Netflix now offers offline streaming via its Windows 10 PC application, meaning you’ll have even more options wherever you’re stuck without Internet access. From a report: Netflix added the offline viewing options as part of the most recent update to…
Amazon Was Sucking in Quidsi's Inventory Over a Year Before Shutdown
Amazon’s explanation last week that it was closing Quidsi because the unit was unprofitable didn’t sound much like Jeff Bezos. The Amazon founder is famous for operating retail businesses at such slim margins that rivals can’t compete. Quidsi employees had…
Amazon Launches Amazon Cash, a Way To Shop Its Site Without a Bank Card
An anonymous reader quotes a report from TechCrunch: Amazon this morning announced the launch of Amazon Cash, a new service that allows consumers to add cash to their Amazon.com balance by showing a barcode at a participating retailer, then having…
Verizon Is Rebranding Yahoo, AOL As 'Oath'
Nathan Ingraham reports via Engadget: Somewhere along the way, Verizon’s planned purchase of Yahoo got real complicated. Thanks to security breaches of gargantuan proportions, Yahoo has lost a ton of value — and the company was struggling even when Verizon…
AIG Is Now Selling Cyber Insurance, But Only To High Net Worth Individuals
chicksdaddy writes from a report via Security Ledger: It turns out that the rich really aren’t like everyone else — they have more cyber insurance. That, after insurance giant AIG announced Monday that it has started offering cyber insurance to…
Russian-Speaking Turla Joins APT Elite
Researchers may have found a link between Moonlight Maze of the late ’90s and the Turla APT, which would elevate Turla to the ranks of the Equation Group as an elite nation-state attacker.
Fake SEO Plugin Used In WordPress Malware Attacks
Malware that passes itself off as a WordPress SEO plugin has been infecting sites and opening a backdoor for hackers on thousands of sites.
Memory Corruption Mitigations Doing Their Job
At the Security Analyst Summit, Mark Dowd described how memory corruption mitigations are successfully driving up exploit development costs.
Lines Around Cyber Threat Intelligence Sharing Blurring
The lines between between information shared between intelligence services, companies, and the government are getting increasingly blurry, a Georgetown professor warned.
Fileless Banking Malware Attackers Break In, Cash Out, Disappear
Attackers behind February’s fileless malware attacks dropped malware on some bank ATMs that gave them the ability to dispense money, “at any time, at the touch of a button.”