Hackers target prosecutors in South Korean corruption scandal

Hackers target prosecutors in South Korean corruption scandal

by Luana PASCU, from HotForSecurity , on 17.01.2017

Prosecutors investigating South Korean President Park Geun-hye and Samsung Electronics Vice Chairman Lee Jae-yong on corruption and bribery charges were targeted by a failed cyberattack, announced The Guardian. The group of hackers attacked one of the computers that stored evidence in the corruption investigation, but the attack was blocked early on so no data was compromised. […] read more

St. Jude Takes Steps to Secure Vulnerable Medical Implants

St. Jude Takes Steps to Secure Vulnerable Medical Implants

by Business Insights , on 17.01.2017

Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here. read more

Victorian Game Management Authority leaks data of 60,000 customers, blames human error

Victorian Game Management Authority leaks data of 60,000 customers, blames human error

by Luana PASCU, from HotForSecurity , on 17.01.2017

Something seems amiss in Australia, judging by the growing number of institutions that have accidentally leaked customer databases. Victorian Game Management Authority joins the list after carelessly leaking its customers’ personal data. Due to human error, the information was emailed to eight clients who were renewing their hunting licenses, according to the Department of Environment […] read more

Is your IP security camera making you less secure?

Is your IP security camera making you less secure?

by Graham CLULEY, from HotForSecurity , on 17.01.2017

The Internet of (insecure) Things strikes again, according to a new report by independent testing agency AV-TEST.org, who have been taking a long, hard look at the security of IP cameras, designed to help home owners keep a watchful eye over their property. As I see it, you buy a security camera to secure yourself. […] read more

Largest NHS Trust in UK infected with Trojan

Largest NHS Trust in UK infected with Trojan

by Luana PASCU, from HotForSecurity , on 16.01.2017

The long list of cyberattacks grows as Barts Health computers, the UK’s largest NHS Trust, was hit by a targeted cyberattack that took their systems offline and infected them with Trojan malware last Friday, the organization announced. The attack was immediately detected and the virus quarantined, according to the most recent update. In spite of […] read more

French Authorities Warn of Hacks in Lead-Up to 2017 Elections

French Authorities Warn of Hacks in Lead-Up to 2017 Elections

by Liviu ARSENE, from HotForSecurity , on 16.01.2017

French authorities have warned political parties of potential cyberattacks in the lead-up to the May elections, as the US accuses hackers with Russian ties of being involved in its election process. While the National Agency for the Security of Information Systems (L’Agence nationale de la sécurité des systèmes d’information or ANSSI) refrained from pointing to […] read more

Machine learning to be implemented in 300 million smartphones, Deloitte predicts

Machine learning to be implemented in 300 million smartphones, Deloitte predicts

by Luana PASCU, from HotForSecurity , on 16.01.2017

Every day we see the significant changes technology has delivered to improve our behavior and activity, especially with the proliferation of IoT devices. But 2017 may bring some particularly revolutionary changes, as 300 million smartphones are forecast to have machine learning functions implemented from the early development phase, according to Deloitte’s Technology, Media and Telecommunications […] read more

China Requires Local App Stores to Register with Government

China Requires Local App Stores to Register with Government

by Liviu ARSENE, from HotForSecurity , on 16.01.2017

Local Chinese app stores are required to register with the government to thwart rampant proliferation of Android malware and the dissemination of false information, according to the Cyberspace Administration of China. As Google Play is officially banned in China, all third-party app stores require government vetting starting January 16 in an alleged new baseline for […] read more

New Study Paints a Frightening Picture of the Cyber Security Landscape

New Study Paints a Frightening Picture of the Cyber Security Landscape

by Business Insights , on 13.01.2017

A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and thelegislative community, paints a frightening picture of the information security landscape. read more

CIA Director nominee Rep. Pompeo wants more aggressive surveillance

CIA Director nominee Rep. Pompeo wants more aggressive surveillance

by Luana PASCU, from HotForSecurity , on 13.01.2017

Kansas Republican Mike Pompeo, President-elect Donald Trump’s preferred candidate to become head of the Central Intelligence Agency, revealed in his Senate confirmation hearing his plans for mass surveillance and privacy as part of the country’s counterterrorism efforts. Facing the Senate intelligence committee, Congressman Pompeo said it would be the CIA’s duty to closely monitor all […] read more

Next >>