New Docker Desktop Preview for Apple M1 Released – Docker Blog

New Docker Desktop Preview for Apple M1 Released – Docker Blog

This is just a quick update to let you know that we’ve released another preview of Docker Desktop for Apple M1 chips, which you can download from our Docker Apple M1 Tech Preview page. The most exciting change in this version is that Kubernetes now works. First, a big thank you to everyone who tried out the previous preview and gave us feedback. We’re really excited to see how much enthusiasm there is for this,…

Read More

Top 100 Cybersecurity Movies

Top 100 Cybersecurity Movies

The Computer Wore Tennis Shoes (1969) In The Computer Wore Tennis Shoes, Kurt Russell stars as an underachieving college student whose intellectual capabilities skyrocket after an electrical accident with a computer when its “brain” fuses with his own. (Note: you’re going to notice this type of theme with multiple movies on this list — someone gets zapped during a storm or electrical overload and, bam, something major happens as a result… yada, yada, yada.) The…

Read More

NIST anticipates upgrades to system for scoring a phish’s deceptiveness

NIST anticipates upgrades to system for scoring a phish’s deceptiveness

A graph representing the NIST Phish Scale scoring methodology. (NIST) Officials from the National Institute of Standards and Technology (NIST) this week teased future improvements to the agency’s recently introduced “Phish Scale” measurement system, which helps companies determine whether phishing emails are hard or easy for their employees to detect.  Future plans for the scoring methodology include the incorporation of operational data pulled from multiple organizations, plus the addition of a user guide for training implementers…

Read More

Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDK | McAfee Blogs

Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDK | McAfee Blogs

The McAfee Advanced Threat Research (ATR) team is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. We recently investigated and published several findings on a personal robot called “temi”, which can be read about in detail here. A byproduct of our robotic research was a deeper dive into a video calling software development kit (SDK) created by Agora.io. Agora’s SDKs are used for voice…

Read More

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blogs Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blog

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blogs Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blog

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities Whether they’re attending regular work meetings or catching up with extended family across the globe, many people leverage video conferencing to better connect with others – a process that will likely continue as our world only becomes more digital. But as the rapid adoption of video conferencing tools and apps occurs, potential threats to online safety emerge. Agora is one of these tools for connection. The…

Read More

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blogs Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blog

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blogs Protect Yourself from Mobile App Video Conferencing Vulnerabilities | McAfee Blog

Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities Whether they’re attending regular work meetings or catching up with extended family across the globe, many people leverage video conferencing to better connect with others – a process that will likely continue as our world only becomes more digital. But as the rapid adoption of video conferencing tools and apps occurs, potential threats to online safety emerge. Agora is one of these tools for connection. The…

Read More

CISOs Must Develop Emotional Intelligence Skills to Succeed

CISOs Must Develop Emotional Intelligence Skills to Succeed

Emotional intelligence is becoming an increasingly important skill for CISOs to master as their roles continue to broaden, according to a new study by F-Secure. A series of interviews conducted with relatively small number of CISOs (28) from the US, UK and other European countries suggested that the role of CISO is no longer purely technical in nature. Two-thirds said they understood the growing importance of emotional intelligence in enabling them to understand, empathize and…

Read More

YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube has taken down almost 3000 channels and accounts deemed to part of separate Chinese and Russian state coordinated influence operations. The vast majority of the work involved the removal of 2946 YouTube channels deemed to be part of a Chinese influence operation, according to Google’s Threat Analysis Group director, Shane Huntley. “These channels mostly uploaded spammy content in Chinese about music, entertainment and lifestyle,” he explained in a TAG bulletin for Q1 2021. “A very…

Read More

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

French software provider Centreon has hit back at a report from the country’s cybersecurity agency that its products were hijacked in a Russian cyber-campaign, claiming that no paying customers were affected. The firm, which produces IT monitoring software not unlike SolarWinds, was at the center of a report from the French National Agency for the Security of Information Systems (ANSSI) this week. It claimed that the infamous Sandworm group, responsible for destructive attacks against Ukrainian energy…

Read More

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea has attempted to hack into COVID-19 vaccine data from US pharma giant Pfizer, it has been claimed. As reported by the BBC, South Korea’s National Intelligence Agency has briefed law makers about the alleged cyber-attack, although it is unclear whether any data has been stolen. Pfizer is one of several pharma companies that have developed and received approval for a vaccine designed to protect against coronavirus in recent months. However, the development and…

Read More
1 2,500 2,501 2,502 2,503 2,504 2,654