Keylogging data vampire pleads guilty to bleeding two companies

Credit to Author: Lisa Vaas| Date: Fri, 25 Oct 2019 13:04:06 +0000

He drained data from firms working on hot new technology, sneaking in with a fake access badge, planting hardware and software keyloggers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/m3yduCwBOnU” height=”1″ width=”1″ alt=””/>

Read more

This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Oct 2019 13:03:43 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s recent acquisition of Cloud Conformity. Also, read about a fake photo editing app on Google Play and the 17 malicious iOS apps removed…

The post This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store appeared first on .

Read more

This Diwali, gift your loved ones digital security for life!

Credit to Author: Sushmita Kalashikar| Date: Fri, 25 Oct 2019 11:54:35 +0000

Diwali is that time of the year when you can literally feel the auspiciousness, fun and festivities in the air. While the streets are lightened with the bright glow of diyas and lamps, the night sky is adored by the sparkling light and boom of firecrackers. The hustle and bustle…

Read more

Name game

Credit to Author: Sharky| Date: Fri, 25 Oct 2019 03:00:00 -0700

This pilot fish builds a lot of Linux systems that have to be compliant with U.S. Department of Defense/Defense Information Systems Agency STIG security requirements, but he tries to lessen the pain by assigning root passwords that are secure but easily remembered. Naturally, he sends them to the owner via encrypted email.

When the Nvidia driver in one of those machines gets corrupted after the system goes down hard in a power outage, fish needs root access to reinstall the driver. Unfortunately, the user of that machine (who, just incidentally, had ignored the warnings about that planned power outage) has no recollection of the root password, and he can’t get it from his email. Why? He has uninstalled all his old encryption certs, so older encrypted emails can no longer be decrypted.

To read this article in full, please click here

Read more

Cachet Financial Reeling from MyPayrollHR Fraud

Credit to Author: BrianKrebs| Date: Fri, 25 Oct 2019 00:50:44 +0000

When NY based cloud payroll provider MyPayrollHR unexpectedly shuttered its doors last month and disappeared with $26 million worth of customer payroll deposits, its payments processor Cachet Financial Services ended up funding the bank accounts of MyPayrollHR client company employees anyway, graciously eating a $26 million loss which it is now suing to recover.

Read more

US corn yields get boost from a global warming 'hole'

The global average temperature has increased 1.4 degrees Fahrenheit over the last 100 years. In contrast, the Corn Belt of the U.S., one of the most agriculturally productive regions of the world, has experienced a decrease in temperatures in the summer during the growing season. Known as the 'US warming hole,' this anomalous cooling phenomenon, which occurred in tandem with increasing rainfall, was responsible for boosting corn yields by 5 to 10 percent per year, according to a new study.

Read more

Deformed wing virus genetic diversity in US honey bees complicates search for remedies

Deformed Wing Virus (DWV), one of the leading causes of honey bee colony losses, is much more genetically diverse in the United States than previously thought. The diverse lineages of this virus are all equally bad for bees, and they make it more complicated to develop antiviral therapeutics, which could be the basis for developing a vaccine for the virus.

Read more

Schizophrenia risk gene linked to cognitive deficits in mice

Researchers have discovered in mice how one of the few genes definitively linked to schizophrenia, called SETD1A, likely confers risk for the illness. Mice genetically engineered to lack a functioning version of the enzyme-coding gene showed abnormalities in working memory, mimicking those commonly seen in patients. Restoring the gene's function corrected the working memory deficit and counteracting its deficiency also repaired neuronal circuit deficits in adult mice — suggesting clues for potential treatment strategies.

Read more