Scammers are creating fake Android cryptocurrency mining apps and promoting them on the Google Store. The kicker is that these apps claim to mine cryptocurrency that can’t be mined in the first place. Fortinet discovered these apps on the Google Play Store when they saw that the apps were being promoted as miners for Ripple (XRP), Cardano (ADA), and Tether. As these are cryptocurrencies that are not possible to mine, the apps only pretend to mine and instead display advertisements.
Today, the first ever worldwide Standards for the drone industry are being released by the International Standards Organisation (ISO)*. The new, long awaited Standards have been developed after several years of global collaboration between standards institutions from across the world and are expected to trigger rapid acceleration of growth within the drone industry as organisations throughout the world are galvanised to adopt drone technology against a new background of reassurance on safety and security. The new Standards will play an essential role in guiding how drones are used safely and effectively in a framework of regulatory compliance.
BlackBerry Limited (NYSE: BB; TSX: BB) today announced it has entered into a definitive agreement to wholly acquire Cylance, an artificial intelligence and cybersecurity leader, for US $1.4 billion in cash, plus the assumption of unvested employee incentive awards. Pending regulatory approvals and other customary closing conditions, the deal is expected to close prior to the end of BlackBerry’s current fiscal year (February 2019).
US rozzers are being warned to avoid looking at iPhones with Face ID in case they get locked out of the device, much like Craig Federighi at the iPhone X launch event. Apple’s mug-scanning Face ID tech, found on the iPhone X and iPhone XS, attempts to authenticate a face up to five times before the feature is disabled and the user’s potentially harder-to-obtain passcode is required to unlock the smartphone. Because of this, forensics outfit Elcomsoft is warning US law enforcement not to gawp at iPhones involved in investigations as failed attempts would render Apple’s Face ID useless, meaning a suspect can no longer be forced to unlock their own phone.
Researchers at IU have discovered a simple way to foil criminals intent on breaking into university data. To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU. Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations. Based on email addresses belonging to a university’s domain, passwords were compiled and compared against a university’s official password policy. The findings were clear: Stringent password rules significantly lower a university’s risk of personal data breaches.