIdent Score
154450.375879MALE0.993307Vladimir Putinpeople, world leaders0.731059

Obama reportedly ordered hacking operation targeting key Russian networks

In Business, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

EnlargeWikimedia Commons/Maria Joner reader comments 3 Share this story ... Read More
View Post

Tech firms including Cisco, IBM, and SAP allow Russian authorities to review product source code

In Business, Events, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has found. Russian authorities are asking Western tech companies to allow them to review source code for security products such as firewalls, anti-virus applications and software containing encryption before permitting the products to be imported and sold in the country. The requests, which have increased since 2014, are ostensibly done to ensure foreign spy agencies have not hidden any “backdoors” that would allow them to burrow into Russian sys... Read More
View Post

YL Ventures Expands Advisory Board with Akamai and Imperva Executives for $75M Fund

In Business, Government, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , ,

SAN FRANCISCO & TEL AVIV, Israel–(BUSINESS WIRE)–June 22, 2017– YL Ventures, the Silicon Valley headquartered seed-stage venture capital firm investing in Israeli innovation, announces the expansion of its leadership team with another two market leading venture advisors, Andy Ellis, chief security officer of Akamai Technologies, Inc. and Amichai Shulman, co-founder and chief technology officer of Imperva, Inc. The expansion of YL Ventures leadership team follows ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1Labourite0.652person, Labourite
2person0.769
3jade green color0.868

Governor Cuomo Directs Cyber Security Advisory Board To Review Voting Infrastructure Amidst Reports Of Foreign Interference In 2016 Election

In Business, Education, Government, Security by LongIsland.comLeave a Comment

Tech News Keywords: , , , , , , , , ,

Governor Cuomo Directs State Cyber Security Advisory Board to Review Cyber Security Defenses in Conjunction with State and County Boards of Election. Albany, NY - June 20, 2017 - Governor Andrew M. Cuomo today announced new actions to further protect the integrity of New York’s electoral process amidst reports of Russian interference in the U.S. 2016 election. Governor Cuomo has directed the New York State Cyber Security Advisory Board to work with State agencies and the State and County Boards of Election to assess the threats to the cyber security of New York’s elections infrastructure, identify security priorities, and recommend an... Read More
View Post

Cyber security is a critical business risk for the NHS, warns Barclays CSO

In Business, Government, Healthcare, Legal, Security by The StackLeave a Comment

Tech News Keywords: , ,

Cyber security is a business risk and must be the responsibility of the person at the top of any organisation, says Christopher Greany, Head of Group Investigations, Barclays Chief Security Office. Speaking about the recent cyber attack on the NHS when ransomware led to cancelled operations and diverted ambulances, he warns: ‘If the Chief Executive doesn’t understand the business risk of not having a good cyber security strategy that protects patients and the operating system of the business, it’s a business failure. For the NHS, cyber security is a critical business risk because the business of the NHS is keeping people alive and keeping them safe.’ Before joining Barclays, Greany had a policing career spanning ov... Read More
View Post

VIDEO: Watch Hackers Take Over the Mouse of a Power Grid Engineer

In Business, Government, Mobile Technology, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , ,

The best work of hackers tends to remain invisible. But when sophisticated intruders broke into the computer networks of regional energy firms in Ukraine in 2015 and cut power to roughly a quarter million people, their tampering didn't go unnoticed. In this rare instance, the staff of one of those electric utilities managed to capture the hackers' handiwork on video, which you can watch above. Two days before Christmas in 2015, engineers at the Prykkarpatyaoblenergo regional energy company in Western Ukraine found themselves locked out of their PCs. More troubling still, their mouse cursors moved of their own accord.... Read More
View Post

Attention Holiday Shoppers: UPS To Add Delivery Surcharges

In Business, Security by National Public RadioLeave a Comment

Tech News Keywords: , ,

Enlarge this image Mark Lennihan/AP The first day of summer doesn't begin until Wednesday but United Parcel Service already is looking ahead to the colder seasons with plans to charge retailers an extra fee for orders placed around Black Friday and Christmas. And consumers could end up carrying that extra weight if retailers decide to pass on t... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1web site0.931device, machine, computer, web site
2computer0.931
3machine0.931
4device0.931
5reddish brown color0.894
6dark red color0.629

Report: US, UK Link Wannacry Virus to North Korea

In Security, Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , ,

Published on Jun 19, 2017The Washington Post reported that the NSA has linked the Wannacry computer virus to North Korea, while the BBC reported that Britain's National Cyber Security Centre made the same connection Category License Standard YouTube License ... Read More
View Post

Mexican journalists targeted by spyware after investigating government corruption

In Business, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

Mexican journalists targeted by spyware after investigating government corruption - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Choru... Read More
View Post

Trump to meet CEOs of Apple, Amazon, and nearly 20 other tech firms to discuss government overhaul

In Business, Emerging Technology, Events, Government, Healthcare, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — President Donald Trump will meet with the chief executives of technology companies including Apple and Amazon.com on Monday as the White House looks to the private sector for help in cutting government waste and improving services. White House officials said on a conference call on Friday that the administration believed there was an “economic opportunity” to save up to $1 trillion over 10 years by significantly cutting government information technology costs, reducing government costs through improved IT, leveraging government buying power and cutting fraud across government agencies. The meeting with nearly 20 chief executives comes as the White House pushes to shrink government, cut federal emp... Read More