The Citi Double Cash Card Will Soon Earn Cash Rewards Via Thankyou Points

According to Citi, the change will happen automatically, and any cash rewards cardholders have at that time will be converted to ThankYou points at a rate of 1 point for every cent. If you have $10 in cash rewards come March 28, for example, it will be converted to 1,000 ThankYou points instead. There is no limit to the number of points cardholders can earn, and points will not expire....

April 6, 2023 · 1 min · 166 words · Pauline Pipkin

The Race Towards Renewable Energy Is Creating New Cybersecurity Risks

The energy industry is already a high-profile target for hackers, including those looking to deploy espionage campaigns, ransomware and even attacks with the intent to sabotage systems to cut off power – and the rapid transition towards renewable energy could lead to additional avenues for cyber criminals to exploit. A new report by defence and security think tank the Royal United Services Institute (RUSI) has outlined some of the top cyber risks during the transition towards renewable energy from fossil fuels....

April 6, 2023 · 4 min · 800 words · Kristen King

The Saga Continues Twitter Sues Elon Musk To Force Deal

On Friday, just under three months after declaring his intent to purchase Twitter and take it private, Musk said he is backing out of the deal. Twitter’s board quickly responded that it was prepared to take legal action to ensure the deal closes at a price of $54.20 per share. “Musk refuses to honor his obligations to Twitter and its stockholders because the deal he signed no longer serves his personal interests,” the company said in its suit, filed in the Delaware Court of Chancery....

April 6, 2023 · 2 min · 337 words · Kenny Dillard

There Are Two Types Of Quantum Computing Now One Company Says It Wants To Offer Both

Clarity effectively expands on D-Wave’s current offering, which is limited to cloud-based superconducting quantum annealers, to start including a superconducting gate model quantum computer – similar to the ones developed by tech giants such as IBM and Google – in the next couple of years. By 2024, according to D-Wave’s roadmap, the first gate model preview quantum processing units (QPUs) will come online in the company’s quantum cloud service, along with a suite of adapted tools and resources....

April 6, 2023 · 6 min · 1118 words · Simone Harrell

These New Hacking Groups Are Striking Industrial Operational Tech Targets

Cyberattacks launched against industrial players, providers of critical infrastructure, utilities, and energy companies – whether oil, gas or renewables – are often less about making a quick buck and more about data theft or causing real-world disruption. The ransomware incidents experienced by Colonial Pipeline and JBS called attention to the ramifications of digital attacks on supply chains. After Colonial Pipeline temporarily halted delivery services to investigate a cyberattack, fuel panic-buying took place across parts of the United States....

April 6, 2023 · 4 min · 726 words · Colleen Allegra

These Old Security Vulnerabilities Are Creating New Opportunities For Hackers

Analysis by cybersecurity researchers at F-Secure suggests that 61% of security vulnerabilities that exist in corporate networks are from 2016 or even older, despite patches being available for five years or more. Some of the vulnerabilities that continue to be exploited to breach networks are more than a decade old. One of the most common unpatched vulnerabilities plaguing businesses is CVE-2017-11882, an old memory corruption issue in Microsoft Office, including Office 365, which was uncovered and patched in 2017, but had existed since 2000....

April 6, 2023 · 3 min · 502 words · Efrain Gee

Third Party Data Breach In Singapore Hits Healthcare Provider

The healthcare services provider said none of its own IT systems, network, and databases were impacted by the breach. It filed reports with both the police and Personal Data Protection Commission, which oversees Singapore’s Personal Data Protection Act. Agape first detected the intrusion on October 19 and “acted immediately” to isolate and suspend use of the system, the vendor said in a statement Monday. “None of our core infrastructure has been compromised,” it said, adding that the breach “appears” to be limited to Fullerton Health....

April 6, 2023 · 3 min · 575 words · Benjamin Welch

This Broken Ransomware Can T Decrypt Your Files Even If You Pay The Ransom

Coded in Python, Cryptonite ransomware first appeared in October as part of a free-to-download open-source toolkit – available to anyone with the skills required to deploy it in attacks against Microsoft Windows systems, with phishing attacks believed to be the most common means of delivery. But analysis of Cryptonite by cybersecurity researchers at Fortinet has found that the ransomware only has “barebones” functionality and doesn’t offer a means of decrypting files at all, even if a ransom payment is made....

April 6, 2023 · 3 min · 544 words · Brian Brauer

This Must Have Screwdriver Has Two Cool Hidden Tricks

Also: 3 security gadgets I never leave home without This compact Wera screwdriver kit solves all that. Here’s a screwdriver kit I can pop into a pocket or bag, and not compromise on quality or power. And this screwdriver has some cool hidden tricks. First, it can go from a stubby to a long screwdriver (and back again) with the press of a button. This is super handy for tackling a variety of jobs....

April 6, 2023 · 3 min · 467 words · Daniel Braun

This Raspberry Pi Is Heading Into Space For A Python Programming Challenge

The UK-designed computer was first put into space by British European Space Agency (ESA) astronaut Tim Peake in December 2015 in the Principia mission. The computers have been programmed by 54,000 students in 26 countries for tasks like looking back at Earth from space and monitoring what crew members are doing on ISS. SEE: Programming languages: Python’s new developer in residence and their ‘make-it-or-break-it’ role ESA flagged two challenges in what it calls called Mission Zero and Mission Space Lab....

April 6, 2023 · 3 min · 541 words · Kimberly Bell

This Simple Drone Mistake Could Cost You Of Thousands Of Dollars

But there’s one area of drone piloting where strict laws, along with substantial penalties, exist. Commercial drone operations. Must read: iPhone bug makes it easy for someone to break your Wi-Fi. Here’s the fix and how to prevent it If you are flying a drone commercially in the US, you need what is called part 107 certification. This is again administered by the FAA, and unlike the recreational certification, which is free and lasts indefinitely, part 107 certification costs $150 and is valid for two years....

April 6, 2023 · 2 min · 269 words · Marie Stamey

Time To Update Google Chrome Browser Patches High Severity Security Flaw

The Stable Channel Update for Google Chrome on desktop is for Windows, Mac and Linux versions of the browser. It’s recommended that users apply the security update as soon as possible – something that Google Chrome will do automatically when the browser is closed and reopened. The update fixes CVE-2022-4262, a vulnerability classed as high severity that allows a remote attacker to potentially exploit a Type Confusion issue in Google V8’s javascript engine by causing heap corruption via a crafted HTML page....

April 6, 2023 · 3 min · 435 words · Jason Ciprian

To Stop Quantum Hackers The Us Just Chose These Four Quantum Resistant Encryption Algorithms

NIST, a US standards setting body and research organization within the Department of Commerce, announced the four algorithms after a six-year period assessing potential quantum-resistant (QR) alternatives to today’s cryptographic algorithms for public key encryption, digital signatures, and key exchange. In 2016, NIST asked the world’s cryptographers to devise and then vet potential quantum-resistant methods to secure communications for everything from websites to email. SEE: What is quantum computing? Everything you need to know about the strange world of quantum computers Today’s key algorithms include AES-256 for symmetric key encryption, SHA-256 and SHA-3 for hashing functions, RSA public key encryption for digital signatures and key establishment, Elliptic Curve Cryptography (ECDSA, ECDH) and DSA public key encryption for digital signatures and key exchange....

April 6, 2023 · 4 min · 749 words · Linda Eldridge

Twitter Handle Swatter Jailed After Victim Dies Following Home Raid

The victim, Mark Herring, was a resident of Tennessee and owned the Twitter account @Tennessee, which happened to be a sought-after name. As reported by the Washington Post, the coveted handle was the object of Shane Sonderman, who was just under 18 years old at the time. Sonderman, together with co-conspirators, attempted to coerce Herring into giving it up by intimidating him and his family. These methods included harassing texts, cash-on-delivery food orders, and phone calls, the aim being to obtain the handle and then sell it on....

April 6, 2023 · 2 min · 386 words · Robert Steinle

Uber Freight Acquires Logistics Firm Transplace For 2 2B

Once the deal closes, Uber says it will have one of the largest managed transportation and logistics networks in the world. The deal should also help the Uber business segment speed up its path to profitability. Uber Freight is a relatively small segment of Uber, but it is growing quickly. During Uber’s last-reported quarter, the business segment brought in $301 million in revenue, up 51% year-over-year. Its adjusted EBITDA was negative $29 million....

April 6, 2023 · 2 min · 288 words · Tom Horn

Updates Released For Multiple Vulnerabilities Found In 42 Gears Suremdm Products

Immersive Labs published a detailed breakdown of the vulnerabilities – one of which is critical – that affect SureMDM’s Linux agent and the web console. Kevin Breen, director of cyber threat research at Immersive Labs, told ZDNet that the company says it has more than five million successful deployments worldwide and 18,000 customers. It is unclear how many use the products affected by the issues they discovered, but Breen said anyone using the Linux version listed in the post was vulnerable to those vulnerabilities....

April 6, 2023 · 4 min · 724 words · Rosemary Muller

Us Australia And Japan Stump Up For Subsea Cable Between Nauru Kiribati And Federated States Of Micronesia

The new cable will connect the island containing the capital of Kiribati with Nauru and the island of Kosrae in FSM, before connecting with the Hantru-1 cable at the island of Pohnpei in FSM. A joint statement between the six nations said the cable would provide better connectivity to 100,000 people across the three Pacific nations. “We will continue to coordinate closely with the World Bank and the Asian Development Bank to ensure this project complements investments by these institutions to enhance digital connectivity in FSM, Kiribati, and Nauru,” the statement said....

April 6, 2023 · 2 min · 298 words · Jeanette Lovelace

Us President Biden Signs Law To Ban Huawei And Zte From Receiving Fcc Licences

The legislation, Secure Equipment Act of 2021, will require the Federal Communications Commission (FCC) to adopt new rules that clarify it will no longer review or approve any authorisation applications for networking equipment that pose national security threats. Last year, the FCC formally designated Huawei and ZTE as national security threats, with that decision being made as the agency found that both companies had close ties to the Chinese Communist Party and China’s military apparatus....

April 6, 2023 · 3 min · 428 words · Susan Martinez

Using Home Security To Protect Your Prescription Drugs

Which medications are the target of theft? Opioids: Opioids are used to reduce the intensity of pain and are highly addictive. Even when used as prescribed by your doctor, long-term use of opioids can lead to addiction, which is why opioids are mainly used in short bursts after major events like surgery. Before prescribing, doctors should abide by the CDC Guideline for Prescribing Opioids for Chronic Pain. CNS Depressants: Central nervous system depressants are a class of tranquilizers and sedatives that are used to treat anxiety and sleep disorders....

April 6, 2023 · 10 min · 1936 words · Karen Elmore

Vivaldi Now Offers A Built In Mail Client That S Pretty Fabulous

Vivaldi is also a calendar. It’s also an RSS feed reader. And now, it’s also an email client. That’s right, the developers of the Vivaldi web browser have integrated a full-blown email client, so you don’t have to either deal with web-based clients or work with yet another application window on your desktop. As to the Vivaldi Mail features, it includes such things as: IMAP, POP3, Gmail, iCloud, and Outlook supportLabels, filters, and a powerful search toolUnseen/unread countersCustom keyboard shortcutsIntegrated Feed readerShow/hide read email, mailing lists, custom folders, feed, junk, and trashSave searchesMessage queuing and batch sendingInvite management with Vivaldi Calendar integration...

April 6, 2023 · 3 min · 606 words · Raymond Gordon