Silver Sparrow Malware Hatched on 30,000 Macs

Silver Sparrow Malware Hatched on 30,000 Macs

Although researchers at Malwarebytes have identified 29,139 macOS endpoints infected by Silver Sparrow, many more machines could be hit by the malicious software, maintained Tony Anscombe, chief security evangelist at Eset.

How Biometric Authentication Methods Will Revamp the Commerce Experience

How Biometric Authentication Methods Will Revamp the Commerce Experience

Instead, consumers will use unique motion sensors in smartphone devices to passively authenticate people using their walking behavior and other contextual biometric signals."The biggest challenge developers face with these new capabilities is letting people know about them," Whaley said.

The Future of Cybersecurity in 2021 and Beyond

The Future of Cybersecurity in 2021 and Beyond

Some enterprises are shifting their business model to focus on virtual workforce, de-emphasizing the need to secure office networks," O'Connor told TechNewsWorld.Another major cybersecurity attack trend focuses on the protective tools and security vendors within the industry, noted Brandon Hoffman, chief information security officer at Netenrich.

Artificial emotional intelligence: a safer, smarter future with 5G and emotion recognition

Artificial emotional intelligence: a safer, smarter future with 5G and emotion recognition

Hyunbum Kim from Incheon National University, Korea, address such issues in relation to an AI-based, 5G-integrated virtual emotion recognition system called 5G-I-VEmoSYS, which detects human emotions using wireless signals and body movement.

The New Era of Cashless, Invisible Payments

The New Era of Cashless, Invisible Payments

A big part of the consumer adoption process for these new payment methods are shoppers' familiarity with biometric fingerprint technology, according to Graziani.

What Does the Penguin Say?

What Does the Penguin Say?

Merely as a point of comparison, and not as disparagement of users of other operating systems, I have not observed communities as active, vocal, and visible as Linux's among Windows and Mac users.

Is 2021 the Year Cyberattacks Force Privacy Laws to Grow Some Teeth?

Is 2021 the Year Cyberattacks Force Privacy Laws to Grow Some Teeth?

"The massive migration of data to the cloud, the democratization of data within an organization, and the work-from-home environment have expanded the attack surface for data and make it extremely hard to operate an effective data protection program," said Chai.

High Time for Cyberlaw Enforcement and a Future of Work Strategy

High Time for Cyberlaw Enforcement and a Future of Work Strategy

For those like me who spend tons of time in front of a screen and need the real estate, this 40" UltraSharp monitor from Dell (some call it the ultimate work from the home monitor) is a godsend -- and my product of the week.

Americans Balking at Buying Smart Home Devices

Americans Balking at Buying Smart Home Devices

While pricing can be discouraging to consumers, more low-cost devices are beginning to reach the market, noted Blake Kozak, senior principal analyst for the smart home at Omdia.

Hate The Oculus FB Login Policy? Carmack Confirms It's Here To Stay

Hate The Oculus FB Login Policy? Carmack Confirms It's Here To Stay

Unlucky for us, former Oculus CTO John Carmack has confirmed it "isn't going away."."[Facebook] login isn't going away.Given the climate, I don't expect people to believe it, but [Facebook] is extremely serious about privacy.".

Cloud Security Practices Playing Into Hands of Attackers

Cloud Security Practices Playing Into Hands of Attackers

Five issues prevent the development of this capability: The fast pace of change in both security technologies and adversaries; Vendors focus on a "single pane of glass," or dashboard that visually represents event data.Secure, intelligent ecosystems are cloud-based memory banks that continuously fuse and enrich data from internal security tools and external sources.

Federal Spurt in Cloud Spending Will Extend Well Into the Future

Federal Spurt in Cloud Spending Will Extend Well Into the Future

The Deltek analysis noted several key factors related to the future development of cloud technology at the federal level: As a Service: Spending on Software as a Service (SaaS) and Platform-as-a-Service (PaaS) will continue to grow across government, but investments for Infrastructure-as-a-Service (IaaS) appears to be leveling off in the market-leading civilian sector.

VRtuoso Brings Remote Learning and Collaboration to Accessible Devices

VRtuoso Brings Remote Learning and Collaboration to Accessible Devices

VRtuoso specializes in the creation and distribution of remote learning experiences involving 360-degree images and video.Like virtually all companies, specifically XR enterprise and remote learning providers, VRtuoso has been impacted significantly by coronavirus.

Smart Device Life Cycles Can Pull the Plug on Security

Smart Device Life Cycles Can Pull the Plug on Security

One out of three households in the United States with broadband connections owns at least one smart home device, and interactive security systems that allow remote connection and control capabilities are installed in 20 percent of these households, research firm Park Associates reports.

DevSecOps: Solving the Add-On Software Security Dilemma

DevSecOps: Solving the Add-On Software Security Dilemma

30 by open source security and license management company WhiteSource explores various factors contributing to the siloed software development culture and what steps are needed to achieve agile, mature, DevSecOps practices -- which involves integrating IT security as a shared function among all DevOps teams.

Some Smart Home Devices Headed to the 'Brick' Yard

Some Smart Home Devices Headed to the 'Brick' Yard

Still others, like Belkin and Best Buy, may have found that providing cloud-based access for their smart device products was not worth the time, cost, need for technical support and effort required.

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

A researcher from the XR community has gained root access to Oculus Quest 2 and is able to bypass Facebook Login.XRSI wants to help extend the same to AR/VR headsets, which would including protecting the right of users to jailbreak devices like Quest 2.

Defending the Right to Repair for XR

Defending the Right to Repair for XR

The unfortunate part is major tech firms are yet to clarify their position on the Right to Repair Act, and more specifically on the activity of jailbreaking, which puts people like myself and many other ethical hackers and researchers at risk.

How to Protect Mobile Apps Against Sneaker Bots

How to Protect Mobile Apps Against Sneaker Bots

The goal of adding generalized security protections inside the good mobile app is to block common pathways that sneaker bot apps and auto-clicking apps need to function.

TikTok Enlists Oracle to Evade Trump's Executive Order

TikTok Enlists Oracle to Evade Trump's Executive Order

The plan submitted by ByteDance, which owns TikTok, calls for the company to enlist Oracle as a "trusted technology provider" in order to address national security concerns raised about the video-sharing software by the Trump administration.

OpenEEW Formed to Expedite Earthquake Warning Systems

OpenEEW Formed to Expedite Earthquake Warning Systems

OpenEEW is an open-source IoT project with the goal to save lives by reducing the cost of earthquake early-warning (EEW) systems and accelerating their deployments globally.Grillo used several other open-source technologies in designing its OpenEEW project, Meira noted.

Cybersecurity Assessment and the Zero Trust Model

Cybersecurity Assessment and the Zero Trust Model

Doing this means the entity can focus all of its resources on hardening cloud infrastructure, gate services such that all access (regardless of source) is protected in a robust way, and deprioritize things like physical security, hardening the internal network (assuming there even is one), deploying internal monitoring controls, etc.

Microsoft Ignite and Dominating the Future of Tech the Right Way

Microsoft Ignite and Dominating the Future of Tech the Right Way

Satya Nadella came in, and now Microsoft is both more powerful and not threatening because they approach market dominance the right way -- by not focusing on it.

Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?

Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?

For example, teddy bears and other toys, sports equipment such as exercise machines, gaming devices and connected cars, according to global cybersecurity firm Palo Alto Networks' 2020 IoT Security Report.

The Case Against Full-Disk Encryption

The Case Against Full-Disk Encryption

Obviously, your computer will have to decrypt some data some of the time, but even then, because the encryption is implemented at the filesystem level, your file-based encrypted OS can do so more efficiently than the full-disk encrypted analog would.

Hucksters Rake In $500K With Android, iOS Adware Scam Apps

Hucksters Rake In $500K With Android, iOS Adware Scam Apps

Since the app is side-loading its adware and not serving the ads itself, the bad app should be easier to detect, but it does lower its profile by limiting itself to only functions used by legitimate programs and nothing more.

Do's and Don'ts for SMB Cybersecurity Safety

Do's and Don'ts for SMB Cybersecurity Safety

"As the abnormal becomes our new normal, SMBs need to approach remote work by using a combination of cloud-based applications and on-premises solutions to keep employees and systems safe, and ensure business continuity," said Scott Devens, CEO at Untangle.

Inside Anduril, Palmer Luckey's Bid to Build a Border Wall

Inside Anduril, Palmer Luckey's Bid to Build a Border Wall

Luckey’s company, Anduril Industries, is pitching its technology to the Department of Homeland Security as a complement to—or substitute for—much of President Trump’s promised physical wall along the border with Mexico.

The Perils of IT Security Hubris

The Perils of IT Security Hubris

Corporate cybersecurity has been increasingly compromised since businesses and organizations began implementing work-from-home (WFH) policies in March as the pandemic continued its spread.

Pico Doubles Down on Enterprise With Snobal Partnership

Pico Doubles Down on Enterprise With Snobal Partnership

Partnering with a security-focused enterprise cloud services provider with remote collaboration tool on the way definitely advances their position in the space.“ Both Pico and Snobal believe the privacy of its users is of the utmost importance, which is why no social media profiles are required for use – all the way from setting up the headset to utilizing the platform,” reads a press release announcing the partnership.