Apple says Tencent isn’t snooping on your browsing habits

Apple was quick to allay user concerns this weekend after someone spotted that it was working with Chinese company Tencent to check its users’ website requests for malicious URLs. Continue reading Apple says Tencent isn’t snooping on your browsing habits

Apple Shares Some Browsing History with Chinese Company

The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government. Continue reading Apple Shares Some Browsing History with Chinese Company

New cross-industry consortium aims to accelerate confidential computing adoption

The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Companies committed to this work include Alibaba, Arm, Baidu, Google Clo… Continue reading New cross-industry consortium aims to accelerate confidential computing adoption

Alibaba to help Salesforce localize and sell in China

Salesforce, the 20-year-old leader in customer relationship management (CRM) tools, is making a foray into Asia by working with one of the country’s largest tech firms, Alibaba. Alibaba will be the exclusive provider of Salesforce to enterprise customers in mainland China, Hong Kong, Macau, and Taiwan, and Salesforce will become the exclusive enterprise CRM software […] Continue reading Alibaba to help Salesforce localize and sell in China

‘Small stickers’ were enough to trick a Tesla’s autopilot to drive into the wrong lane

A security vulnerability in Tesla firmware made it possible for outsiders to take remote control over a vehicle’s steering and push it into an opposite lane, according to recent research from Tencent’s Keen Security Lab. The computer experts discovered that, by painting “small stickers” on a roadway, they could fool the autopilot on a Tesla Model S 75 into following a path the driver did not intend. The technique exploited the car’s autopilot protocol, which quickly collects data about a vehicle’s surroundings based on radar signals, cameras and other sensors. By placing stickers over road markings, the Keen team caused the Tesla to move to the wrong side of the road. Researchers also proved it was possible to activate the windshield wipers by using a camera to trick the Tesla’s artificial intelligence into believing there was moisture on the surface. Tesla fixed the “primary” flaw with a series of security […]

The post ‘Small stickers’ were enough to trick a Tesla’s autopilot to drive into the wrong lane appeared first on CyberScoop.

Continue reading ‘Small stickers’ were enough to trick a Tesla’s autopilot to drive into the wrong lane

Cryptojacking malware gets past cloud security programs by uninstalling them

Why break through a barrier if you can just remove it? A piece of cryptojacking malware observed by Palo Alto Networks researchers is equipped to completely uninstall cloud security services from Linux-based servers before carrying out its malicious coin-mining. In a report published Thursday, Palo Alto Networks’ Unit 42 research team said the malware is spread by the cyberthreat group “Rocke,” whose cryptojacking activity was initially documented by Cisco Talos. A Chinese-speaking threat actor, the Rocke group is known for using the computing power of infected Linux-based systems to mine the cryptocurrency Monero. Whereas past versions of the Rocke group’s malware tried to evade detection by disabling only certain aspects of a cloud security service, the new variant simply removes the entire program, according to Palo Alto Networks. The researchers say Rocke added code that can gain administrative access on the infected server and uninstall five different cloud security and monitoring […]

The post Cryptojacking malware gets past cloud security programs by uninstalling them appeared first on CyberScoop.

Continue reading Cryptojacking malware gets past cloud security programs by uninstalling them