Connect with us

Security

Analyst firm App Annie will pay $ 10 million for data fraud

Published

on

App Annie misled its customers about how it got its app usage data.

Securities and Exchange Commission (SEC) accused the well-known American analytical company App Annie and its co-founder and former CEO Bertrand Schmitt in data fraud. As part of the “misleading and material misstatement of information about how App Annie obtained alternative data” dispute, the company and Schmitt agreed to pay more than $ 10 million.

App Annie is one of the world’s largest sellers of mobile app performance data. The company sells data useful to developers, publishers, advertisers, and marketing firms, including information on app downloads, frequency of use, revenue generated, and more.

These types of data are called “alternative data” by trading companies because they are not included in financial statements or other traditional data sources, the SEC explains. App Annie promised app developers not to directly disclose their data to third parties, but instead use it as a source of aggregated and anonymized statistics. In particular, the developers were promised to use the data. solely for building a statistical model for the purpose of evaluating application performance.

However, according to the SEC, from late 2014 to mid-2018, App Annie used non-aggregated and non-anonymized data to modify estimates generated from a statistical model to make them more valuable to sell to trading companies. According to the SEC, the company and its ex-CEO Schmitt lied to their clients about how the data was obtained. Customers were advised that the data was obtained with the conscious consent of users and that the company has effective internal controls to prevent unauthorized use of confidential data and to ensure compliance with US federal cybersecurity laws. Trading companies made investment decisions based on this data, and App Annie even advised them on using estimates for trading prior to announcing earnings.

App Annie and Schmitt violated the anti-fraud provisions of Section 10 (b) of the Exchange Act and Rule 10b-5, the SEC reported. App Annie, without admitting or denying the accusation, agreed to comply with the order to stop illegal activities and pay a fine of $ 10 million. At the same time, Schmitt is obliged to pay $ 300 thousand. companies.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Security

Bitcoin could be hacked by new quantum supercomputers

Published

on

Mark Webber of the University of Sussex, UK, and his colleagues studied how powerful a quantum computer would be needed to crack bitcoin in terms of the number of qubits, or quantum bits equivalent to conventional computational bits.

Every bitcoin transaction must be “confirmed” by a network of miners before it can be added to the blockchain. Each transaction is assigned a cryptographic key during this confirmation process, and cracking the key will allow you to become the owner of those bitcoins.

Transactions are declared and a key is associated with this transaction. There is a finite window of time during which this key is vulnerable, and it varies, but it is usually from 10 minutes to an hour, maybe a day.

Mark Webber

Bitcoin could be hacked by new quantum supercomputers

Webber’s team calculated that it would take a quantum computer with 1.9 billion qubits to break the bitcoin encryption in 10 minutes, and a machine with 317 million qubits to break in an hour. Even taking into account a whole day, this figure drops to only 13 million qubits.

This is encouraging news for bitcoin holders because IBM’s top quantum computer only has 127 qubits, so quantum computers need to become a million times more powerful to threaten the cryptocurrency. And this, according to Webber, is unlikely to happen within the next decade.

Continue Reading

Components

Fingerprint scanner for payment cards. Samsung introduced the industry’s first universal security chip for this purpose.

Published

on

Samsung has introduced what it calls an intelligent multi-functional fingerprint security chip for biometric payment cards. Simply put, this is a chip for implementing a fingerprint scanner on ordinary bank (and not only) cards.

Fingerprint scanner for payment cards.  Samsung introduced the industry's first universal security chip for this purpose.

The chip is called S3B512C. It is EMVCo and Common Criteria Evaluation Assurance Level (CC EAL) 6+ certified and operates in accordance with the latest Mastercard Biometric Evaluation Plan Summary (BEPS) specifications.

The S3B512C combines a fingerprint sensor, Secure Element (SE) and Secure Processor, adding an extra layer of authentication and security to payment cards. S3B512C is primarily intended for payment cards, but can also be used in cards requiring highly secure authentication such as student or employee identification, membership, or building access

Fingerprint scanner for payment cards.  Samsung introduced the industry's first universal security chip for this purpose.

Samsung claims it is the industry’s first all-in-one security chip that reads biometric information with a fingerprint sensor, stores and authenticates encrypted data with a tamper-resistant Secure Element, and parses and processes data with a secure processor. With three key features integrated into a single chip, the S3B512C can help card manufacturers reduce the number of chips needed and streamline their card development processes for biometric payment cards.

.

Continue Reading

Computers

Vulnerability in Dark Souls 3 allows attackers to take over any computer

Published

on

According to Dexerto and The Verge, a hacker discovered a security vulnerability in Windows that was opened using the game Dark Souls 3. It allows attackers to remotely take over and control a computer.

Famous streamers such as The_Grim_Sleeper have heard about the problem personally. In the case of The_Grim_Sleeper, the hacker fired up Microsoft PowerShell and ran a text-to-speech script, criticizing the streamer for his game.

Vulnerability in Dark Souls 3 allows attackers to take over any computer

At the same time, this hacker did not have malicious intent, he only showed a vulnerability and warned FromSoftware developers about the vulnerability that Dark Souls 3 has. FromSoftware studio and publisher Bandai Namco reacted to the discovered exploit. They have temporarily disabled PvP servers for Dark Souls 3 and its predecessors while the security team investigates the vulnerabilities.

It is not yet known when the servers will be back online, but FromSoftware and Bandai have made it clear that they will not restore service until they are reasonably confident that players are safe. Other hackers could use the vulnerability to steal sensitive information and do other harm.

Continue Reading

Most Popular