Learn from Mona about the dangerous life of smart devices

Learn from Mona about the dangerous life of smart devices

by Bitdefender Team, from IoT Security Insights , on 27.04.2017

It may be just a baby monitor, but it's a smart baby monitor (that is, connected to the internet) and#8212; and you can rely on it for a whole lot of tasks. First and foremost, it helps you keep an eye on your child, even when you are in a different room, or away from ... The post Learn from Mona about the dangerous life of smart devices appeared first on Bitdefender. read more

Stealth Bomber maker admits hackers stole workers’ W-2 tax forms

Stealth Bomber maker admits hackers stole workers’ W-2 tax forms

by Graham CLULEY, from HotForSecurity , on 26.04.2017

US military contractor Northrop Grumman has admitted that hackers managed to infiltrate its systems, and gained access to sensitive employee records. As The Register reports, the makers of America’s stealth bomber acknowledged in a letter sent to employees and the California Attorney General’s office that hackers infiltrated its online portal at various times over the […] read more

Power Grid Must be a High Priority When it Comes to Cyber Security

Power Grid Must be a High Priority When it Comes to Cyber Security

by Business Insights , on 26.04.2017

Few industries impact as many people and businesses around the world as the power and utilities sector. Virtually everyone relies on electricity on a daily basis, and to go without power can be a major hardship. Just ask anyone who has experienced an outage. From a business standpoint, a loss of power even for a few hours can deal a significant blow to operations. read more

Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

by Luana PASCU, from HotForSecurity , on 26.04.2017

As many as 84% of English patients trust traditional healthcare providers with the security of their medical data, even though 1 in every 8 has had medical data stolen, according to a survey by Accenture. Meanwhile, only 59 percent of respondents said they trust cybersecurity measures adopted by the government, and just 42 percent believe […] read more

How the CIA Could Eavesdrop on a Samsung TV

How the CIA Could Eavesdrop on a Samsung TV

by Ionut ILASCU, from IoT Security Insights , on 26.04.2017

One device common to all modern homes is the smart TV. Apart from the WiFi connectivity specific to smart things, this gadget often comes with a built-in webcam and a microphone, for video calls or voice commands. These capabilities are what attackers want to control, for purposes ranging from sneaking inside the home network to ... The post How the CIA Could Eavesdrop on a Samsung TV appeared first on Bitdefender. read more

Google Strikes Back at Ransomware with Android 8.O

Google Strikes Back at Ransomware with Android 8.O

by Filip TRUTA, from HotForSecurity , on 25.04.2017

Google is adding an important extra layer of security in its all-new Android operating system. Android 8.0, to be unveiled at the company’s I/O conference next month, will be better at fending off ransomware – the #1 malware threat targeting Android users. For two years, Google has been trying hard to thwart ransomware attacks on […] read more

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

by Liviu Arsene, from Business Insights , on 25.04.2017

Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates. read more

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

by Graham CLULEY, from HotForSecurity , on 25.04.2017

Blackmailers are once again trying to make money out of the notorious Ashley Madison hack, which exposed the details of registered members of the cheating website in 2015. Robin Harris writes on ZDNet that he has received a blackmail threat, alerting him that unless he pays up $500 worth of Bitcoin his personal details will […] read more

Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

by Ionut ILASCU, from IoT Security Insights , on 25.04.2017

Security vulnerabilities in multiple Linksys router models can be exploited to extract sensitive information about their network ecosystem, knock users offline or take complete control over them. Affected devices puts are estimated to number 7,000, but these are only the units with their administrative panel exposed to the Internet. Tao Sauvage, a researcher at security ... The post Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info appeared first on Bitdefender. read more

Businesses falling short when it comes to cybersecurity, says Government report

Businesses falling short when it comes to cybersecurity, says Government report

by Graham Cluley, from Business Insights , on 24.04.2017

A "sizable proportion" of businesses have still not put in place basic protection and policies to protect themselves from attack. read more

Next >>