This week’s OpenText corporation (EIM) announced a definitive agreement to acquire data protection and cyber security provider Carbonite, Inc. Canadian-based OpenText aims at helping companies to increase growth, reduce costs and mitigate security risks through business intelligence, both locally and cloud-based. The organization is operating in 40 countries. Founded in 2005, Carbonite offers both businesses
Pwn2Own Tokyo 2019 has come to a close and hunters win a total of $120,000 for demonstration exploits on Samsung Galaxy S10 and Xiaomi Mi9 phones and AC1750 routers on the second day of the competition. Four of the seven hacking attempts planned for the second day were a complete success. The Fluoroacetate team’s Amat
An arbitrary code implementation can result in a vulnerability discovered in the multi-format archive and compression system library library. The compression library is best known for its technology for copying files to and from archives, for building archives and for compressing and expanding data. It has been used in a wide range of package managers,
The US Department of Justice reports that two former Twitter staff spied on Saudi Arabia to obtain criticism information against the Saudi regime. On Wednesday two former Twitter workers, together with another individual, were charged, according to an announcement by the US Department of Justice, with allegedly spying on Twitter users critical of the Saudi
Kamerka allows you to see what a hacker is looking at. It draws up maps with SCADA devices, webcams and printers which have been displayed in any particular country on the Internet. A Polish security researcher has created an open-source intelligence (OSINT) tool to index and locate information on sensitive Internet-connected devices on the map.
Deception in identity attacks continues to increase, but the type of attack seems to change. In Q3 2019, phishing campaigns by brands fell 6% compared to the previous quarter. Nevertheless, assaults by individuals rose by 10 million. The decline in brand impersonation may be partly linked to increased DMARC in the industry, which increased by
Two computer hackers pleaded guilty to developing an extort scheme that tangled Uber in a year long cover-up of a data breach that stolen sensitive information from approximately 57 million passengers and drivers of the ride-hailing service. The pleas entered Wednesday at the federal court of Brandon Charles Glover and Vasile Mereacre in San Jose,
Austria’s Postal Service has been fined EUR 18 million (20 million dollars) for working out information on the political allegiances of its customers, said the Ministry of Justice on Tuesday. In January, Austrian Post stated that a database of about 2,2 million customers ‘ likely political affinities would be deleted after privacy campaigners had likened
India’s largest nuclear plant was reportedly hit by a malware package that experts linked to North Korean hackers recently, but officials said control systems had not been jeopardized. Reports of an infringement on the Tamil Nadu Nuclear Power Plant in Kudankulam came on Monday following a Twitter user posting a VirusTotal link to what seemed
Samples of NukeSped malware were analyzed by Fortinet security researchers, who did a deep-dive and found that it shares multiple similarities with other malware families being extensively used by the threat actors in North Korea. The U.S. Government, in particular, refers to this malicious threat actor connected to the North Korean government as “HIDDEN COBRA”.