Remove tag social-media
article thumbnail

North Korea-linked campaign targets security experts via social media

Security Affairs

Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is warning that North Korea-linked hackers targeting security researchers through social media. ” reads the TAG’s report.

article thumbnail

Dormant Colors campaign operates over 1M malicious Chrome extensions

Security Affairs

The attack chain relies on malvertising messages that were crafted to trick victims into clicking on the install button as seen in the following video: Upon clicking on the ‘OK’ or ‘Continue’ button, the victims are prompted to install a color-changing extension.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Considerable Insight into your Data | Capture, organize, store and deliver rich media assets with everteam.iNSight

Everteam

The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.…. Captured videos, images and data will be stored in one common secure repository. Media Delivery.

article thumbnail

A Considerable Insight into your Data | Capture, Organize, Store and Deliver rich media assets with everteam.iNSight

Everteam

The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.…. Captured videos, images and data will be stored in one common secure repository. Media Delivery.

article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

At the same time, we are using social media and other tools to put this enormous trove of pictures of faces up in the cloud where they can be analyzed. Many of these photos are tagged with the identity of the people in them. We are also putting cameras everywhere, in devices, in our homes, in our shops, on our streets.

Privacy 153
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT group. ” This week, Google Threat Analysis Group (TAG) also warned of North Korea-linked hackers targeting security researchers through social media.

Security 120
article thumbnail

Following Security Ledger at RSA Conference: Monday

The Security Ledger

Check us out if you're at the show or follow us on social media @securityledger or via the #SLRSA hash tag. I'll be tweeting and sharing images (and video?) The Security Ledger will be in San Francisco for the 28th RSA Security Conference this week. from the show floor. Read the whole entry. »