Microsoft has released a new Workspaces PowerToy that helps launch sets of applications using custom desktop layouts and configurations with a mouse click. The tool lets you easily save your current desktop environment configuration as a workspace and relaunch all the apps later, knowing their windows will pop up in the same positions on your…
Read MoreThe FBI warned today of North Korean hacking groups aggressively targeting cryptocurrency companies and their employees in sophisticated social engineering attacks to deploy malware designed to steal their crypto assets. According to the FBI, their social engineering tactics are highly targeted and difficult to detect, even for those with advanced cybersecurity expertise. Over the last several…
Read More“Reyna is focused and ready to take the reins- no pun intended- to create change,” said Michael Kanan, chairman and CEO of InaCOMP. TD Synnex North America Advanced Solutions Chief Reyna Thompson is taking over as North America President on December 1, replacing 40-year TD Synnex sales and distribution icon Peter Larocque, who is moving…
Read MoreThe Dutch Data Protection Authority (Dutch DPA) has imposed a fine of €30.5 million ($33.7 million) on Clearview AI for unlawful data collection using facial recognition, including photos of Dutch citizens. Clearview AI is an American technology company specializing in facial recognition software and is known for creating a vast database of facial images scraped from public…
Read MoreJob applications require personal information—your educational background, past addresses and employment, and in some cases, even your Social Security number. Scammers are acutely aware of this vulnerability, and have many ways to gather data or make a quick buck from unsuspecting victims online. On this week’s episode of What the Hack with Adam Levin, singer/songwriter…
Read MoreList of Old NSA Training Videos The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations of various cryptographic equipment, and a few code words I have never heard of before. Tags: cryptography, FOIA, history of cryptography, history of security, NSA,…
Read MoreThe Federal Trade Commission (FTC) requires security camera vendor Verkada to create a comprehensive information security program as part of a settlement after multiple security failures enabled hackers to access live video feeds from internet-connected cameras. Many cameras were located in sensitive environments, such as women’s health clinics, psychiatric hospitals, prisons, and schools. FTC alleges that…
Read MoreCRN breaks down 10 major new hires and executive departures at AWS in recent months, which includes many AI executives. Amazon Web Services is snatching up major artificial intelligence talent including CEOs from AI startups along with executives who’ve worked for the likes of OpenAI, Microsoft and Google Cloud. However, AWS has also recently witnessed…
Read MoreAn old but persistent email scam known as “sextortion” has a new personalized touch: The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target’s home in a bid to make threats about publishing the videos more frightening and convincing. This week, several readers reported receiving…
Read MoreD-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router will not be fixed as the products are no longer supported. The four RCE flaws, three of which are rated critical and do not require authentication, were discovered by security researcher yali-1002, who released minimal…
Read More