Security News > 2021 > May
The investment aligns with HID Global's strategic direction to embed facial recognition into solutions for a seamless and highly secure user experience in a variety of identity verification and authentication applications, including access control. "In partnership, HID and Paravision have already cooperated on projects and we look forward to further advancing our collaboration across a number of different markets and use cases," said Björn Lidefelt, EVP and Head of HID Global.
Multiple editions of Windows 10 versions 1803, 1809, and 1909 have reached their End of Service on this month's Patch Tuesday, as Microsoft reminded customers yesterday. While usually, Redmond advises users of end of service products to upgrade as soon as possible to the latest available versions to keep their systems secure, the company also automatically rolls out feature updates to some out-of-date devices reaching EoS. "Windows Update will automatically initiate a feature update for Windows 10 consumer devices and non-managed business devices that are at, or within several months of reaching end of servicing," Microsoft said.
Multiple editions of Windows 10 versions 1803, 1809, and 1909 have reached their End of Service on this month's Patch Tuesday, as Microsoft reminded customers yesterday. While usually, Redmond advises users of end of service products to upgrade as soon as possible to the latest available versions to keep their systems secure, the company also automatically rolls out feature updates to some out-of-date devices reaching EoS. "Windows Update will automatically initiate a feature update for Windows 10 consumer devices and non-managed business devices that are at, or within several months of reaching end of servicing," Microsoft said.
A group of election security experts said after a deep dive into Australia's electronic voting systems that they have "Serious problems" with the accuracy, integrity and privacy with elections run by the Australian Capital Territory Electoral Commission. The team of four cybersecurity professionals concluded that the ACT e-voting system errors did not impact any election outcomes, but could potentially sway future vote counts if left uncorrected.
In short, it's possible to use passing Apple devices to sneak out portions of information from one place to another, such as a computer on the other side of the world, over the air without any other network connectivity. Participating devices broadcast over BLE to other nearby attentive Apple devices, which in turn relay data back over their network connection to Cupertino's servers.
The Tor Project is auctioning off the first Tor Onion domain ever created, duskgytldkxiuqc6. Onion, as an NFT. The non-profit Tor Project operates the Tor decentralized network running on top of the Internet that allows users to access websites anonymously and special Onion URLs only accessible over Tor.
Telegram groups are being abused by fraudsters peddling fake COVID-19 vaccination cards to the unvaccinated and anti-vaxxer communities, according to researchers. "When it became a bigger possibility of being able to travel, or when certain events began to require proof of vaccination, we started to see people posting vaccine cards for sale or soliciting vaccine cards for themselves," she told Threatpost in an interview.
Asset and security control management provider Panaseer on Wednesday announced a new $26.5 million round of funding, bringing the total investment in the company up to $43 million. The Series B funding round was led by AllegisCyber Capital, with participation from existing investors AlbionVC, Cisco Investments, Paladin Capital Group, Evolution Equity Partners, and Notion Capital, and new investor National Grid Partners.
Well, SophosLabs researchers have just published a report entitled Fake Android and iOS apps disguise as trading andcryptocurrency apps, and it seems that some investment scammers are taking a similar sort of approach. If you've gone to all the trouble of building an imposter website that looks like a genuine online currency trading business, and a fake app that is believable enough to pass muster as belonging to someone else's brand.
Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also threaten to leak it publicly unless the ransom is paid. Now, some attackers have progressed to a triple extortion tactic with the intent of squeezing out even more money from their malicious activities.