Pinduoduo, one of China’s most popular e-commerce platforms with over 750 million users a month, has been found to have malware in its app, according to several cybersecurity researchers. The malware, which exploits vulnerabilities in Android operating systems, can monitor users’ activities on other apps, access notifications, read private messages and change settings. Experts have […]
Blog Grid
Law enforcement officials are warning parents about the widespread dangers that children face online. With access to technology that previous generations never had, children are more vulnerable to cyber crimes than ever before. The Lawrence County Sheriff’s department has seen a spike in cyber crime against children, which has prompted them to launch the Cyber […]
The media industry is evolving rapidly with new mergers, rising inflation, and the need for profitability putting pressure on broadcasters, media production companies, and streamers to maximize the value of every dollar spent. The adoption of cloud technology has coincided with a shift from traditional capital expenditure models (CAPEX) to an operational expenditure model (OPEX), […]
A North Korean hacking group, known as APT43, has been found to utilize a unique money-laundering scheme involving stolen cryptocurrency and rented services to create clean digital currency, according to a report from Google’s Mandiant. The group, which has been operational since at least 2012, focuses on cyberespionage, but also steals cryptocurrency to fund its […]
Cloud repatriation is becoming increasingly common as organizations repatriate workloads or applications from public clouds to in-house or other locations. Repatriation is usually due to technical misfires or perceived cost inefficiencies associated with fast-growing public cloud consumption. However, repatriation should not be considered a failure, but rather a tactical lever for workload placement that can […]
An open letter signed by tech luminaries, including Elon Musk and Steve Wozniak, calls for a pause on large-scale artificial intelligence (AI) development. The letter argues that powerful AI systems should only be developed once the risks are understood and manageable. The authors suggest an independent review of AI over six months and a pause […]