5 big buts about the Pixel 4 phone

Credit to Author: JR Raphael| Date: Tue, 22 Oct 2019 04:00:00 -0700

Look, I’ll just come out and say it: I’m a big believer in buts.

Now, hang on a sec: You haven’t accidentally stumbled onto the world’s last remaining Sir Mix-a-Lot fan site. (If only!) No, the buts of which I speak at this particular moment are the single “t” variety — as in, the contradictory kinds of statements that are so frequently missing when we talk about technology.

You know what I’m talking about, right? Here in these tribal times of 2019, it’s all too easy to fall into a pattern of seeing a certain sort of product or type of device as being either “awesome” or “inferior,” with little gray space in between those extremes. You’ve used this kind of smartphone for years now, damn it, so it has to be the best! And that other company’s devices are, like, obviously awful. They’re from the competing team! They could never be worth your while.

To read this article in full, please click here

Read more

Avast, NordVPN Breaches Tied to Phantom User Accounts

Credit to Author: BrianKrebs| Date: Tue, 22 Oct 2019 00:32:57 +0000

Antivirus and security giant Avast and virtual private networking (VPN) software provider NordVPN each today disclosed months-long network intrusions that — while otherwise unrelated — shared a common cause: Forgotten or unknown user accounts that granted remote access to internal systems with little more than a password.

Read more

Train to be a certified cyber security professional for just $39

Credit to Author: DealPost Team| Date: Mon, 21 Oct 2019 07:56:00 -0700

Cyber crime is responsible for a staggering amount of damage and chaos around the world. Want to be a part of the solution? Then train for a career in this demanding field with The A to Z Cyber Security and IT Certification Training Bundle.

This e-training bundle is perfect for anyone who has an interest in putting a stop to cyber crime. It includes twelve courses that’ll introduce students to ethical hacking methods, show them how to test a network for weaknesses, and identify problems so they can be fixed prior to being exploited. It’s fast, flexible, and you can even apply your training in preparation for several certification exams

To read this article in full, please click here

Read more

Utah county moves to expand mobile voting through blockchain

Credit to Author: Lucas Mearian| Date: Mon, 21 Oct 2019 03:00:00 -0700

Disabled voters in Utah County will be able to use their smartphones to vote in the November municipal election, an expansion of an earlier pilot test of the blockchain-based technology and anothert step toward allowing all voters to cast ballots with a mobile device.

The county, which has more than a half million residents, is the third in the U.S. to partner with Tusk Philanthropies, a non-profit focused on expanding mobile voting nationally. The latest pilot is a collaboration between the Utah County Elections Division, Tusk Philanthropies, the National Cybersecurity Center and Boston-based voting app developer Voatz.

To read this article in full, please click here

Read more

But I’m still me

Credit to Author: Sharky| Date: Mon, 21 Oct 2019 03:00:00 -0700

Longtime user at a big bank can’t access the archiving system, the intranet kicks her back to the login screen, and the attendance system that pilot fish supports never heard of her. She’s frantic to be recognized by the system, and she starts flooding the IT department with calls — not just the help desk, but operations and individual IT employees as well.

Everyone who gets a call is solicitous and sympathetic, and they all run down the list of questions that could rule out scenarios. Did she get a new PC? No. Did she change offices? No. Is anyone else affected? No. So what is going on?

The answer is simple after all. The woman had just gotten married, and upon her return from her honeymoon, she started using her new last name with every application — without first requesting to have her name changed in any applications. What isn’t so simple is understanding why she never thought to try logging in with her maiden name.

To read this article in full, please click here

Read more

When Card Shops Play Dirty, Consumers Win

Credit to Author: BrianKrebs| Date: Thu, 17 Oct 2019 03:13:42 +0000

Cybercrime forums have been abuzz this week over news that BriansClub — one of the underground’s largest shops for stolen credit and debit cards — had been hacked, and its inventory of 26 million cards leaked to security contacts in the banking industry. Now it appears this brazen heist may have been the result of one of BriansClub’s longtime competitors trying to knock out a rival.

Read more

Can Facebook's Libra cryptocurrency survive the exodus?

Credit to Author: Lucas Mearian| Date: Wed, 16 Oct 2019 12:00:00 -0700

After the withdrawal of seven of the 29 founding members of the Libra Association, the governing council for Facebook’s planned global cryptocurrency, the project’s fate  looks increasingly uncertain.

PayPal, Visa, Mastercard, eBay, Stripe, Mercado Pago and Brooking Holdings have backed away from participation on the Libra Association; their hands were forced when  all members met Monday in Switzerland for formalize their commitment to the project.

To read this article in full, please click here

Read more