A group of operational technology cybersecurity vendors launches ETHOS, an open-source portal for sharing early warnings about critical infrastructure threats
Christian Vasquez / CyberScoop :
SVB draws support from 300+ VC firms, including General Catalyst, while 1,200+ founders and CEOs sign a Y Combinator petition asking the US Congress to act
More than 100 venture capital and investing firms have signed a statement supporting Silicon Valley Bank, part of mounting industry calls …
Twitter verified a Washington Post columnist's fake US Senator Ed Markey account, after Elon Musk said “all verified accounts will be manually authenticated”
Elon Musk said Twitter would begin authenticating users who pay $8 for Blue. Our tech columnist was still able to get a checkmark for an impostor Sen. Ed Markey.
A look at the recent rise of protestware, where developers deliberately sabotage their own software libraries as a means of protest for a cause they believe in
Ax Sharma / TechCrunch : Tweets: @haje Tweets: @haje : I loved this piece from @Ax_Sharma (making his @TechCrunch contributor debut) today, delving into how and why #OpenSource de...
Sources: the US increased its funding into VPN companies nthLink, Psiphon, and Lantern by about 50% since February to support the surge in their Russian users
An investigation into the rise of NSO's Pegasus shows its widespread use by the CIA, UAE, Mexico, Saudi Arabia, and others; the FBI bought but didn't use it
Firstly, welcome to my new blog! (Or is it a “newsletter”?) Tweets: Eva / @evacide : Here I am, having taken to my fainting couch, wearing my finest clutching pearls, because NSO ...
An investigation into the rise of NSO's Pegasus shows its widespread use by the CIA, UAE, Mexico, Saudi Arabia, and others; the FBI bought but didn't use it
A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO's Pegasus spyware — a tool America itself purchased but is now trying to ban.
Profile of Group-IB CEO Ilya Sachkov, who is charged with treason in Russia, sources say for allegedly giving the US info about Fancy Bear's 2016 operation
Ilya Sachkov, who's been charged with treason in Russia, is alleged to have given the U.S. information about the “Fancy Bear” … Tweets: @bw , @hewiak , @amandakhurley , @z3r0trust ...
Researcher discloses AirTag Lost Mode vulnerability that enables a phishing attack, and says Apple spent three months investigating and refused basic questions
The new $30 Airtag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons …
Google plans to add privacy labels across its iOS app catalog this week or next, after a report claimed none of Google's iOS apps have been updated since Dec. 7
Contrary to reports, Google is not delaying updates to its iOS apps because it doesn't want to comply with Apple's recently announced App Store Privacy Labels policy.
Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets
Meetings on Zoom, the increasingly popular video conferencing service, are encrypted using an algorithm with serious …
Zoom apologizes for security failures, says it has 200M+ DAUs vs. 10M in Dec., and plans to freeze development of new features to focus on security and privacy
And An FBI Warning Brian Krebs / Krebs on Security : ‘War Dialing’ Tool Exposes Zoom's Password Problems Kari Paul / The Guardian : ‘Zoom is malware’: why experts worry about the v...
PayPal is investigating unauthorized transactions affecting numerous German users; a researcher says hackers could be exploiting PayPal's Google Pay integration
All signs point to an attack exploiting PayPal's Google Pay integration. … Hackers have found a bug in PayPal's Google Pay integration …
Apple releases a 2019 Platform Security guide, outlining how features like Secure Enclave work, letting organizations adapt to its policies and procedures
Apple has published its guide to Platform Security for Fall 2019, outlining how the company's products and services work to ensure …
Apple opens its bug bounty program to security researchers, publishes eligibility criteria, bounty categories, and report and payout guidelines
Catalin Cimpanu / ZDNet :
2019 Defcon Voting Village findings reveal detailed vulnerabilities related to six models of voting machines, most of which are still in use
and they paint an ugly picture for voting machine security. https://www.wired.com/... @verifiedvoting : How do we make our election infrastructure as secure as possible? By having ...
2019 Defcon Voting Village findings reveal detailed vulnerabilities related to six models of voting machines, most of which are still in use
The results of the 2019 Defcon Voting Village are in—and they paint an ugly picture for voting machine security.
Google says it changed how it ranks stories and updated guidelines for evaluation of search results to help better identify and surface original news reporting
Richard Gingras / The Keyword :
Cloudflare files for an IPO, citing sites like 8chan as one risk factor, says it had revenues of $192.7M in 2018, up 43% YoY, and a net loss of $87.2M
with a female co-founder Zack Whittaker / TechCrunch : Cloudflare says cutting off customers like 8chan is an IPO ‘risk factor’ Teuta Franjkovic / Coinspeaker : Cloudflare Files fo...
Teen hacker Bill Demirkapi on finding bugs, that exposed 5M student records across 5,000 schools, in educational software from providers Blackboard and Follett
A FEW SHORT decades ago, the archetypal hacker was a bored teenager breaking into his school's network to change grades, à la Ferris Bueller.