Researchers from Microsoft and Cisco Talos have found a new fileless malware strain dubbed Nodersok by Microsoft or Divergent by Talos. The malware leverages the popular Node.js framework (which has not often been used for such attacks) used by many Web applications and WinDivert, a network packet-capture and manipulation utility, to turn the systems into … continue reading
Machine learning brings new opportunities in the software security realm by offering new ways to handle data, detect malware and improve solutions. However, the problem with machine learning today is that it can be marketed as a silver bullet to catch all things in the security industry, when in reality the technology still has many … continue reading
Organizations are finding it increasingly difficult to identify dark endpoints, which not only costs enterprises millions of dollars, but also puts companies at risks for threats and attacks. According to new research from Absolute, an endpoint security company, and the Ponemon Institute, organizations are wasting over $6 million in detection, response, and wasted time. While … continue reading
There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading
Researchers from MIT CSAIL have been working on a system called WiGait, which accurately monitors walking speed in a way that is both continuous and unobtrusive. The researchers’ paper presented the device, saying it measures the walking speed of multiple people, with 95 to 99 percent accuracy using wireless signals. Professor Dina Katabi at MIT’s CSAIL says … continue reading
Intel is beginning to square in on AI with the announcement of a single cross-Intel organization: The Artificial Intelligence Products Group (AIPG). According to the company, AIPG strengthens its focus on AI, and will include engineering, labs, software and resources as it continues to work on its AI portfolio: The Intel Nervana platform. In addition, … continue reading
The HummingBad malware is back with a new variant, named “HummingWhale,” which has been found in more than 20 apps on Google Play. The malware-infected apps were downloaded several million times by users, and researchers from security company Check Point discovered the malware and notified the Google security team about the apps, which have since … continue reading
SmartBear Software announced TestComplete 12.2, with features like the new Environment Manager and connection to an on-demand cloud testing lab. Environment Manager is powered by CrossBrowserTesting, a division of SmartBear acquired in 2016, and it gives teams access to services provided by CrossBrowserTesting, which is a cloud testing platform with more than 300,000 users, according … continue reading
After discovering malicious users that were using open-source projects to participate in dangerous activities like bitcoin mining, SourceClear created a free project to help the community discover suspicious builds before they become an issue. SourceClear, which is dedicated to helping developers use open-source software safely, has spent the last 18 months trying to dig deep … continue reading
Google is giving Android developers new ways to stay informed about their apps. The company is updating the Google Play Developer Console app with new features for reviews and experiments. “With over one million apps published through the Google Play Developer Console, we know how important it is to publish with confidence, acquire users, learn … continue reading
Millions of Android devices are in danger of being hacked. Cybersecurity solution provider Check Point Software revealed that a group of cybercriminals are targeting Android devices with the malware HummingBad. Yingmob, the group behind HummingBad, has been using the malware to access 10 million devices and obtain fraudulent ad revenue. According to Check Point, it … continue reading
LinkedIn has open-sourced its URL-Detector Java library, which checks URLs for malware and phishing. LinkedIn wants to detect as many malicious links as it can, so it defines a URL to be anything that can resolute into a real site when typed into the address bar of a browser, according to a blog post. In … continue reading