Posts

Showing posts from September, 2017

Uber's Kalanick rekindles power struggle, names two to board

Image
SAN FRANCISCO (Reuters) - Uber Technologies Inc [UBER.UL] co-founder Travis Kalanick said he had appointed two new directors, a surprise move that publicly reignited a board battle over the role of the ousted former chief executive. from Reuters: Technology News http://ift.tt/2fYPmbB

Security News This Week: The Deloitte Breach Was Worse Than We Thought

Big breaches of Deloitte, Sonic, and Whole Foods dominated this week's security news. from Security Latest http://ift.tt/2x4NfJ1

How Good Are Equifax's Identity Protection Offerings?

After its massive data breach and bungled initial response, Equifax is offering a free set of tools to protect your identity, but they have limits. from Security Latest http://ift.tt/2fDXnWw

Uber's Kalanick reignites power struggle, names two to board

Image
SAN FRANCISCO (Reuters) - Uber Technologies Inc [UBER.UL] co-founder Travis Kalanick on Friday said he had appointed two new directors, a surprise move that publicly reignited a board battle over the role of the ousted former chief executive. from Reuters: Technology News http://ift.tt/2xEpkV3

Uber's Kalanick says he appoints former Xerox, Merrill bosses to board

Image
SAN FRANCISCO (Reuters) - Uber Technologies Inc [UBER.UL] co-founder Travis Kalanick on Friday said that he had appointed two new board members, challenging Uber shareholders who have asked a court to stop the former chief executive from naming directors. from Reuters: Technology News http://ift.tt/2fFywSm

Nearly two million people watched NFL livestream on Amazon.com

Image
(Reuters) - Nearly 2 million people logged onto Amazon.com for the online retailer's first livestream of Thursday Night Football, the U.S. National Football League said on Friday. from Reuters: Technology News http://ift.tt/2x3nZb2

Druva InSync

Druva InSync is an enterprise software that provides file backup, sharing, and analytics functionality on the cloud. Risk: 2 , Category: Computers / Internet , Applications in this Category: 74 from Check Point AppWiki Updates http://ift.tt/2kahnBA

Evercontact

Evercontact is an extension for Google Chrome that extracts email addresses from web pages. Risk: 2 , Category: Computers / Internet , Applications in this Category: 74 from Check Point AppWiki Updates http://ift.tt/2yfindK

GitHub-download

GitHub is an online public free provider of repositories and is used for sharing and revisioning code, files and documents. With GitHub-download, you can download content from GitHub. Risk: 2 , Category: Business / Economy , Applications in this Category: 118 from Check Point AppWiki Updates http://ift.tt/2kaouKr

GitHub-editing

HipChat is a private instant messaging network which provides chat rooms, real-time file sharing, and searchable chat history. With HipChat-editing, you can change the details on your application profile. Risk: 2 , Category: Business / Economy , Applications in this Category: 118 from Check Point AppWiki Updates http://ift.tt/2ydjg6V

GitHub-posting

GitHub is an online public free provider of repositories and is used for sharing and revisioning code, files and documents. With GitHub-posting, you can post content in GitHub. Risk: 2 , Category: Business / Economy , Applications in this Category: 118 from Check Point AppWiki Updates http://ift.tt/2kaosSP

HipChat-editing

HipChat is a private instant messaging network which provides chat rooms, real-time file sharing, and searchable chat history. With HipChat-editing, you can change the details on your application profile. Risk: 2 , Category: Instant Messaging , Applications in this Category: 362 from Check Point AppWiki Updates http://ift.tt/2ydr1JL

Motorola MDLC Protocol

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2kaoo5x

Motorola MDLC Protocol - Broadcast to RTU

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Broadcast to RTU service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2yfhQIM

Motorola MDLC Protocol - Connect

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Connect to regular channel service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2k9Jfpj

Motorola MDLC Protocol - Get IPGW Time

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Get IPGW Time service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2yfhNN6

Motorola MDLC Protocol - Get RTU Time

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Get RTU Time service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2kaHs3D

Motorola MDLC Protocol - Poll COS from RTU Table

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Poll RTU Table service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2yfhK3S

Motorola MDLC Protocol - Poll RTU Table

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Poll COS from RTU Table service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2ka2sqY

Motorola MDLC Protocol - Send Value to RTU Table

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Send Value to RTU Table service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2yfi0zS

Motorola MDLC Protocol - Set IPGW Time

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Set IPGW Time service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2k80PKq

Motorola MDLC Protocol - Set RTU Time

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Get RTU Time service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2yeokYB

Motorola MDLC Protocol - Sync Time

The MDLC protocol is used in point-to-multipoint communications networks, such as radio networks or multidrop links, and facilitates communications between all sites in the system, including an extensive diagnostic traffic. This detection is for the Sync Time service. Risk: 2 , Category: SCADA Protocols , Applications in this Category: 985 from Check Point AppWiki Updates http://ift.tt/2k8T86J

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 25, 2017

Image
A couple of years back, I remember working at a tradeshow booth and giving a demo to someone who was interested in our solution. He said, “Your solution is great, but I need something that will not let anyone from the outside in my network and I need something that will not let my employees do anything on the Internet.” I asked, “You don’t want your employees doing anything on the Web?” He replied, “Correct. If they want to do something on the Web, they can do it on their own time and on their own systems.” Hmmm. My tongue-in-cheek response? “Turn off your Internet connection.” I get it…no one wants to have to deal with cyber-attacks, especially in light of recent breaches like Equifax and Sonic Drive-In, and no one wants to deal with zero-day attacks either. Speaking of zero-days… Earlier this week, the Zero Day Initiative (ZDI) published a zero-day advisory for a bug in the EMC Data Protection Advisor. The team follows specific guidelines on this, so when the time comes where they

Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks

Image
"Always keep your operating system and software up-to-date." This is one of the most popular and critical advice that every security expert strongly suggests you to follow to prevent yourself from major cyber attacks. However, even if you attempt to install every damn software update that lands to your system, there is a good chance of your computer remaining outdated and vulnerable. from The Hacker News http://ift.tt/2ycwPDm

Tesla chief Musk's latest idea: Intercity rocket travel

Image
ADELAIDE/SYDNEY (Reuters) - Silicon Valley billionaire Elon Musk on Friday outlined ambitious plans for a manned mission to Mars and a rocket capable of carrying passengers from one continent to another on Earth. from Reuters: Technology News http://ift.tt/2ycLui9

Greek plan to regulate taxi apps draws customers' ire

Image
ATHENS (Reuters) - A Greek government plan to regulate taxi-hailing apps, such as Taxibeat and Uber, has angered many consumers who are worried it could disrupt a popular service for their daily commute. from Reuters: Technology News http://ift.tt/2xLzSRs

This Week in Security News

Image
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!   ZNIU is the First Android Malware to Exploit Dirty COW Vulnerability Dirty COW attacks on Android has been silent since its discovery, perhaps because it took attackers some time to build a stable exploit for major devices. Almost a year later, Trend Micro researchers captured samples of ZNIU. The Underground Economy Is Using Coupon Fraud as a Form of Business Process Compromise The fraudulent redemption of freebies, discounts, and rebates in the form of coupons is reportedly costing U.S. businesses $300–600 million every year. And where there’s money to be made, there are cybercriminals rustling up schemes to take advantage of it.

Security firm finds some Macs vulnerable to 'firmware' attacks

Image
(Reuters) - Since 2015, Apple Inc has tried to protect its Mac line of computers from a form of hacking that is extremely hard to detect, but it has not been entirely successful in getting the fixes to its customers, according to research released on Friday by Duo Security. from Reuters: Technology News http://ift.tt/2xC986M

Flying high after IPO, Angry Birds maker looks to swoop on rivals

Image
HELSINKI (Reuters) - Rovio, the maker of hit mobile game "Angry Birds," will look to buy up other players in the gaming industry following its listing on Friday, its main owner Kaj Hed said. from Reuters: Technology News http://ift.tt/2k8r9UV

Critical EFI Code in Millions of Macs Isn't Getting Apple's Updates

Researchers dug into the deep-seated, arcane code in Apple machines known as EFI, and found it's often dangerously neglected. from Security Latest http://ift.tt/2yLR4Ff

New Uber CEO to meet London transport boss in license battle

Image
LONDON (Reuters) - The new chief executive of Uber Technologies [UBER.UL] will meet the head of London's transport system next week to try to retain the license for its ride hailing service in the British capital. from Reuters: Technology News http://ift.tt/2xGU3P0

Lyft IPO puts investors in self-driving cars as well as ride services

Image
DETROIT (Reuters) - An initial public offering by Lyft Inc will give investors a way to jump into self-driving cars, although the ride services company and rival Uber Technologies Inc may have to wait years before sending a driverless robotaxi to a customer. from Reuters: Technology News http://ift.tt/2xCst80

Japan's FSA gives official endorsement to 11 cryptocurrency exchanges

Image
TOKYO (Reuters) - Japan's Financial Services Agency said on Friday it has approved 11 companies as operators of cryptocurrency exchanges, in a move that sets the country apart from its neighbors which are tightening their grip on virtual money. from Reuters: Technology News http://ift.tt/2yxhk5d

New Uber CEO to meet London transport boss over license battle

Image
LONDON (Reuters) - Dara Khosrowshahi, the new chief executive of Uber Technologies [UBER.UL], will meet the head of the London Transport system next Tuesday as the Silicon Valley giant steps up the fight to regain its license in the British capital. from Reuters: Technology News http://ift.tt/2fvCJnF