YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube has taken down almost 3000 channels and accounts deemed to part of separate Chinese and Russian state coordinated influence operations. The vast majority of the work involved the removal of 2946 YouTube channels deemed to be part of a Chinese influence operation, according to Google’s Threat Analysis Group director, Shane Huntley. “These channels mostly uploaded spammy content in Chinese about music, entertainment and lifestyle,” he explained in a TAG bulletin for Q1 2021. “A very…

Read More

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

French software provider Centreon has hit back at a report from the country’s cybersecurity agency that its products were hijacked in a Russian cyber-campaign, claiming that no paying customers were affected. The firm, which produces IT monitoring software not unlike SolarWinds, was at the center of a report from the French National Agency for the Security of Information Systems (ANSSI) this week. It claimed that the infamous Sandworm group, responsible for destructive attacks against Ukrainian energy…

Read More

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea has attempted to hack into COVID-19 vaccine data from US pharma giant Pfizer, it has been claimed. As reported by the BBC, South Korea’s National Intelligence Agency has briefed law makers about the alleged cyber-attack, although it is unclear whether any data has been stolen. Pfizer is one of several pharma companies that have developed and received approval for a vaccine designed to protect against coronavirus in recent months. However, the development and…

Read More

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the “global” in GSOCs: How to build a comprehensive digital risk protection approach | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

Accidental database breaches are on the rise – How can your company avoid becoming the next headline? | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

VERT at the Movies: Cybergeddon | The State of Security

VERT at the Movies: Cybergeddon | The State of Security

While I was teaching, one of my students asked if I had seen Cybergeddon, a film distributed by Yahoo! in 2012. I had not, so I decided it would be fun for VERT to watch the film and review it, since my hobby is writing film reviews for RotundReviews. Cybergeddon is not talked about as much as it should be given some of the background around it. It should be noted that while we’ll reference…

Read More

The fine line between global COVID-19 protocols and privacy

The fine line between global COVID-19 protocols and privacy

A panel of experts considers the best methods for safe domestic and international air travel including proof of testing, vaccination passports, and digital health passes. Image: iStock/Vanessa Nunes A recent panel conducted by the security firm Concentric Advisors, “Protocols, Testing, and Proof of Vaccine—What is the future of privacy and travel?” took a deep dive predicting how domestic and international air travel can be safely mandated during the continuing COVID-19 worldwide pandemic.  The panel of…

Read More

Neighbor Revealed as Cyber-Stalker

Neighbor Revealed as Cyber-Stalker

A South African man has admitted carrying out a cyber-harassment campaign against his neighbors in an attempt to extort money.  Residents of the same quiet street in a Durban suburb that Dharmesh Singh calls home were subjected to weeks of abuse with no idea that the person behind it was their immediate neighbor.  Twenty-three-year-old Singh used unregistered SIM cards to create fake social media profiles from which he sent threatening messages to residents of Battersea Road,…

Read More

Europeans Unhappy with TikTok’s Child Safety Policy

Europeans Unhappy with TikTok’s Child Safety Policy

European consumer groups have accused video-sharing app TikTok of failing to protect minor users from inappropriate content and hidden advertising. The Chinese-owned app was the target of multiple complaints from organizations in 15 different countries on Tuesday for allegedly violating European consumer rights. Along with its treatment of children and teens, the app was slammed for its allegedly unfair terms of service, misleading data-processing practices, and virtual gifts feature critics say modifies the exchange rate so transactions are financially in the…

Read More

How to Deploy GPU-Accelerated Applications on Amazon ECS with Docker Compose – Docker Blog

How to Deploy GPU-Accelerated Applications on Amazon ECS with Docker Compose – Docker Blog

Many applications can take advantage of GPU acceleration, in particular resource-intensive Machine Learning (ML) applications. The development time of such applications may vary based on the hardware of the machine we use for development. Containerization will facilitate development due to reproducibility and will make the setup easily transferable to other machines. Most importantly, a containerized application is easily deployable to platforms such as Amazon ECS, where it can take advantage of different hardware configurations. In…

Read More
1 2,497 2,498 2,499 2,500 2,501 2,650