Google will require two-step verification to allow logins
To mark World Password Day, Google has declared that passwords are the single biggest threat to your online security, reminding us once again just how much passwords suck. It announced plans to automatically add multi-step authentication to its users’ accounts.
It has only been eight years sin... Read more
Millions of smartphones have Qualcomm vulnerability
Slava Makkaveev, from Check Point Software Technologies, published a blog post on Thursday showing a security flaw in Qualcomm’s Mobile Station Modem Interface. It can be exploited to control the modem and dynamically patch it from the application processor.
An attacker could use the flaw to e... Read more
Critical vulnerabilities found in Exim mail server
The team behind the Exim mail server software recommends all users to install the latest patches as soon as possible. The patches fix 21 critical vulnerabilities.
The vulnerabilities were found by security company Qualys, which explains its findings in a blog post. The 21 different vulnerabiliti... Read more
Microsoft to set up separate European cloud
Microsoft is to set up a separate European branch of its cloud services exclusively for European companies and governments. All data will be stored on servers within European borders.
The new policy, called the EU Data Boundary Policy for the Microsoft Cloud, will apply to all major Microsoft cl... Read more
GitHub data from Twilio leaked after Codecov hack
CPaaS company Twilio has fallen victim to the Codecov breach. Via the vulnerability in Codecov's software, an attacker managed to copy some of the company's GitHub repositories.
Last month, it became known that software auditing company Codecov had fallen victim to a hack. An attacker had manage... Read more
VMware’s cost management tool has a vulnerable ‘unauthorized API’
VMWare has admitted that vRealize Business for Cloud includes an "unauthorized VAMPI API' that is vulnerable to hackers looking for remote code execution capabilities on the virtual appliance. The security flaw is critical and scored 9.8 on the ten-point Common Vulnerability Scoring System.
VAMI... Read more
VMware launches “Zero Carbon Committed” initiative
The company is partnering with its cloud providers to fight Climate Change.
VMware is working to reduce the carbon footprint created by data centers by launching a new program. The goal of the new initiative is to make VMware’s cloud partners’ data centers rely on 100 percent renewable energ... Read more
Imperva to acquire CloudVector for API security capabilities
Imperva, the cybersecurity company, announced on Monday that it plans to acquire API security company CloudVector. The financial details of the deal have not been disclosed. Imperva says that the acquisition will help it accelerate its roadmap and give it more ground in the web app and API protecti... Read more
Verizon sells entire media division, which gets renamed to Yahoo
The American telecom provider has decided to split off its entire media division. The various media under Verizon will be in the hands of private equity firm Apollo Global Management, which is putting down 5 billion dollars (over 4 billion euros) for the business.
Verizon's media branch is the r... Read more
Social media must remove terrorist content within the hour
The European Parliament has adopted a new law concerning terrorist content on the Internet. Platforms will have to remove any terrorist content within an hour of being notified.
According to the law, providers serving users within the EU must respond within one hour to a notification from the au... Read more