Sat.Jul 28, 2018

article thumbnail

Microsoft revealed details of a supply chain attack at unnamed Maker of PDF Editor

Security Affairs

Microsoft revealed that hackers attempted to compromise the supply chain of an unnamed maker of PDF software. The attackers compromised a font package installed by a PDF editor app and used it to spread a crypto-mining malware on victims’ machines. The attack was discovered by the experts from Microsoft that received alerts via the Windows Defender ATP.

Mining 48
article thumbnail

As Right to Repair Effort Falters, Massachusetts moves to study Impact

The Security Ledger

After failing to move a bill to enshrine a right to repair consumer electronics to a vote, the state lawmakers in Massachusetts are pushing to study the economic impact of right to repair legislation. A Massachusetts state Senate resolution passed this week calls for the creation of a commission to research and make recommendations to the. Read the whole entry. » Related Stories Expert says: Hack your Smart Home to Secure It Episode 101: The Dystopian IoT looks a lot like the Printer Ink A

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google bans cryptocurrency mining apps from the official Play Store

Security Affairs

Google has updated the Play Store Developer Policy page to ban mobile mining apps that mine cryptocurrencies using the computational resources of the devices. Due to the surge in cryptocurrency prices, many legitimate websites and mobile apps are increasingly using cryptocurrency miners. Following Apple’s decision of banning cryptocurrency mining apps announced in June, also Google has updated the Play Store Developer Policy page to ban mobile apps that mine cryptocurrencies using the comp

Mining 47
article thumbnail

Russian Hackers, a Bluetooth Flaw, and More Security News This Week

WIRED Threat Level

A Google security key, Russian hackers, and more of the week's top security news.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Twitter removed more than 143,000 apps from the messaging service

Security Affairs

On Tuesday, Twitter announced it had removed more than 143,000 apps from the messaging service since April in a new crackdown initiative. Last week, Twitter announced it had removed more than 143,000 apps from the messaging service since April in a new crackdown initiative aimed at “malicious” activity from automated accounts. We’re committing Twitter to help increase the collective health, openness, and civility of public conversation, and to hold ourselves publicly accountable towa

Privacy 47

More Trending

article thumbnail

When Senators Ask Followup Questions, You Answer Them.

John Battelle's Searchblog

Following my Senate testimony last month, several Senators reached out with additional questions and clarification requests. As I understand it this is pretty standard. Given I published my testimony here earlier , I asked if I could do the same for my written followup. The committee agreed, the questions and my answers are below. Questions for the Record from Sen.

Privacy 40
article thumbnail

Democracy is under threat from the malicious use of technology. The EU is fighting back | Julian King

The Guardian Data Protection

Member states are joining forces with social media platforms to tackle the menace of fake news and data misuse Alongside traditional canvassing, political parties can now get their messages across using the internet and social media, tools that have not only made it possible to reach large numbers of people but also, increasingly, to micro-target individuals with tailormade messages.

IT 65
article thumbnail

Russian APT28 espionage group targets democratic Senator Claire McCaskill

Security Affairs

The Russia-linked APT28 group targets Senator Claire McCaskill and her staff as they gear up for her 2018 re-election campaign. The Russian APT group tracked as Fancy Bear (aka APT28 , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ), that operated under the Russian military agency GRU, continues to target US politicians. This time the target is Senator Claire McCaskill and her staff as they gear up for her 2018 re-election campaign.