Last week, an 18-year old hacker used social engineering techniques to compromise Uber’s network. He compromised an employee’s Slack login and then used it to send a message to Uber employees announcing that it had suffered a data breach. Uber…
Last week, the FBI’s Internet Crime Complaint Center issued a public warning claiming that they have “identified an increasing number of vulnerabilities posed by unpatched medical devices.” They stated that these devices, such as insulin pumps…
Cassie,* a Vermont mother of four, woke up to a shock yesterday morning. When she went to check the Seesaw app — which she uses to communicate with her kids’ schools — she found that an obscene photo had been sent to her youngest’s teacher at …
Chris Hartman, senior director of fuels, forecourt, advertising, and construction at convenience store chain Rutter’s believes that autonomous stores may be the next big thing in retail tech. Autonomous stores function without a human cashier …
On my sixth birthday, my father gifted me a globe of the world. It is the best birthday present I have ever received. You see, I grew up in a cramped apartment in Baku, Azerbaijan. But even in our small corner of this world on the edge of the …
TikTok denies the claims made by hacking group AgainstTheWest that it breached an Alibaba cloud database containing 2.05 billion records including TikTok source code and user data. The hacking group posted screenshots of the “stolen” data on a…
California’s privacy laws have now been in effect for more than two years, and we are beginning to see the consequences. Earlier this month, the California Attorney General’s office released the situations where various businesses were cited a…
A new report by John Sakellariadis for the Atlantic Council takes a deeper dive into the rise of ransomware over the past decade and is worth reading by managers looking to understand this marketplace.
Using an AI computer vision system in conjunction with Google’s cloud processing, the French tax office has identified 20,356 residential swimming pools that had previously gone undeclared. As a result, the tax office was able to bring in an a…
Last week, Apple found two zero-day vulnerabilities in both iOS 15.6.1 and iPadOS 15.6.1 that hackers may have actively exploited to gain access to corporate networks, according to at least one report. The first vulnerability enables a hacker …