Tag Archive for: tech

Android Users Could Finally Have Face ID-Like Security Tech Thanks To This Startup


Apple has offered Face ID on iPhones for a few years and its security is fool-proof enough for the company to completely stop having the Touch ID. The situation with Android phones has been different, as people tend to feel safer with the biometric finger sensor than the software-enabled face unlock feature.

But we could finally have a breakthrough thanks to this one startup which has joined hands with one of the biggest mobile brands to make the security tech affordable and ready for mass adoption.

The startup named Metalenz based in Harvard Labs has partnered with Samsung and talked about Polar ID which is likely to be the Face ID rival and finally a secure facial recognition tech for Android users. Samsung’s role in its development is the use of the ISOCELL Vizion 931 sensor from the company.

Metalenz has claimed that Polar ID is the ideal tool ready to be deployed at a mass level as the tech is said to be smaller, affordable yet secure than the face unlock feature that works on your Android phone, which is very easy to believe.

So what makes Polar ID safer than the existing tech features?

Metalenz has a facial authentication tech that is claimed to capture the unique signature of each user, something that Apple also offers with Face ID on iPhones. Having secure facial tech will be crucial because people tend to use the feature for making payments and the future of passkeys makes it an even more pivotal part of the setup.

Samsung is offering the sensor that has been paired with the security tech, and having a giant in its wing means you can have the cost of economies in play, allowing more brands to tap into the feature and bring it to more users.

It has been mentioned that Android phones could see Polar ID tech available by the second half of 2024, which might make it mainstream by next year. We’ll be eager to test the feature and see how it stacks up against Face ID. Having said that, Metalenz sees the tech going beyond security and maybe even part of the mixed reality ecosystem.

top videos

  • Did You Know That AI And Not Humans Are Scanning Your Resume? | The Breakfast Club | News18

  • Google AI Gemini | Google AI Assistant Gemini Demo | Artificial Intelligence | N18V | #shorts

  • Source…

    As-a-Service tools empower criminals with limited tech skills


    As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious tools in use by attackers, according to Darktrace.

    as-a-Service malware tools

    Cybercriminals exploit as-a-Service tools

    As-a-Service tools can provide attackers with everything from pre-made malware to templates for phishing emails, payment processing systems and even helplines to enable criminals to mount attacks with limited technical knowledge.

    The most common as-a-Service tools Darktrace saw in use from July to December 2023 were:

    • Malware loaders (77% of investigated threats), which can deliver and execute other forms of malware and enable attackers to repeatedly target affected networks.
    • Cryptominers (52% of investigated threats), which use an infected device to mine for cryptocurrency.
    • Botnets (39% of investigated threats) enrol users in wider networks of infected devices, which attackers then leverage in larger-scale attacks on other targets.
    • Information-stealing malware (36% of investigated threats), malicious software like spyware or worms, designed to secretly access and collect sensitive data from a victim’s computer or network.
    • Proxy botnets (15% of investigated threats), more sophisticated botnets that use proxies to hide the true source of their activity.

    Phishing threats escalate in business communications

    Darktrace identified Hive ransomware as one of the major Ransomware-as-a-Service attacks at the beginning of 2023. With the dismantling of Hive by the US government in January 2023, Darktrace observed the rapid growth of a range of threats filling the void, including ScamClub, a malvertising actor notorious for spreading fake virus alerts to notable news sites, and AsyncRAT, responsible for attacking US infrastructure employees in recent months.

    As businesses continue to rely on email and collaboration tools for communication, methods such as phishing continue to cause a headache for security teams. Darktrace detected 10.4 million phishing emails across its customer fleet between the 1st September and the 31st December 2023.

    But the report also highlights how cybercriminals are embracing more…

    Source…

    Fulton County tech troubles continue, expert believes it’s a ransomware attack


    Technology trouble continues to be a problem for Fulton County after a cyberattack at the end of January, but a cybersecurity expert believes a ransomware attack may be to blame.

    A number of systems remain offline, creating a big headache for residents.

    The county has remained tight-lipped and will not answer many questions, other than to say it is “under investigation.”

    “When it happened on Monday, I was expecting it to be taken care of by Tuesday,” said Rajiv Garg, a Cybersecurity Expert and Associate Professor at Emory’s Goizueta Business School.

    There are rumblings inside and outside the county that this is a multi-million dollar ransomware attack. Officials will not confirm if that’s true. Garg says based on his experience, it’s likely because of how long it’s been going on.

    “The issue here is they have some data that is probably not backed up that is either lost or encrypted because of the ransomware,” he said.

    What is being impacted by cyberattack?

    The attack is impacting phones and court and tax systems. Fulton County residents are caught in the middle.

    “The only thing that they’re accepting is a check or money order and if you don’t have that, then you can’t pay,” said Angie Allen, a Fulton County resident.

    Residents are being told that their tax payments will not be posted until the system is back online. Joe Jordan paid his property tax bill with a check Monday. His proof of payment is some writing on the back of a business card.  

    “That is the only receipt that I have,” he said.

    During a Monday afternoon news conference, Fulton County Board of Commissioners Chairman Robb Pitts gave an update on the cyberattack. He did not take any questions about what’s happening, but said this about the investigation.

    “There is no evidence or reason to believe that this incident is related to the election process or other current events,” he said.

    The county says it has been working around the clock to get systems back up and…

    Source…

    Veeam’s New ‘Cyber Secure Program’ Teams Tech with Ransomware Response Experts — Virtualization Review


    News

    Veeam’s New ‘Cyber Secure Program’ Teams Tech with Ransomware Response Experts

    Along with purpose-built technology to combat ransomware, Veeam Software’s new Cyber Secure Program also offers up a team of experts to help organizations wield that tech to fight threat actors.

    “When there is an attack, customers are connected with Veeam’s dedicated Ransomware Response Team and the program offers post-incident support to enable rapid recovery,” said the specialist in data protection and ransomware recovery.

    The three-pronged approach of Veeam Cyber Secure includes the expert help for secure design and implementation along with ransomware recovery support backed up by a recovery warranty for help in all three phases of an attack: pre-incident, during incident and post-incident.

    The teams of experts include a dedicated support account manager and “Ransomware SWAT Team” to help with immediate action in case of a cyber incident

    The new offering comes in the wake of the company’s 2024 Data Protection Report that revealed ransomware is still plaguing IT as the No 1. cause of server outages.


    Causes of Outages
    [Click on image for larger view.] Causes of Outages (source: Veeam).

    “Consider the past 12 months: 76 percent of organizations have been attacked at least once, with 26 percent reporting being attacked at least four times and only 13 percent believe they can recover successfully after an attack,” Veeam said. “It’s clear that organizations need a comprehensive cyber protection and support program, ultimately ensuring they are well-prepared when cyberattacks occur.”

    A Jan. 31 news release further fleshed out the new program’s three key components.

    • Confident Security: Attentive and dedicated design and implementation assistance to ensure Veeam best practices in securely implementing Veeam solutions to the highest security standards. Customers receive advanced seven-phase onboarding support and rigorous quarterly security…

    Source…