Month: March 2021

The creator of McAfee computer security software was facing charges Friday that he cashed in on a “pump-and-dump” scheme, by promoting cryptocurrencies on Twitter to drive up their value. John McAfee, founder of the antivirus firm that bears his name, and Jimmy Watson face charges of conspiracy, fraud, and money laundering in connection with schemes
0 Comments
iPhone maker Apple could face an EU antitrust charge sheet in the coming weeks following a 2019 complaint by music streaming service Spotify, two people familiar with the matter said. The charge could force changes to Apple’s lucrative business model, they said. The European Commission could send the statement of objections setting out suspected violations
0 Comments
NFT or Non-Fungible Tokens are cryptocurrency assets that represent a wide range of unique items, both physical and virtual like real estate or digital art. NFTs are unique – like a real artwork, an NFT uses the blockchain to identify its authenticity, so you can tell the difference between an original or a replica. They
0 Comments
A US agency investigating Facebook Inc for racial bias in hiring and promotions has designated the probe as “systemic,” attorneys for three job applicants and a manager who claim the company discriminated against them told Reuters on Friday. A “systemic” probe means the agency, the Equal Employment Opportunity Commission, suspects company policies may be contributing to
0 Comments
A seeming flaw in iCloud’s coding has seemingly prevented an author from being able to access her account, due to its interpretation of her surname “True.” Author Rachel True complained on Twitter about not being able to log into her iCloud account. According to tweets since February 27, the author has been unable to access
0 Comments
Hardware attacks rarely make headlines but require the same mitigation and security solutions in place as other threats. Trusted Platform Module, or TPM, is a unique hardware-based security solution that installs a cryptographic chip on the computer’s motherboard, also known as a cryptoprocessor. This chip protects sensitive data and wards off hacking attempts generated through
0 Comments
When your computer goes on the internet, it uses “ports” to help do its job. Both network administrators and hackers are keen to scan these ports for weaknesses, but what is a port, and why are people scanning them? Let’s explore what port scanning is and how it affects you. What Are Ports? [embedded content]
0 Comments
Thousands of Android and iOS apps exposed user data due to commonly found cloud misconfigurations, according to a mobile security firm. The issues could allow malicious attackers to exploit the leaked information. The researchers found misconfiguration problems on apps using popular public cloud services such as Amazon Web Services, Google Cloud, and Microsoft Azure. Among
0 Comments