Bodybuilders beware! One of the world’s largest online fitness stores hit by security breach

Bodybuilders beware! One of the world’s largest online fitness stores hit by security breach

by Graham CLULEY, from HotForSecurity , on 24.04.2019

Fitness fanatics are being advised to change their passwords after one of the worldand#8217;s largest and most popular online fitness stores admitted that it had suffered a security breach that might have exposed customer data. Bodybuilding.com says that it first suspected it might have a problem in February 2019 when it hired independent security experts [and#8230;] read more

EternalBlue Still Infecting Endpoints as Businesses Fail to Upgrade Systems or Apply Patches

EternalBlue Still Infecting Endpoints as Businesses Fail to Upgrade Systems or Apply Patches

by Filip Truta, from Business Insights , on 24.04.2019

A dangerous exploit that has helped criminals carry out several major cyber attacks in the past two years continues to infect vulnerable endpoints, new research indicates. read more

What can the IoT be used for?

What can the IoT be used for?

by Ionut ILASCU, from IoT Security Insights , on 24.04.2019

The main idea behind the Internet of Things is to allow objects to observe the physical world and exchange the information they collect to support an action. As the technology evolved, responses to specific patterns became automated, with humans setting up the rules to trigger an action. So, a short and simple answer would be ... The post What can the IoT be used for? appeared first on Bitdefender. read more

Cybercrime victims report $2.71 billion in damages to the IC3 in 2018

Cybercrime victims report $2.71 billion in damages to the IC3 in 2018

by Filip TRUTA, from HotForSecurity , on 23.04.2019

The Internet Crime Complaint Center (IC3), a cybercrime-focused division of the US Federal Bureau of Investigation (FBI), registered over 350,000 complaints of suspected Internet crime in 2018 that cost the complainants upwards of $2.7 billion. The report details the most damaging threats targeting both companies and the general public. For example, Business Email Compromise (BEC) [and#8230;] read more

Teen Sues Apple for $1 Billion, Saying Facial Recognition Mistook Him for a Thief

Teen Sues Apple for $1 Billion, Saying Facial Recognition Mistook Him for a Thief

by Luana PASCU, from HotForSecurity , on 23.04.2019

An 18-year-old student from New York is suing Apple for $1 billion, claiming he was wrongfully accused of stealing gadgets from a number of Apple stores in Boston, Manhattan, New Jersey and Delaware last year, writes The New York Post. Ousmane Bah says the company’s facial recognition technology misidentified him after his ID was lost. [and#8230;] read more

Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

by Business Insights , on 23.04.2019

Could critical infrastructure attacks be making a comeback? Or did these invisible threats never leave in the first place? Extensive research reveals that as many as four threat actors many have been involved in creating Stuxnet, the sophisticated computer worm that demolished Iran’s nuclear infrastructure in 2007. In light of recent discoveries about similarities in malware samples, cyberespionage appears to be a growing threat that can hide for years before its discovered. read more

IoT Adopters Still Concerned about Deployment and Security in Their Ecosystem

IoT Adopters Still Concerned about Deployment and Security in Their Ecosystem

by Business Insights , on 22.04.2019

Private users are not the only ones excited about IoT technology and gadgets in everyday activity the countless growth opportunities in the area. A number of companies, organizations and even public institutions have turned to connected devices to build more sustainable, automated infrastructures, but device reliability, data security delivery and privacy still must still be addressed. read more

Ransomware Takes Weather Channel Live Broadcast Offline

Ransomware Takes Weather Channel Live Broadcast Offline

by Luana PASCU, from HotForSecurity , on 22.04.2019

The FBI is investigating a ransomware attack that shut down the Weather Channel’s program for an hour on Thursday, according toand#160;Theand#160;Wall Street Journal. The early morning live broadcast was interrupted for some 90 minutes, forcing the cable channel to resort to a taped program. The Weather Channel confirmed in a tweet that it fell victim [and#8230;] read more

Hacker Exposes Confidential Files, Correspondence from Mexican Embassy in Guatemala

Hacker Exposes Confidential Files, Correspondence from Mexican Embassy in Guatemala

by Luana PASCU, from HotForSecurity , on 22.04.2019

After expressing anger that his bug bounty efforts were completely ignored by Mexican officials, a hackers stole and leaked online almost 5,000 confidential documents from the Mexican embassy in Guatemala, writes TechCrunch. The data trove contained critical personal information of Mexican citizens and diplomats, including photocopies of passports, birth certificates, visas, payment cards and information [and#8230;] read more

AI and Automation Seen as Silver Bullet in Overcoming Cybersecurity Skill Gap, Survey Finds

AI and Automation Seen as Silver Bullet in Overcoming Cybersecurity Skill Gap, Survey Finds

by Business Insights , on 19.04.2019

There’s been a lot of focus lately on the best ways to safeguard corporate networks and fend off targeted attacks, and on total cost of ownership. But CISOs worldwide are struggling with an even worse problem that greatly affects their companies long-term: a widening cybersecurity talent shortage. read more

Next >>