Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

by Luana PASCU, from HotForSecurity , on 26.04.2017

As many as 84% of English patients trust traditional healthcare providers with the security of their medical data, even though 1 in every 8 has had medical data stolen, according to a survey by Accenture. Meanwhile, only 59 percent of respondents said they trust cybersecurity measures adopted by the government, and just 42 percent believe […] read more

How the CIA Could Eavesdrop on a Samsung TV

How the CIA Could Eavesdrop on a Samsung TV

by Ionut ILASCU, from IoT Security Insights , on 26.04.2017

One device common to all modern homes is the smart TV. Apart from the WiFi connectivity specific to smart things, this gadget often comes with a built-in webcam and a microphone, for video calls or voice commands. These capabilities are what attackers want to control, for purposes ranging from sneaking inside the home network to ... The post How the CIA Could Eavesdrop on a Samsung TV appeared first on Bitdefender. read more

Google Strikes Back at Ransomware with Android 8.O

Google Strikes Back at Ransomware with Android 8.O

by Filip TRUTA, from HotForSecurity , on 25.04.2017

Google is adding an important extra layer of security in its all-new Android operating system. Android 8.0, to be unveiled at the company’s I/O conference next month, will be better at fending off ransomware – the #1 malware threat targeting Android users. For two years, Google has been trying hard to thwart ransomware attacks on […] read more

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

by Liviu Arsene, from Business Insights , on 25.04.2017

Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates. read more

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

by Graham CLULEY, from HotForSecurity , on 25.04.2017

Blackmailers are once again trying to make money out of the notorious Ashley Madison hack, which exposed the details of registered members of the cheating website in 2015. Robin Harris writes on ZDNet that he has received a blackmail threat, alerting him that unless he pays up $500 worth of Bitcoin his personal details will […] read more

Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

by Ionut ILASCU, from IoT Security Insights , on 25.04.2017

Security vulnerabilities in multiple Linksys router models can be exploited to extract sensitive information about their network ecosystem, knock users offline or take complete control over them. Affected devices puts are estimated to number 7,000, but these are only the units with their administrative panel exposed to the Internet. Tao Sauvage, a researcher at security ... The post Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info appeared first on Bitdefender. read more

Businesses falling short when it comes to cybersecurity, says Government report

Businesses falling short when it comes to cybersecurity, says Government report

by Graham Cluley, from Business Insights , on 24.04.2017

A "sizable proportion" of businesses have still not put in place basic protection and policies to protect themselves from attack. read more

Baidu Open Sources Its Autonomous Driving Technology

Baidu Open Sources Its Autonomous Driving Technology

by Ionut ILASCU, from IoT Security Insights , on 21.04.2017

Baidu has announced that its new platform for building autonomous driving systems will be open sourced. Apart from driving progress in this segment, the move could improve defenses against interference from outside the car network. Apollo, the new project from the Chinese web services company, integrates all the components partners need to create their own ... The post Baidu Open Sources Its Autonomous Driving Technology appeared first on Bitdefender. read more

CISOs can’t prioritize threats; breaches go unaddressed, survey says

CISOs can’t prioritize threats; breaches go unaddressed, survey says

by Luana PASCU, from HotForSecurity , on 21.04.2017

Considering the complex mix of advanced threats, sponsored attacks and other risks facing companies, CISOs face a tough battle in keeping their enterprises safe from breaches. CISOs are overwhelmed by the increased in data breaches and few can keep up with the flurries of attacks on their organizations, according to a recent survey of 300 […] read more

Could behavioral biometrics eradicate online fraud?

Could behavioral biometrics eradicate online fraud?

by Business Insights , on 21.04.2017

Some sixpercent of Europeans per day use credit cards online, mostly to buy clothes and shoes, according to Masterindex statistics. Although more and more consumers show interest in online payments, they worry about fraud, which could slow down ecommerce globally. read more

Next >>