Mobile and IoT application security not a priority, study finds

Mobile and IoT application security not a priority, study finds

by Luana PASCU, from HotForSecurity , on 19.01.2017

Despite widespread concern about the security of mobile and IoT applications, companies apparently remain oblivious to the risks, as most still haven’t implemented a proper security strategy, says a recent report from the Ponemon Institute based on 593 interviews with IT and application security professionals. In spite of poor mobilization throughout organizations, 58 percent of […] read more

Employees reported as highest security risk, research shows

Employees reported as highest security risk, research shows

by Luana PASCU, from HotForSecurity , on 18.01.2017

Top executives have reported growth in fraud, cyber and security incidents in 2016, Kroll’s 2016/2017 global fraud and risk report says. Cyber events have become most prevalent of the three, with 85 percent confirming an episode in the past year. Some 33 percent of companies examined experienced a virus or worm infection, while 26 percent […] read more

One in five companies will replace physical access cards with smartphones by 2020, Gartner predicts

One in five companies will replace physical access cards with smartphones by 2020, Gartner predicts

by Razvan Muresan, from Business Insights , on 18.01.2017

Some 20 percent of organizations will use smartphones instead of physical access cards by 2020, according to a report by advisory company Gartner. read more

White hackers to seek errors in open-source cybersecurity framework for cars

White hackers to seek errors in open-source cybersecurity framework for cars

by Luana PASCU, from HotForSecurity , on 18.01.2017

Researchers from NYU Tandon, the University of Michigan Transport Research Institute (UMTRI), and the Southwest Research Institute (SwRI) have launched a challenge to all white hackers and security experts: find vulnerabilities before implementation of Uptane, the most recent open source cybersecurity framework for the automotive industry. Uptane is “the first software update framework for automobiles […] read more

If you’re going to use Windows, it makes security sense to use Windows 10

If you’re going to use Windows, it makes security sense to use Windows 10

by Graham CLULEY, from HotForSecurity , on 18.01.2017

Zero-day vulnerabilities, the software security holes that malicious hackers can exploit to control your computer and steal your data before a patch has been created, have been one of the key weapons in the arsenal of online criminals for years. When a zero-day flaw that is being actively exploited is uncovered or publicly disclosed the […] read more

Hackers target prosecutors in South Korean corruption scandal

Hackers target prosecutors in South Korean corruption scandal

by Luana PASCU, from HotForSecurity , on 17.01.2017

Prosecutors investigating South Korean President Park Geun-hye and Samsung Electronics Vice Chairman Lee Jae-yong on corruption and bribery charges were targeted by a failed cyberattack, announced The Guardian. The group of hackers attacked one of the computers that stored evidence in the corruption investigation, but the attack was blocked early on so no data was compromised. […] read more

St. Jude Takes Steps to Secure Vulnerable Medical Implants

St. Jude Takes Steps to Secure Vulnerable Medical Implants

by Business Insights , on 17.01.2017

Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here. read more

Victorian Game Management Authority leaks data of 60,000 customers, blames human error

Victorian Game Management Authority leaks data of 60,000 customers, blames human error

by Luana PASCU, from HotForSecurity , on 17.01.2017

Something seems amiss in Australia, judging by the growing number of institutions that have accidentally leaked customer databases. Victorian Game Management Authority joins the list after carelessly leaking its customers’ personal data. Due to human error, the information was emailed to eight clients who were renewing their hunting licenses, according to the Department of Environment […] read more

Is your IP security camera making you less secure?

Is your IP security camera making you less secure?

by Graham CLULEY, from HotForSecurity , on 17.01.2017

The Internet of (insecure) Things strikes again, according to a new report by independent testing agency AV-TEST.org, who have been taking a long, hard look at the security of IP cameras, designed to help home owners keep a watchful eye over their property. As I see it, you buy a security camera to secure yourself. […] read more

Largest NHS Trust in UK infected with Trojan

Largest NHS Trust in UK infected with Trojan

by Luana PASCU, from HotForSecurity , on 16.01.2017

The long list of cyberattacks grows as Barts Health computers, the UK’s largest NHS Trust, was hit by a targeted cyberattack that took their systems offline and infected them with Trojan malware last Friday, the organization announced. The attack was immediately detected and the virus quarantined, according to the most recent update. In spite of […] read more

Next >>