Sonic Drive-In says it’s investigating a possible breach of its payment system.
They say the breach may have allowed thieves to steal millions of customers’ debit and credit card information
The company suggests customers check their card statements to look for any suspicious charges.
Sonic Drive-In released the following statement in response to the incident:
“The security of our guests’ information is very important to SONIC. We are working to understand the nature and scope of this issue, as we know how important this is to our guests. We immediately engaged third-party forensic experts and law enforcement when we heard from our processor. While law enforcement limits the information we can share, we will communicate additional information as we are able.”
Ever fashionable Levi Strauss & Co. have paired up with global giant Google to design a high-tech 'smart jacket'.Jacquard is a technology developed in partnership with Google to create a fashionable wearable. The jacket, designed to be worn when cycling, allows users to interact with their smart phone using gestures and voice commands.
When you’re cycling along you can play, pause and skip your music or ask what song is playing; you can get your next direction, your estimated time of arrival or the current time; and you can receive updates on incoming calls or texts with a LED light or a vibration on your sleeve and have the text message read to you.
Inside the cuff, gesture-sensing threads are wirelessly connected to your phone, and can be set up using the Jacquard app to operate via tiny electronics embedded inside the jacket sleeve.
When you download the app, available on iOS and Android, you can reassign the gestures to change what swipe up, swipe down and double tap translate to on your phone.
The jacket is compatible with phones running Android 6.0.1 or newer, and iOS 10 or newer.
Read more here: home.bt.com/tech-gadgets/future-tech/google-and-levi-have-created-a-jacket-that-connects-to-the-internet-11364215662030
WASHINGTON/SAN FRANCISCO (Reuters) - Hackers breached the U.S. Securities and Exchange Commission’s computer system last year by taking advantage of companies that used authentic financial data when they were testing the agency’s corporate filing system, according to sources familiar with the matter.
The Federal Bureau of Investigation and the U.S. Secret Service have since launched an investigation into a 2016 hack into the SEC‘S EDGAR system, several of those people said.
The sources spoke anonymously because it is not a public investigation.
The SEC’s EDGAR system is a crucial network used by companies to file earnings reports and other material information.
Spokesmen for the FBI, the Secret Service and the SEC all declined to comment, saying they could neither confirm nor deny the existence of an investigation.
The breach occurred in October 2016 and was detected that same month. The attack appeared to have been routed through a server in Eastern Europe, according to an internal government memo describing the incident, which was seen by Reuters.
There was no evidence at the time that data had been improperly retrieved, according to one source familiar with the matter, and the issue was handled internally by the SEC’s Office of Information Technology.
Only after the SEC’s Enforcement Division detected a pattern of suspicious trading ahead of company public disclosures did officials go back to the agency’s technology staff and ask if some companies were using authentic data when they were testing the EDGAR system, one of the people said.
The person said that “not many companies” had submitted real data that is believed to have been hacked.
Read more here: www.reuters.com/article/legal-us-sec-cyber/sec-hackers-accessed-authentic-data-used-by-companies-in-tests-sources-idUSKCN1C031K
Today, President Donald Trump signed a memorandum directing Education Secretary Betsy Devos to improve K-12 computer science education.
The memo asks the Department of Education to devote at least $200 million per year in grants toward “high-quality STEM education with a particular focus on computer science,” according to a press briefing Monday. Trump is also asking the department to explore administrative actions that will increase the focus on computer science in existing K-12 and higher education programs.
Code.org, a Seattle non-profit that advocates for K-12 computer science education, is calling the announcement a victory.
“This federal commitment along with the continuing generous support of private industry, state and local governments will accelerate the adoption of computer science as core curriculum in American K-12 schools,” Code.org CEO Hadi Partovi said in a statement. “More teachers will be trained and more students will have access to learning and achieving success in computer science.”
read more here: www.geekwire.com/2017/white-house-commits-200m-per-year-k-12-computer-science-education/
At its Ignite conference, Microsoft today put its stake in the ground and discussed its progress in building a quantum computer and giving developers tools to experiment with this new computing paradigm on their existing machines.
There’s a lot to untangle here, and few people will claim that they understand the details of quantum computing. What Microsoft has done, though, is focus on a different aspect of how quantum computing can work — and that may just allow it to get a jump on IBM, Google and other competitors that are also looking at this space. The main difference between what Microsoft is doing is that its system is based on advances in topology that the company previously discussed. Most of the theoretical work behind this comes from Fields Medal-recipient Michael Freedman, who joined Microsoft Research in 1997, and his team.
“What topology does is that it gives you this ability to have much better fidelity,” Microsoft’s corporate vice president for quantum research Todd Holmdahl told me. “If you look at our competitors, some of them have three nines of fidelity and we could be at a thousand or ten thousand times that. That means a logical qubit, we could potentially implement it with 10 physical qubits.” What the team essentially did is use Freedman’s theories to implement the error correction that’s so central to quantum computing at the physical level. I’m not going to pretend I really understand what topological qubitsare, but it’s essentially harder to disturb than classical qubits (and in quantum computing, even at at the lowest currently achievable temperatures, you always need to account for some noise that can disturb the system’s state).
With Station Q, Microsoft now runs its own quantum computing lab in Santa Barbara, and Holmdahl tells me the team tripled in size over the course of the last year. The idea here is clearly to build a commercial quantum computer.
Read more here: techcrunch.com/2017/09/25/microsoft-places-its-bets-on-quantum-computing/
Read more here: www.cnbc.com/2017/09/25/amd-nvidia-shares-drop-after-intel-unveils-new-chips-stellar-gaming-performance.html
Following the massive data breach Equifax disclosed to the public in early September, news of a second, earlier attack at the credit agency has emerged. Although originally just a rumor from anonymous sources, on September 19, Equifax confirmed the secondary hack, which took place in March, though the firm denied it had anything to do with the larger hack.
As originally reported by the New York Times, the first cyberattack we learned about occurred sometime between the middle of May 2017 and July 29 when the intrusion was discovered. What makes the Equifax attack particularly troublesome is the company’s status as a central clearinghouse for sensitive credit-related information including social security numbers, driver’s license numbers, and other data that can be used in a variety of ways to harm those affected.
Although at this point it appears unlikely that any more personal information of Equifax customers was stolen in the original hack, it raises serious questions about the firm’s response. It’s possible that the law required Equifax to reveal information about it far sooner than the firm did and this development shines an even harsher light on some of the suspicious stock sales made by Equifax executives in August.
Read more here: www.yahoo.com/news/equifax-data-breach-threatens-personal-033107170.html
Resurgence in energy sector attacks, with the potential for sabotage, linked to re-emergence of Dragonfly cyber espionage group
The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. The group behind these attacks is known as Dragonfly. The group has been in operation since at least 2011 but has re-emerged over the past two years from a quiet period following exposure by Symantec and a number of other researchers in 2014. This “Dragonfly 2.0” campaign, which appears to have begun in late 2015, shares tactics and tools used in earlier campaigns by the group.
The energy sector has become an area of increased interest to cyber attackers over the past two years. Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyber attack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the U.S. being compromised by hackers.
The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.
Read more here:
Dragonfly: Western energy sector targeted by sophisticated attack group http://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group