New Intel security flaw allows remote access to corporate laptops by hackers

Share this

Remember the latest “Spectre” and “Meltdown” vulnerabilities recently found in the micro-chips that are used in almost all computers, tablets and smartphones today? A new security flaw has been found in Intel hardware by Finish company F-Secure. The new vulnerability could enable hackers to access corporate laptops remotely. F-Secure said in a statement that the flaw was an issue within Intel Active Management Technology (AMT), “which is commonly found in most corporate laptops, (and) allows an attacker to take complete control over a user’s device in a matter of seconds,”…

Share this
Read More

SEC’s new cyber unit takes its first action to halt an initial coin offering ‘scam by PlexCorp

Share this

The Securities and Exchange Commission has charged Canadian crypto company PlexCorp with violating securities laws by selling up to $15 million in an initial coin offering (ICO). ICOs have seen explosive growth over the past year as fledgling companies have used them to raise more than $3 billion in capital through various cryptocurrencies. However, experts have warned they can present several dangers to unsuspecting investors hoping to get into a hot new market as regulations are pretty loose. Called PlexCoins, PlexCorp allegedly used this cryptocurrency to scam would-be investors hoping…

Share this
Read More

Gym-As-You-Go wants to let you pay per exercise

Share this

Wish you didn’t have to pay as much if you rarely went to the gym? Gym-As-You-Go wants to offer pricing based on usage rather than monthly subscriptions. The project uses NFC to let you check in at work-out machines. You’re then charged a fee for how long you use the machine, and Gym-As-You-Go keeps a percentage. Pay-as-you-go pricing could give lazy people who rarely work out a way to waste less money, and gyms a way to attract a different type of customer. Especially popular machines could be surge priced…

Share this
Read More

Bitcoin loses over a fifth of its value in less than 24 hours

Share this

Bitcoin slid to as low as about Sh900,000 ($9,000) in volatile trade on Thursday, having lost more than a fifth of its value since hitting an all-time high of $11,395 on Wednesday. The cryptocurrency fell as much as eight per cent on Thursday on the Luxembourg-based Bitstamp exchange to hit about Sh900,000 ($9,000) exactly, marking a fall of well over $2,000 in under 24 hours. It then edged back up to trade at around Sh940,000 ($9,400) in the hour that followed, still down roughly 4 percent on the day. One…

Share this
Read More

Google faces mass legal action in UK over data snooping

Share this

Google is being taken to court, accused of collecting the personal data of millions of users, in the first mass legal action of its kind in the UK. It focuses on allegations that Google unlawfully harvested information from 5.4 million UK users by bypassing privacy settings on their iPhones. The group taking action – Google You Owe Us – is led by ex-Which director Richard Lloyd. He estimates the users could get as much as “several hundred pounds each”. The case centres on how Google used cookies – small pieces…

Share this
Read More

Internet providers could easily snoop on your smart home

Share this

IoT devices often identify themselves voluntarily, usually by connecting to specific domains or URLs. Even if they didn’t, there are simple ways of profiling them based on observation and some known data. It’s certainly true that encryption is on the rise online. Data from Mozilla, the company behind the popular Firefox browser, shows that more than half of web pages use HTTPS, the standard way of encrypting web traffic. When sites like The Atlantic use HTTPS, a lock icon appears in users’ web browsers, indicating that the information being sent…

Share this
Read More

Microsoft will no longer force updates on Users

Share this

Windows 10 will no longer automatically take control of your computer, and flip the reset switch, at the worst moments imaginable. Mind you, Microsoft will still push updates, and it won’t necessarily be easy to completely turn them off. Shortly after Windows 10 rolled out, Windows users began noticing that their computers were automatically downloading the huge Windows 10 update file without even asking. The issue was compounded by vague and confusing update alerts that led many users to initiate the upgrade to Windows 10 without realizing it. Microsoft has…

Share this
Read More

Globaldata: Artificial Intelligence (AI) more crucial for IoT than Big Data insights

Share this

Artificial intelligence won’t solve every problem, but its current applications are already fundamentally reshaping the way we do business and collect data. While the development of the internet of things has revolutionized heavy industry, online shopping, localized data collection and virtually every other aspect of modern life and business, innovators are still struggling over the future of the IoT, and how they’ll get there. While many see big data as the driving engine behind the IoT, savvy investors and entrepreneurs have shown that the real power behind the interconnectivity phenomenon…

Share this
Read More

Explore the latest threats to your mobile device security

Share this

It is common knowledge that mobile devices are integral to both our personal and business lives. With cyberattacks against individuals, businesses, and government entities increasing in frequency and sophistication, it is no surprise that mobile devices are now considered by threat actors to be one of the weakest links in the IT infrastructure of most enterprises. A decade ago, mobile malware was considered a new and unlikely threat. Many mobile device users even considered themselves immune from such threats.  Currently, more than 1.5 million new incidents of mobile malware have…

Share this
Read More

Are Data Brokers Actually Secure?

Share this

Are you an internet privacy fanatic? Do you block browser tracking cookies? Do you use Duck Duck Go for anonymous web searches? It doesn’t matter now. Your internet service provider (ISP) or your browser extensions can collect and sell your web-browsing history even if you take the above precautions. And anyone who obtains that data, whether the data is anonymized or not, will likely be able to figure out your real name and see exactly what you do online. Back in March the well-publicised repeal of Obama’s broadband privacy regulations…

Share this
Read More