Category: Security

Alphabet’s cybersecurity company Chronicle will join Google Cloud

[ad_1] Chronicle got its start as a project inside X, Alphabet’s “moonshot factory,” and it quickly spun into a standalone company. When Chronicle introduced Backstory this spring, the company compared it to Google Photos for cybersecurity. Users dump in data from various security products, and Backstory organizes the alerts and scans for legitimate threats. It’s […]

Axon won’t use facial recognition tech in its police body cameras

[ad_1] Axon has not yet deployed facial recognition technology in any of its body cameras, but it has been using the AI to help blur faces in videos before they are released to the public. In a press release, the company said it will continue developing the technology in an ethical manner and will work […]

EA patched Origin security flaws that put millions of users at risk

[ad_1] The vulnerabilities took advantage of abandoned subdomains, EA Games’ use of authentication tokens and single sign-on and TRUST mechanisms built into the user login process. Had an attack been carried out, it could have been devastating, given that EA is the world’s second largest gaming company and millions of user accounts would have been […]

Minnesota cop receives $585,000 after fellow officers spied on DMV data

[ad_1] This isn’t the first such lawsuit against Minneapolis for similar behavior, or even other Minnesota cities. It’s the first to go to trial, however, and certainly the first to involve a court-decided payout. City attorney Susan Segal told Wired she was “disappointed” in the outcome, but stressed that Minneapolis had tightened its restrictions on […]

US cyberattack reportedly knocked out Iran missile control systems

[ad_1] It’s uncertain how Iran reacted to the apparent attack. Officials have declined to comment, with Cyber Command noting that it doesn’t want to jeopardize its operations by discussing its online efforts. The report comes days after word of the US planting offensive malware in Russia’s power grid, however, and not much longer after national […]

A Firefox update fixes yet another zero-day vulnerability

[ad_1] Apparently, the attackers sent spear-phishing emails to the cryptocurrency exchange’s personnel to lure them to a website designed to automatically download and run an info-stealer if it’s loaded on Firefox. The malware they used worked on both Mac and Windows and could collect passwords and other data. A Google Project Zero researcher reported the […]

Cloudflare wants to protect the internet from quantum computing

[ad_1] While Cloudflare hasn’t solved the problems that cryptography raises for encryption, it’s been trying to “quantum-proof” TLS, the encryption technology formerly called SSL, which protects connections between web browsers and servers. Cloudflare plans to continue this work, and it hopes that by sharing CIRCL, it will help other researchers prepare for a post-quantum world. […]

YouTube tests moving comments to a separate window on mobile

[ad_1] In YouTube’s current iOS and Android mobile apps, users have to scroll past the video, engagement buttons and recommended content to reach the comment section. As XDA Developers first reported, some Android users are now seeing a new button at the top of the page. To view comments, users must click that button, which […]

FEMA’s presidential alerts are an easy target for spoofing attacks

[ad_1] In their paper, the researchers developed and tested a spoofing attack on presidential alerts. They used commercially available hardware and modified open-source software to send messages to nearly every phone in a 50,000-seat stadium with a 90 percent success rate. The vulnerability is due to the fact that WEA alerts use LTE. Alerts are […]

China’s supercomputers are the latest target in US trade war

[ad_1] The Commerce Department has reportedly issued export restrictions that cut five major Chinese supercomputer developers off from US technology. According to the new rule, the firms have been “acting contrary to the national security or foreign policy interests of the United States.” The developers include Sugon of Beijing, three of its affiliates and Wuxi […]