Apple Delays Plans to Scan Devices for Child Abuse Images After Privacy Backlash

Apple is temporarily hitting the pause button on its controversial plans to screen users’ devices for child sexual abuse material (CSAM) after receiving sustained blowback over worries that the tool could be weaponized for mass surveillance and erode the privacy of users. “Based on feedback from customers, advocacy groups, researchers, and others, we have decided…

Talking shop with Twitter’s recent head of corp dev — and now VC — Seksom Suriyapa – TechCrunch

Seksom Suriyapa was seemingly destined to land at a venture firm. A Stanford Law graduate, he worked at two blue-chip investment banks before joining the cybersecurity company McAfee as a senior corp dev employee, later logging six years at the human resources software company SuccessFactors and, in 2018, landing at Twitter, where he headed up…

Apple Delays Plans to Scan Devices for Child Abuse Images After Privacy Backlash

Apple is temporarily hitting the pause button on its controversial plans to screen users’ devices for child sexual abuse material (CSAM) after receiving sustained blowback over worries that the tool could be weaponized for mass surveillance and erode the privacy of users. “Based on feedback from customers, advocacy groups, researchers, and others, we have decided…

Talking shop with Twitter’s recent head of corp dev — and now VC — Seksom Suriyapa – TechCrunch

Seksom Suriyapa was seemingly destined to land at a venture firm. A Stanford Law graduate, he worked at two blue-chip investment banks before joining the cybersecurity company McAfee as a senior corp dev employee, later logging six years at the human resources software company SuccessFactors and, in 2018, landing at Twitter, where he headed up…

This New Malware Family Using CLFS Log Files to Avoid Detection

Cybersecurity researchers have disclosed details about a new malware family that relies on the Common Log File System (CLFS) to hide a second-stage payload in registry transaction files in an attempt to evade detection mechanisms. FireEye’s Mandiant Advanced Practices team, which made the discovery, dubbed the malware PRIVATELOG, and its installer, STASHLOG. Specifics about the…