Security News
Bogus cryptomining apps for Android available for download on Google Play are estimated to have scammed more than 93,400 victims to date, researchers said, stealing at least $350,000. In addition to offering the "Apps" themselves for a fee, the scammers also promote additional services and upgrades that users can purchase within the apps, either by transferring Bitcoin or Ethereum cryptocurrencies directly to the developers' wallets or via the Google Play in-app billing system.
Technology distributor SYNNEX has admitted that its systems and Microsoft accounts it tends have been attacked, after the National Committee of the US Republican Party named it as the source of a recent security incident. In response to the Bloomberg report, the RNC quickly named mega-distributor SYNNEX as the source of the breach, said no data was accessed, and that it has worked with Microsoft to get the situation is under control.
The Pentagon said Tuesday it is canceling a cloud-computing contract with Microsoft that could eventually have been worth $10 billion and will instead pursue a deal with both Microsoft and Amazon. "With the shifting technology environment, it has become clear that the JEDI Cloud contract, which has long been delayed, no longer meets the requirements to fill the DoD's capability gaps," the Pentagon said in a statement.
"Data is now the most critical asset," said Antonio Neri, President and CEO, HPE. "With the explosive growth of data at the edge and across hybrid environments, organizations today face significant complexity in managing and protecting their data. Zerto's market-leading cloud data management and protection software expands HPE GreenLake cloud data services, allowing customers to protect their data and rapidly act on insights, from edge to cloud." Zerto's journal-based continuous data protection technology includes disaster recovery, backup, and data mobility in a single, simple cloud data management and protection software solution that spans on-premises, hybrid, and multi-cloud environments.
The US House Committee on the Judiciary met on Wednesday to hear testimony on the government's practice of secretly subpoenaing cloud service providers, and Microsoft was happy to oblige. Tom Burt, Microsoft's veep of customer security & trust, testified as a representative of cloud service providers.
Spiceworks Ziff Davis studies revealed there are groups of key stakeholders that influence or make decisions about cloud technologies within each organization - known as the "Buying collective" - generally composed of IT decision makers and business decision makers. "Our research indicates that 80% of decision makers believe cloud technologies are useful for supporting remote workers. As businesses continue to support work-from-home policies, they will seek solutions to enable employees to work from anywhere," said Peter Tsai, Head of Technology Insights at SWZD. "In this environment, it's critical for vendors to understand the needs and motivations driving stakeholders' decisions throughout the buyer's journey."
Immuta launched new SaaS deployment option, enabling data teams to implement data access control across their entire cloud data environment in minutes. Modern data teams are moving to pure SaaS deployments for all of their analytics and data science, and they want access control delivered in the same way.
MariaDB announced a collaboration with Amazon Web Services to bring MariaDB SkySQL to the cloud, ensuring massive scalability and availability for businesses deploying high-performance database-as-a-service on AWS. The collaboration enables deeper product integration and a go-to-market relationship that better serves joint MariaDB and AWS customers, and those enterprises ready to execute cloud modernization strategies. Combined with Amazon Elastic Kubernetes Service/AWS Fargate and global AWS scale, SkySQL can deploy MariaDB on AWS as a distributed SQL database for scalable transaction processing, as a multi-master cluster for continuous availability, or as a multi-node columnar database for data warehousing and analytics requiring high availability and/or scalability.
Sevco will use the funding to scale adoption of the cloud-native security asset intelligence platform that delivers two fundamental values to customers: continuous converged visibility of all assets across siloed systems; and the telemetry required to understand how assets change in a dynamic environment over time. "Led by two executives who helped create the EDR market, Sevco knows how to innovate and operationalize technology for the masses. We believe Sevco will bring the same disruption to security asset intelligence that they did to endpoint security."
While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security. In a recent study published in KeAi's International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique - the first to combine genetic technology with mathematical technique.