Uber and Lyft Pool Driver Info to Boost Passenger Safety

Uber and Lyft Pool Driver Info to Boost Passenger Safety

Ride-sharing giants Lyft and Uber have struck a data-sharing deal designed to protect passenger safety. The Industry Sharing Safety Program will for the first time enable the companies to view which drivers and delivery people have been deactivated from the other’s platform for serious safety incidents. These will relate to the five most serious safety incidents described by the National Sexual Violence Resource Center’s (NSVRC) Sexual Misconduct and Sexual Violence Taxonomy, including sexual assault and…

Read More

Encrypted Comms CEO Indicted in Drug Trafficking Conspiracy

Encrypted Comms CEO Indicted in Drug Trafficking Conspiracy

The CEO of a Canadian encrypted comms provider has been indicted by a federal grandy jury for allegedly helping organized drug traffickers to hide their communications from law enforcers. An indictment returned on Friday means arrest warrants have been issued for Sky Global boss, Jean-Francois Eap, and former distributor Thomas Herdman. They are charged with conspiracy to violate the US Racketeer Influenced and Corrupt Organizations Act (RICO). According to the indictment, Sky Global made hundreds…

Read More

NimzaLoader: Malware Written in Rare Programming Language

NimzaLoader: Malware Written in Rare Programming Language

Security experts uncovered a new kind of phishing campaign in which threat actors are using newly crafted malware written in a rare programming language to evade security detection. Researchers from Proofpoint found a cybercriminal group tracked as “TA800” distributing malware dubbed as “NimzaLoader.” The attackers used reverse engineering techniques to trick users and pilfer their sensitive data online. NimzaLoader Malware Proofpoint researchers stated that the TA800 group previously used BazaLoader malware, but from February 2021, the group has been…

Read More

SD-WAN may be the key to smart network services

SD-WAN may be the key to smart network services

If you stop and think, a lot of our expectations about network services are really about personality—our own.  We’d like our services to work, well, the way we work.  We’d like them to know us, to tune to our needs, right?  Do you think that some giant global interconnect with hundreds of thousands of elements is going to be able to do that?  Nope, which means personalized services will have to come down to the…

Read More

VMware, Nvidia offer GPU-powered AI in virtual machines

VMware, Nvidia offer GPU-powered AI in virtual machines

VMware and Nvidia have expanded their alliance to support Nvidia GPU-based applications on VMware’s new vSphere 7 Update 2. The upgraded version of vSphere 7 will support the new Nvidia AI Enterprise offering, a suite of enterprise-grade AI tools and frameworks that enables GPU-accelerated applications to run in VMware virtual machines and containers. VMware’s vSphere 7 U2 adds support for Nvidia’s A100 Tensor Core GPU and its multi-instance GPU feature, which allows for partitioning of…

Read More

NVMe over TCP: How it supercharges SSD storage using standard IP networks

NVMe over TCP: How it supercharges SSD storage using standard IP networks

Soon after data centers began transitioning from hard drives to solid-state drives (SSD), the NVMe protocol arrived to support high-performance, direct-attached PCIe SSDs. NVMe was followed by NVMe over Fabrics (NVMe-oF), which was designed to efficiently support hyperscale remote SSD pools, effectively replacing direct-attached storage (DAS) to become the default protocol for disaggregated storage within a cloud infrastructure. Most recently, NVMe over TCP has arrived to provide a more powerful NVMe-oF technology, promising high performance…

Read More

Exchange Exploit Attempts Surge Sixfold as Ransomware Lands

Exchange Exploit Attempts Surge Sixfold as Ransomware Lands

The number of global exploit attempts targeting vulnerable Microsoft Exchange servers has risen sixfold over the past few days, as Microsoft warned of a new ransomware threat to compromised systems. Check Point Research has been monitoring the situation since Microsoft released out-of-band patches for four zero-day bugs back on March 3. Reports began emerging that a Chinese state-backed group dubbed Hafnium was behind attacks in the wild exploiting the flaws. Then global attacks ramped-up massively,…

Read More

Reverse Engineering: A Security Researcher’s Toolkit

Reverse Engineering: A Security Researcher’s Toolkit

Craig Young, Principal Security Researcher at Tripwire, unpacks the modern security researcher’s toolkit to reverse engineer complex designs. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: Welcome everyone to the Tripwire Cybersecurity Podcast. I’m Tim Erlin, vice-president of product management and strategy at Tripwire. Today, I am joined by one of our security researchers, Craig Young. Craig Young: Thank you for having me. It’s a pleasure to be here with you. On the Basics of Reverse…

Read More

Crafting an effective risk register

Crafting an effective risk register

Crafting an effective risk register | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Tips small businesses can use to strengthen their cyber health

Tips small businesses can use to strengthen their cyber health

Tips small businesses can use to strengthen their cyber health | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 3,710 3,711 3,712 3,713 3,714 3,749