Giuliani and 13 Trump cabinet officials hacked

Giuliani and 13 Trump cabinet officials hacked

by Luana PASCU, from HotForSecurity , on 20.01.2017

“They did a very poor job,” US President Donald Trump said of Democrat cyber security measures. “They could’ve had hacking defense, which we had.” Yet it seems the Republican strategy is not so good either, as the recently named Cyber Security Advisor to Trump, Rudy Giuliani, along with 13 other White House appointees, have just […] read more

Security on the Road: Automotive Industry Needs to Make Cyber Security a Top Priority

Security on the Road: Automotive Industry Needs to Make Cyber Security a Top Priority

by Razvan Muresan, from Business Insights , on 20.01.2017

Not too long ago, most people probably couldn’t imagine their automobiles being vulnerable to cyber security threats such as hacking. But with the rapid growth of connected objects of all types as part of the Internet of Things (IoT)—including vehicles—these concerns have become a distinct possibility. read more

Data of 3,400 California gun instructors leaked in clerical error

Data of 3,400 California gun instructors leaked in clerical error

by Luana PASCU, from HotForSecurity , on 20.01.2017

Personal data of 3,424 gun safety instructors in California was leaked due to an administrative error of the California Department of Justice last year, announced Fox News. When a journalist from the Southern California Public Radio (KPCC) made a Freedom of Information request in August, he accidentally received dates of birth, driver’s license numbers and […] read more

Mobile and IoT application security not a priority, study finds

Mobile and IoT application security not a priority, study finds

by Luana PASCU, from HotForSecurity , on 19.01.2017

Despite widespread concern about the security of mobile and IoT applications, companies apparently remain oblivious to the risks, as most still haven’t implemented a proper security strategy, says a recent report from the Ponemon Institute based on 593 interviews with IT and application security professionals. In spite of poor mobilization throughout organizations, 58 percent of […] read more

Employees reported as highest security risk, research shows

Employees reported as highest security risk, research shows

by Luana PASCU, from HotForSecurity , on 18.01.2017

Top executives have reported growth in fraud, cyber and security incidents in 2016, Kroll’s 2016/2017 global fraud and risk report says. Cyber events have become most prevalent of the three, with 85 percent confirming an episode in the past year. Some 33 percent of companies examined experienced a virus or worm infection, while 26 percent […] read more

One in five companies will replace physical access cards with smartphones by 2020, Gartner predicts

One in five companies will replace physical access cards with smartphones by 2020, Gartner predicts

by Razvan Muresan, from Business Insights , on 18.01.2017

Some 20 percent of organizations will use smartphones instead of physical access cards by 2020, according to a report by advisory company Gartner. read more

White hackers to seek errors in open-source cybersecurity framework for cars

White hackers to seek errors in open-source cybersecurity framework for cars

by Luana PASCU, from HotForSecurity , on 18.01.2017

Researchers from NYU Tandon, the University of Michigan Transport Research Institute (UMTRI), and the Southwest Research Institute (SwRI) have launched a challenge to all white hackers and security experts: find vulnerabilities before implementation of Uptane, the most recent open source cybersecurity framework for the automotive industry. Uptane is “the first software update framework for automobiles […] read more

If you’re going to use Windows, it makes security sense to use Windows 10

If you’re going to use Windows, it makes security sense to use Windows 10

by Graham CLULEY, from HotForSecurity , on 18.01.2017

Zero-day vulnerabilities, the software security holes that malicious hackers can exploit to control your computer and steal your data before a patch has been created, have been one of the key weapons in the arsenal of online criminals for years. When a zero-day flaw that is being actively exploited is uncovered or publicly disclosed the […] read more

Hackers target prosecutors in South Korean corruption scandal

Hackers target prosecutors in South Korean corruption scandal

by Luana PASCU, from HotForSecurity , on 17.01.2017

Prosecutors investigating South Korean President Park Geun-hye and Samsung Electronics Vice Chairman Lee Jae-yong on corruption and bribery charges were targeted by a failed cyberattack, announced The Guardian. The group of hackers attacked one of the computers that stored evidence in the corruption investigation, but the attack was blocked early on so no data was compromised. […] read more

St. Jude Takes Steps to Secure Vulnerable Medical Implants

St. Jude Takes Steps to Secure Vulnerable Medical Implants

by Business Insights , on 17.01.2017

Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here. read more

Next >>