by Graham CLULEY, from HotForSecurity , on 14.11.2018
Has someone been trying to hack into a large number of Apple ID accounts? Thatand#8217;s one of the theories circulating after a significant number of iPhone owners woke up on Tuesday to discover that their handsets were displaying a message saying that their Apple ID had been locked. All the indications are that Apple locked [and#8230;] read more
by Filip TRUTA, from HotForSecurity , on 14.11.2018
Fake cryptocurrency wallets continue to creep their way into Google’s application store for Android aficionados, as one researcher has recently discovered. Using his personal website, independent researcher Lukas Stefanko sounds the alarm over four new fake cryptocurrency wallets that trick users either into giving away their credentials, or impersonate legitimate cryptocurrency wallets. “These threats imitate [and#8230;] read more
by Business Insights , on 14.11.2018
Enterprise software is drowning in vulnerabilities and even organizations highly motivated to fix security flaws in their applications struggle to do it in a timely fashion. read more
by Filip TRUȚĂ, from Bitdefender Labs , on 13.11.2018
Russia expects relations with the United States to remain tense, according to one of Vladimir Putin’s spokesmen who publicly shrugged at the US midterm election results. “There is no rosy outlook for normalizing Russian-American relations on the horizon,” Dmitry Peskov, President Vladimir Putin’s spokesman, told reporters last week. “It can hardly happen that they will […] read more
by Filip TRUTA, from IoT Security Insights , on 13.11.2018
While the United Kingdom is urging Internet of Things (IoT) vendors to design products with security in mind, the United States currently doesn’t have a rulebook for such endeavors. But that doesn’t mean no talking heads are raising the question of cybersecurity in the IoT realm state-side. Smart gadgets – from home appliances to enterprise ...
The post Cybersecurity expert Bruce Schneier calls on U.S. to regulate IoT landscape appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 13.11.2018
A lack of trust in the mainstream media has led to dissemination of a large amount of false digital information on social networks, but in India it appears things have taken a turn for the worst, according to BBC researchers. The acute spread of fake news via groups on WhatsApp, one of the most popular [and#8230;] read more
by Bitdefender Team, from IoT Security Insights , on 13.11.2018
A host of new features and improvements, including IP reservations, the ability to create a guest network, cyberbullying detection, better network speed and many more have made Bitdefender BOX 2 better in the past year — and we are thanking users for all of it. At Bitdefender, technology serves people, and we have heard our ...
The post User suggestions and feedback have made BOX 2 better appeared first on Bitdefender.
by Razvan Muresan, from Business Insights , on 13.11.2018
Many people might tend to associate security breaches and malware attacks with large enterprises. After all, the attacks that grab the big headlines generally occur against global companies or large governmental organizations. read more
by Luana PASCU, from HotForSecurity , on 12.11.2018
Huntsville Hospital in Alabama announced that the personal data of job applicants may have been compromised after a security incident at the recruitment platform they collaborate with. Social Security numbers of thousands of people may have been leaked online. Detailed information has not been released, but applicants that may have fallen victim are contacted and [and#8230;] read more
by Luana PASCU, from IoT Security Insights , on 12.11.2018
The privacy pitfalls of smart speakers, these small Trojan horses in your home, could turn out to be life savers. Their increase in popularity has raised a number of security concerns around consumers, as they have proven vulnerable repeatedly. As odd as it may be, though, their eavesdropping and audio recording features could even solve ...
The post Amazon must release Echo audio files linked to murder case, judge rules appeared first on Bitdefender.