article thumbnail

Facial Scanning by Burger King in Brazil

Schneier on Security

In 2000, I wrote : “If McDonald’s offered three free Big Macs for a DNA sample, there would be lines around the block.” “BK presents Hangover Whopper, a technology that scans your hangover level and offers a discount on the ideal combo to help combat it.” ” The stunt runs until January 2nd.

Marketing 242
article thumbnail

OT attacks increased by over 2000 percent in 2019, IBM reports

Security Affairs

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. According to IBM X-Force, attacks targeting operational technology (OT) infrastructure increased by over 2000 p ercent in 2019 compared to 2018, and most of them involved the Echobot malware. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: The CIS Benchmarks Community Consensus Process

CSO Magazine

The first CIS Benchmark was released in 2000. Without community participation, we would not have CIS Benchmarks, as the community is at the heart of what drives development and consensus across industries and technologies. Today, there are more than 100 CIS Benchmarks configuration guidelines across 25+ product vendor families.

Mobile 123
article thumbnail

4 ways attackers target humans to gain network access

CSO Magazine

Every day, I see the failure in our technology. I remember the infamous email-based computer worm , the “ILOVEYOU virus,” that infected fellow IT friends back in 2000. When technology fails, it’s likely because the attacker made an end run around it by targeting humans. I’m sure you see it as well. In reality, it often does not.

article thumbnail

DarkTrace Cyber Protects Fashion retailer Ted Baker

CyberSecurity Insiders

Cyber Security firm DarkTrace that uses the technology of Artificial Intelligence to track down cyber threats is nowadays busy protecting the computer network of British Fashion retailer Ted Baker. Note 2- Established in 2013, Darktrace is a British American company that helps protect its users from various cyber attacks.

Retail 144
article thumbnail

Rombertik: Old Dog

Doctor Chaos

Rombertik has a number of obfuscation and evasion technologies that make it difficult to debug. The malware establishes an outbound connection for Command and Control (C&C) servers on TCP ports 80, 2000, 20005, and 20006. What We Learned. Rombertik is not the first malware that uses analysis evasion techniques.

article thumbnail

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

Security Affairs

The Sandworm group (aka BlackEnergy , UAC-0082 , Iron Viking , Voodoo Bear , and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). In December, Kyivstar , the largest Ukraine service provider went down after a major cyber attack.

Mobile 82