Category: Enterprise Software

Based employees can access US user data, but only through an ‘approval process’TikTok confirms that China

Letter gop tiktok usbarinkabloomberg letter gop tiktok usbarinkabloomberg: based employees of its Chinese parent company, ByteDance, have access to US user data under certain circumstances in a letter obtained by…

 Hack its way through the pandemic How North Korea used crypto to

North Korea used crypto North Korea used crypto: At a time when North Korea has locked itself down for fear of the pandemic, hacking crypto exchanges has allowed it to…

IPhone Software Update Apple Faces $918 Million Lawsuit Over

iPhone Software Update iPhone Software Update: Consumer rights champion Justin Gutmann says Apple “throttled” the performance of older iPhone handsets after users installed upgrades that they were told would improve…

Notorious Russian Hacking Group Uses Lock bit Amid Ukraine: War From Malware to Ransomware

Notorious Russian Hacking Notorious Russian Hacking: While cyber-security firms have linked Evil Corp to two malware strains known as Dridex and Hades, the group’s usage of LockBit may lead hacked…

Hacking Scenarios: How Hackers Choose Their Victims Hacking Scenarios

Hacking Scenarios Hacking Scenarios: Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. May 6th, 2022 is a recent example. The State Department said the Conti strain…