Latest news

Technology & Communications news provided by Qubic Group plc

ANNSI has decided to make CLIP OS open-source. Now, other users, beyond French cyberspies, have the option of using CLIP OS 4 and CLIP OS 5. You can download it straight from GitHub. Originally, the OS was developed for the needs of a French government organisation. It is an operating system with advanced cybersecurity features that will make your PC resilient to malicious code and protect your sensitive personal data. The OS uses partitioning mechanisms

Read More

Google is rolling out a new cybersecurity feature to Cloud container images. The Container Registry vulnerability scanning feature was designed to bring more stability to the CI/CD process. On Wednesday, Google made an announcement about a new cybersecurity feature developers can use in the early phase of continuous integration as well as continuous delivery CI/CD process. From now on, all container images built using Google Cloud will automatically be scanned for OS package vulnerabilities. However,

Read More

According to the Europol cybercrime report, ransomware remains a key malware threat. However, cryptojacking malware may soon take the #1 spot. Ransomware attacks can result in millions upon millions of dollars in damages to organisations, making them a potent weapon in the hands of nation-state attackers and cybercriminals. Here are a few key recent examples: – NotPetya – BadRabbit – WannaCry The figures in the report suggest that organisations have sustained a loss of roughly

Read More

Reportedly, the Information Commissioner’s Office (ICO) receives around 500 calls on a weekly basis, but as we’re 3 months into the GDPR era, no fines have been issued as of yet. These fines are no laughing matter; should you get hit by them, expect to have to pay upwards of €20 million (£17.7 million). ICO official James Dipple-Johnstone does not view the agency as a revenue-generation organisation, which is probably why they’re a bit more

Read More

FragmentSmack, a cybersecurity vulnerability, can be used as a basis for a DDoS attack, flooding the servers with malformed IP packets. The vulnerability was previously present in Windows servers, but Microsoft has already patched it. When attacked with malformed IPv4 or IPv6 packets, Windows systems used to shoot their CPU usage all the way to 100%, effectively rendering them useless for any kind of work. There is a similar vulnerability called SegmentSmack that used malformed

Read More

Microsoft has acquired Lobe, a visual platform on which it’s possible to make custom learning models with practically zero coding knowledge by using a drag and drop interface. Kevin Scott, Microsoft’s CTO and EVP, explained that even though deep learning and AI are transforming modern technology, it’s still quite difficult to build such systems. Consequently, not as many business owners are able to access and thus benefit from AI Lobe makes the process quite simple.

Read More

Vodafone is preparing to launch the LPWA network in the UK. Soon, the number of European cell sites that support NB-IoT will effectively be doubled in numbers, as Vodafone are looking to position themselves as the IoT market leaders. Thus far, Vodafone has been the biggest supporter of NB-IoT. Mobile networks, in comparison, do have their advantages, but the relatively high power consumption is certainly not one of them, especially when looking to power the

Read More

eBay has decided to make HeadGaze open source, a technology that makes it extremely easy for someone with motor impairments to navigate through different applications. The technology utilises Apple’s ARKit and iPhone X camera to monitor someone’s head motions, allowing them to navigate the screen without using their hands. If you’re familiar with how a mouse cursor works, the concept of HeadGaze should be quite familiar to you as well. The only difference is that

Read More

Recently, Microsoft has released two documents revealing how they classify cybersecurity bugs. These documents were put together by Microsoft Security Response Center. Even though an early version of the documents was released in June, the new one is much more information-packed. Microsoft places the cybersecurity bugs in one of the following categories: – Security features – Security boundaries – Defence-in-depth security features To shed a bit more light on these, security boundaries are essentially what

Read More

Cybercriminals frequently target small business owners, and payment systems are one of the most common entry points through which they find their way into their networks. To come up with an answer to the problem, PCI SSC has come up with a new tool to help small business owners evaluate their cybersecurity readiness, as well as providing them with additional resources through which they can broaden their horizons. The recent statistics suggest that 60% of

Read More