Quite amazingly the veteran organisations of Facebook and Google were victims of a $100M phishing scam. According to the USA Justice Department, the crooks forged email addresses, invoices, and corporate stamps, in order to impersonate a large Asian-based manufacturer with whom the technology firms regularly did business, so tricking the companies into paying for computer supplies.
While whaling threats ( CEO fraud ) continues to grow, 67% of companies seeing an increase in email based attacks designed to extort money, there has been increased "whaling" recently as fraudsters take advantage of tax season, targeting finance departments with emails that look to have come from the company’s senior executive eg Snapchat and Seagate companies inadvertently giving up employees’ personal information. Yet another sort of beneficial whale has also emerged in the form of a UK developed WhaleSlide Search Engine. This does not automatically store user data – and it also donates to charity.
SAW Dx, a medical technology spinout founded at the University of Glasgow, has successfully closed an investment round of £750k with IP Group, a developer of intellectual property-based businesses, and the Scottish Investment Bank, the investment arm of Scottish Enterprise.
Having wasted a day’s work trying to get a jumble of Apple passwords to work, Gaberlunzie today has wasted another whole hour trying to acquire a new password, but despite offering his name, his email address and taking those stupid “I am not a robot” trials Apple refuses to have ever heard of him and will issue neither password nor any form of access.
Imperva, Inc. committed to protecting business-critical data and applications in the cloud and on-premises, has announced the results of a survey of 170 security professionals taken at the RSA 2017, the world’s largest security conference, and exploring their experiences with ransomware. Thirty-two percent of the respondents said their company had been infected with ransomware, with 11 percent taking longer than a week to regain access to their systems after an attack.
The vulnerabilities “would allow someone to remotely hack millions of newer Samsung smart TVs, smart watches, and mobile phones already on the market, as well as ones slated for future release, and all without needing physical access to them.”
As GDPR is in the limelight currently The Royal Mail offers a FREE data base audit, while some research shows how organisations can lose as much as 6% annual revenue by not having clean data. The new report is essential reading for marketers and data professionals. It aims to provide new insights to help build a business case for driving marketing performance and business growth by improving customer contact data quality.
UKFast CEO Lawrence Jones is calling on the government to deliver transparency in their plans for the country’s data regulations following Brexit. Will they adopt the EU’s GDPR (General Data Protection Regulation)? Or will they create their own equivalent legislation? The answer is urgent as data privacy could hardly be a bigger issue than it is right now.
As Amsterdam-based Sightcorp uses a simple webcam, its Face Analysis Technology is able to track and measure consumers’ unbiased behaviour responses and interest in different real-life scenarios, in a totally automated and non-intrusive way. Now German Heidelberg-based Dermalog's "Face Matching" claims to be the fastest software for biometric Face Matching on the market. Speed is at 100 million matches per second on a single blade and is accompanied by a low failure rate that the confirmed working speed is ahead of the competition.
Swissbit, manufacturer of flash memory solutions, will be exhibit at embedded world 2017 (Nuremberg,14-16 March) Hall 1, booth 1-534) as an expert partner for Secure storage products for decentralised intelligence. For IoT (Industrial Internet of Things) projects. developers and manufacturers choose from optimised industrial flash memory products with applications relating to cyber physical systems, M2M Coms decentralised sensors, edge computing, and smart factory environments. Also on show, its manufacturing expertise and knowledge complex integrated systems, SIP (system-in-package manufacturing capacities) and processing TSOP, BGA and bare die components.
Two years ago, Igor van Gemert started the Alliander innovation satellite SIM CI , Simulating Critical Infrastructures. He brought together a team of physicists, mathematicians, GIS specialists and programmers. The goal: using 3D/VR simulations to identify and assess the weaknesses and risk inherent to critical infrastructures.
Energy is central to nearly every major challenge and opportunity the world faces. However, one fifth of the world population still lacks access to energy and 3 billion people rely on wood, coal or animal waste for cooking and heating. Today, sustainable energy and climate change are big global concerns. The interconnection of grids would open up an unprecedented opportunity to globally share the resources of the whole planet, bringing clean energy to everybody, everywhere in the world.
Researchers in Kaiserslautern, Dr. Thomas Kuhn and Fraunhofer IESE (Institute Experimental Software Engineering) Matthias Jung, develop a new simulation process to verify that combinations of hardware and software systems actually function correctly together.
Researchers at Context Information Security have found vulnerabilities in a Bluetooth CloudPets Unicorn toy that allowed them to take control of the toy’s voice recording functionality. The CloudPets range of cuddly toys uses Bluetooth Low Energy (LE) to communicate with a smartphone app, allowing parents to record an audio messages on their phone and send it to their child’s toy, or vice versa.
A project has kicked-off in London that will create artificial storms to help predict worst-case scenarios for coastal flooding. Using computer models to make real storms more extreme, this NOC (National Oceanography Centre) led project will help inform the planning of coastal defences and emergency response.
A recent Tech Pro Research survey asked what IoT data companies are collecting, and how it’s being used? Some 38 percent of respondents to a survey conducted in December 2016 said their companies are currently using IoT devices. More companies will be joining this group in the next year, as 30 percent of respondents said their companies are in the planning or considering stages.
The GDPR (General Data Protection Regulation) became law just under a year ago. In a year from now, the Information Commissioner's Office starts to enforce it. DataIQ is now benchmarking how companies are preparing for GDPR compliance across the four key areas of permission, profiling, protection and personal.
The 8th Annual Nuclear Decommissioning and Waste Management Conference Europe (24th and 25th May 2017, Manchester, UK) is Europe’s leading platform to reduce cost-uncertainty, meet new regulations and create a holistic strategy for your decommissioning and waste management operations.
Abertay University forensics students will benefit from working with a high-tech new machine capable of retrieving the fingerprints of cold case murder victims. The University is the only place in Scotland that students can access the specialist VMD (Vacuum Metal Deposition) chamber from West Technology, which heats gold and zinc to 1600C, evaporating the metal, which is redeposited as a thin layer on a target surface, delineating any fingerprints.
German company Jenoptik has acquired all shares in Essa Technology (Domestic and Commercial Security Limited) which has provided security and automatic number plate recognition systems for more than 30 years. The transaction was completed on January 19, 2017.
Scotland, Computer News in Scotland, Technology News in Scotland, Computing in Scotland, Web news in Scotland computers, Internet, Communications, advances in communications, communications in Scotland, Energy, Scottish energy, Materials, Biomedicine, Biomedicine in Scotland, articles in Biomedicine, Scottish business, business news in Scotland.