Linux kernel security uproar: What some people missed

Linux kernel security uproar: What some people missed

Commentary: It’s not really very interesting that University of Minnesota researchers introduced bugs into the Linux kernel. What matters is what would have happened next. Image: iStockphoto/Igor Kutyaev Recently the Linux kernel community was aflame due to efforts by researchers at the University of Minnesota to intentionally torpedo Linux security by submitting faulty patches. While the University’s Department of Computer Science apologized, the damage was done, and Linux kernel maintainer Greg Kroah-Hartman banned the University…

Read More

Parents Should Take Action to Protect Their Children from Cyber-Risks

Parents Should Take Action to Protect Their Children from Cyber-Risks

Actions parents can take to protect their children from growing cyber-risks were highlighted during a webinar organized by Menlo Security and featuring insights from Nina Bual, co-author & CEO, Cyber Lite Ready, Get Set, CONNECT! Interactive Workbook. Mike East, vice president, EMEA at Menlo, began by highlighting the expansion of the internet, which, while enriching, “sadly also we have to be painfully aware that not everything on the internet is good, and there is quite a…

Read More

REvil Removes Apple Extortion Attempt from Site: Report

REvil Removes Apple Extortion Attempt from Site: Report

A ransomware group that claimed to have Apple trade secrets in its possession after compromising a supplier has reportedly deleted all mention of the extortion attempt from its dark web site. It emerged last week that the notorious REvil group had managed to steal some schematics for Macbooks from one of Apple’s main manufacturing partners, Quanta Computer. Reports claimed that, as the Taiwanese firm refused to pay a $50 million ransom to get the stolen…

Read More

VMware Paves a Path for Radio Access Network Modernization

VMware Paves a Path for Radio Access Network Modernization

News Detail VMware Telco Cloud Platform RAN Extends the Benefits of Network Disaggregation and Virtualization from the Core to the RAN PALO ALTO, Calif.–(BUSINESS WIRE)– Communication service providers (CSPs) are modernizing their networks as quickly as they can to bring new 5G services to customers. First with the core—the heart of the network. And now further out to the edge. They want to bring the … Tue, 27 Apr 2021 00:00:00 VMware Telco Cloud Platform…

Read More

Manipulating the Ubuntu dock to keep favorite apps handy

Manipulating the Ubuntu dock to keep favorite apps handy

If you’re a Linux user, you are undoubtedly familiar with the “dock”–that column of icons lined up on the side of your screen that includes important applications, your favorites. It allows you to open the applications simply by left clicking on one of the icons. Sandra Henry-Stocker / IDG But did you know that you can add or remove applications from your dock and sometimes even change the location of the dock on your screen?…

Read More

Siemens and Google Cloud team to deliver AI-based manufacturing solutions

Siemens and Google Cloud team to deliver AI-based manufacturing solutions

Coming soon to a factory floor near you: Google AI. Google Cloud and Siemens have announced an agreement that calls for Siemens to integrate Google Cloud’s AI and machine learning technologies into its factory automation products. Google Cloud’s AI/ML capabilities will be combined with Siemens Digital Industries’ factory automation portfolio, allowing manufacturers to harmonize their factory data, run cloud-based AI/ML models on top of that data, and deploy algorithms at the network edge. This enables…

Read More

Private Equity Giant Snaps Up Proofpoint for $12.3 billion

Private Equity Giant Snaps Up Proofpoint for .3 billion

Proofpoint is set to become the latest cybersecurity acquisition of private equity giant Thoma Bravo after a $12.3 billion deal was announced yesterday. The all-cash deal will see Proofpoint shareholders receive $176 per share in cash, around a third more than the firm’s closing price on Friday. The two parties are claiming that, following the deal, Proofpoint will benefit from the “flexibility” of being a private company and from the “operating capabilities, capital support and…

Read More

Ransomware Group Threatens DC Cops with Informant Data Leak

Ransomware Group Threatens DC Cops with Informant Data Leak

Washington DC’s police department has reportedly been hit by Russian-speaking ransomware threat actors who claim to have stolen sensitive information on informants. The Babuk group has given the police three days to pay-up before it shares the data with local gangs, according to AP. As is usually the case with “double extortion” ransomware attempts like this, the group has apparently posted screenshots of the stolen data on a dark web-hosted website. These include intelligence reports,…

Read More

Would you know if your organisation had suffered a data breach?

Would you know if your organisation had suffered a data breach?

Too often, organisations fall into the trap of thinking that cyber security is only about preventing data breaches. Their budget is dedicated to anti-malware software, firewalls, staff awareness training and a host of other tools designed to prevent sensitive information falling into the wrong people’s hands. But what happens when those defences fail? It’s a question all organisations must ask themselves, because even the most resilient systems can be compromised. You can’t assume that an…

Read More

Define, Reinforce and Track: developing the positive security habit

Define, Reinforce and Track: developing the positive security habit

Getting teams to improve security can be hard work, but it’s an important job that organisations must take seriously to protect an increasingly risky world. For this post, I wanted to explore some ways that an organisation or individual might start building a new security “habit” so that, in time, acting securely becomes automatic. Define it The first key step is defining what you want your habit to be. Translating a security process or activity…

Read More
1 3,409 3,410 3,411 3,412 3,413 3,555