Is your IP security camera making you less secure?

Is your IP security camera making you less secure?

by Graham CLULEY, from HotForSecurity , on 17.01.2017

The Internet of (insecure) Things strikes again, according to a new report by independent testing agency AV-TEST.org, who have been taking a long, hard look at the security of IP cameras, designed to help home owners keep a watchful eye over their property. As I see it, you buy a security camera to secure yourself. […] read more

Largest NHS Trust in UK infected with Trojan

Largest NHS Trust in UK infected with Trojan

by Luana PASCU, from HotForSecurity , on 16.01.2017

The long list of cyberattacks grows as Barts Health computers, the UK’s largest NHS Trust, was hit by a targeted cyberattack that took their systems offline and infected them with Trojan malware last Friday, the organization announced. The attack was immediately detected and the virus quarantined, according to the most recent update. In spite of […] read more

French Authorities Warn of Hacks in Lead-Up to 2017 Elections

French Authorities Warn of Hacks in Lead-Up to 2017 Elections

by Liviu ARSENE, from HotForSecurity , on 16.01.2017

French authorities have warned political parties of potential cyberattacks in the lead-up to the May elections, as the US accuses hackers with Russian ties of being involved in its election process. While the National Agency for the Security of Information Systems (L’Agence nationale de la sécurité des systèmes d’information or ANSSI) refrained from pointing to […] read more

Machine learning to be implemented in 300 million smartphones, Deloitte predicts

Machine learning to be implemented in 300 million smartphones, Deloitte predicts

by Luana PASCU, from HotForSecurity , on 16.01.2017

Every day we see the significant changes technology has delivered to improve our behavior and activity, especially with the proliferation of IoT devices. But 2017 may bring some particularly revolutionary changes, as 300 million smartphones are forecast to have machine learning functions implemented from the early development phase, according to Deloitte’s Technology, Media and Telecommunications […] read more

China Requires Local App Stores to Register with Government

China Requires Local App Stores to Register with Government

by Liviu ARSENE, from HotForSecurity , on 16.01.2017

Local Chinese app stores are required to register with the government to thwart rampant proliferation of Android malware and the dissemination of false information, according to the Cyberspace Administration of China. As Google Play is officially banned in China, all third-party app stores require government vetting starting January 16 in an alleged new baseline for […] read more

New Study Paints a Frightening Picture of the Cyber Security Landscape

New Study Paints a Frightening Picture of the Cyber Security Landscape

by Business Insights , on 13.01.2017

A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and thelegislative community, paints a frightening picture of the information security landscape. read more

CIA Director nominee Rep. Pompeo wants more aggressive surveillance

CIA Director nominee Rep. Pompeo wants more aggressive surveillance

by Luana PASCU, from HotForSecurity , on 13.01.2017

Kansas Republican Mike Pompeo, President-elect Donald Trump’s preferred candidate to become head of the Central Intelligence Agency, revealed in his Senate confirmation hearing his plans for mass surveillance and privacy as part of the country’s counterterrorism efforts. Facing the Senate intelligence committee, Congressman Pompeo said it would be the CIA’s duty to closely monitor all […] read more

How patented machine-learning boosts ransomware detection and prevents businesses from being encrypted

How patented machine-learning boosts ransomware detection and prevents businesses from being encrypted

by Razvan Muresan, from Business Insights , on 12.01.2017

Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads. read more

Scammers target Amazon buyers through compromised vendor accounts

Scammers target Amazon buyers through compromised vendor accounts

by Luana PASCU, from HotForSecurity , on 12.01.2017

Amazon customers beware: fraudsters have been targeting Amazon shoppers by creating seller accounts or taking control of genuine vendors to trick users into purchasing expensive items at unrealistically low prices. An over £2,000, 55-inch LG OLED TV was on sale for half its price and labeled as a “used-like new” article by a vendor called […] read more

Yahoo email scanning explanations rejected by EU

Yahoo email scanning explanations rejected by EU

by Luana PASCU, from HotForSecurity , on 12.01.2017

Explanations given by the United States government to the European Commission about the secret court order asking Yahoo to scan all incoming emails to gather intelligence were rejected for failing to meet expectations, Reuters reported. In an exclusive news report, Reuters announced that the US government in October last year asked Yahoo to search all […] read more

Next >>