article thumbnail

Mozilla buys Fakespot, a startup that identifies fake reviews, to bring shopping tools to Firefox

TechCrunch

Mozilla announced today that it has acquired Fakespot , a startup that offers a website and browser extension that helps users identify fake or unreliable reviews. Fakespot’s offerings can be used to spot fake reviews listed on various online marketplaces including Amazon, Yelp, TripAdvisor and more.

article thumbnail

February 2024 Patch Tuesday

Ivanti

It is recommended to review the mitigations and workarounds for this vulnerability in addition to the App Installer update. It is recommended to treat this vulnerability as a Critical priority due to the risk of exploit. The vulnerability exists in Office 2016 and 2019, Office LTSC 2021 and 365 Apps for Enterprise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 cybersecurity trends we’re thankful for

The Parallax

Secure messaging : The renewed emphasis on encryption, due in no small part to cybersecurity industry concerns in the aftermath of Edward Snowden’s 2013 whistleblowing efforts , has led to a new cottage industry of competitive end-to-end secure-messaging apps. election security experts grab the attention of influencers in D.C.

Trends 189
article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

That’s the bad news the Cybersecurity and Infrastructure Security Agency’s Cyber Safety Review Board delivered in a recent report. DHS Review Board Deems Log4j an 'Endemic' Cyber Threat ” (DarkReading). DHS Review Board Deems Log4j an 'Endemic' Cyber Threat ” (DarkReading). Prioritize systems and data to be protected.

article thumbnail

CVE-2021-34527: Microsoft Releases Out-of-Band Patch for PrintNightmare Vulnerability in Windows Print Spooler

Tenable

CVE-2021-34527 is an RCE vulnerability in the Windows Print Spooler Service , which is available across desktop and server versions of Windows operating systems. An authenticated, remote or local attacker, could exploit this flaw in order to gain arbitrary code execution with SYSTEM privileges. for 32-bit systems Windows 8.1

Windows 101
article thumbnail

How the tech industry is responding to Russia’s invasion of Ukraine

TechCrunch

They include Ajax , a home wireless security company; the AI-based grammar and writing engine Grammarly ; the face-swapping app Reface ; pet camera system Petcube ; People AI , the sales and marketing intelligence startup; and language tutor marketplace Preply. So far, those two measures haven’t been adopted for accounts in Ukraine.

article thumbnail

How to Tackle OT Challenges: Asset Inventory and Vulnerability Assessment

Tenable

The Operational Technology (OT) cybersecurity sector is facing new opportunities and challenges as the complexity and vulnerability of formerly isolated OT/ICS networks have expanded due to the convergence of IT, IoT, and OT networks. This is a common characteristic in industrial control systems to enhance security and minimize network noise.

How To 97