News

You don’t always need to build fancy algorithms to tamper with image recognition systems – adding objects in random places will do the trick. In most cases, adversarial models are used to change a few pixels here and there to distort images so objects are incorrectly recognized. A few examples have included stickers that turn images of bananas into toasters, or wearing silly glasses to be fool facial recognition systems into believing you’re someone else. Let's not forget...

Read more

Security researchers from Booz Allen Hamilton have spotted a previously unseen and undocumented malware strain that targets point-of-sale (POS) systems. The malware, which they named RtPOS, appears to be Russian in origin, according to an initial technical analysis published last week. Overall, this new malware strain is nowhere near as sophisticated as other fellow POS malware strains, such as TreasureHunter, UDPoS, RawPOS, or MajikPOS. View full story ORIGINAL SOURCE: Bleeping Computer

Read more

A security researcher has published on Twitter details about a vulnerability in the Windows OS. The vulnerability is a "local privilege escalation" issue that allows an attacker to elevate the access of malicious code from a limited USER role to an all-access SYSTEM account. Will Dormann, an engineer of CERT/CC, has confirmed the vulnerability and has issued an official CERT/CC alert last night. View full story ORIGINAL SOURCE: Bleeping Computer

Read more

Microsoft has quickly reacted to the disclosure of a previously unknown zero-day vulnerability in the Windows operating system. On Monday, Twitter user SandboxEscaper revealed the existence of the bug on the microblogging platform. As reported by the Register, the user said: "Here is the alpc bug as 0day. I don't f**king care about life anymore. Neither do I ever again want to submit to MSFT anyway. F**k all of this shit." The user linked to a page...

Read more

There has been another case of major data breach, as the Brazilian crypto trading platform Atlas Quantumrevealed on Sunday that they suffered a major data theft that led to the exposure of personal details of roughly 261,000 customers. This was made public in the company’s official Facebook page. View full story ORIGINAL SOURCE: BC Focus

Read more

The Bank of Spain's website has been hit since Sunday by a cyber attack which has temporarily disrupted access to the site, a spokesman for the central bank said on Monday. The spokesman said that the attack has not had any effect on the bank's services or its communications with the European Central Bank or other institutions and that there was no risk of a data breach. View full story ORIGINAL SOURCE: Euro News

Read more

The vast majority of businesses think data protection is important or mission-critical for digital and IT transformation projects, but they lack the technological provisions to provide good data protection assurance. In a study conducted for Zerto, International Data Corporation (IDC) found that 90% of organizations do not consider themselves IT-resilient, despite aiming to achieve this goal. View full story ORIGINAL SOURCE: Security Boulevard

Read more

The Valimail Q2 2018 Email Fraud Landscape shows that fake email continues to be a serious problem, with an estimated 6.4 billion fake emails sent every day. That total includes only exact-domain sender spoofing, in which senders put a fake email address in the From: field of their messages. This is one of the most difficult to detect and damaging types of fake emails. For example, the FBI recently reported that business email compromise (BEC) costs have...

Read more

Over 90% of respondents do not consider their organization to be IT resilient and nearly half have suffered an unrecoverable data event in the last three years, according to IDC. While the majority of businesses surveyed have a cloud, digital transformation or modernization project already planned for the next two years, these same businesses rate themselves as immature on resilience objectives. This gap highlights the current demands on IT teams who are being tasked with cloud...

Read more

T-Mobile USA announced a security breach late last night. The company says its cyber-security team discovered and shut down unauthorized access to its customers' data on Monday, August 20. The telco says an attacker was exfiltrating personal data such as customer names, billing ZIP codes, phone numbers, email addresses, account numbers, and account types (prepaid or postpaid). T-Mobile said the hacker (or hackers) did not gain access to passwords, social security numbers, or any financial...

Read more
Page 30 of 1033 1 29 30 31 1,033