Authorities Can’t Force Suspects to Unlock Phones with Biometrics, Rules California Court

Authorities Can’t Force Suspects to Unlock Phones with Biometrics, Rules California Court

by Luana PASCU, from HotForSecurity , on 15.01.2019

A California court has ruled that government agencies can’t compel suspects to unlock their smart devices with biometric authentication because it violates the self-incrimination clause in the Fifth Amendment, writes Forbes. This applies even if a warrant has been granted to search the person’s residence. The decision was made after law enforcement filed for a [and#8230;] read more

Huge prizes up for grabs for anyone who can hack a Tesla

Huge prizes up for grabs for anyone who can hack a Tesla

by Graham CLULEY, from HotForSecurity , on 15.01.2019

If youand#8217;re going to the CanSecWest conference in Vancouver this March youand#8217;ll have the chance to participate in the Pwn2Own ethical hacking contest. As usual hackers will be working hard to crack the security of browsers and operating systems from Apple, Microsoft, Google, Mozilla, Oracle and VMware. But this things are a little different. Because [and#8230;] read more

Many Companies Lack CISOs amid Steeper Compliance Demands

Many Companies Lack CISOs amid Steeper Compliance Demands

by Filip Truta, from Business Insights , on 15.01.2019

Does your business include cyber and privacy management in digital transformation "fully from the start"? Are you comfortable with your reporting on metrics for cyber and privacy risk management? These are among the key questions consulting firm PwC wants businesses to answer in 2019. read more

What parents need to know about Live.me

What parents need to know about Live.me

by Cristina POPOV, from IoT Security Insights , on 15.01.2019

What is it? Live.me is a social platform (app and website) that allows its mainly young users to broadcast or watch live videos. Feeds can feature everything from dancing and yoga to singing and gaming. The viewers can post comments, interact with people in the video and send them virtual gifts they can buy in-app. ... The post What parents need to know about Live.me appeared first on Bitdefender. read more

British Hacker-for-Hire Goes to Prison for Liberian Telecom, Deutsche Telekom Mirai Attack

British Hacker-for-Hire Goes to Prison for Liberian Telecom, Deutsche Telekom Mirai Attack

by Luana PASCU, from HotForSecurity , on 14.01.2019

The British professional hacker behind the 2016 Mirai attack on Lonestar, Liberia’s largest telecom company, was sentenced to two years and eight months in prison, announced the UK National Crime Agency. Daniel Kaye, also known as and#8220;BestBuyand#8221; and and#8220;Spiderman,and#8221; was arrested in 2017 in the UK on a European Arrest Warrant, and confessed in December [and#8230;] read more

Fraudsters increasingly turning to Fuze cards to evade police

Fraudsters increasingly turning to Fuze cards to evade police

by Filip TRUTA, from HotForSecurity , on 14.01.2019

Street thieves who specialize in cashing out stolen credit and debit cards are increasingly using Fuze cards to conduct fraud and theft, the U.S. Secret Service has warned in a memo to companies in the financial sector. Fraud rings use Fuze cards to avoid suspicions that could arise by carrying dozens of cards when attempting [and#8230;] read more

The DDoS attacker rescued by a Disney cruise ship is sentenced to over 10 years in prison

The DDoS attacker rescued by a Disney cruise ship is sentenced to over 10 years in prison

by Graham CLULEY, from HotForSecurity , on 14.01.2019

A 34-year old man has been sentenced to more than 10 years in prison, after being found guilty of launching a massive denial-of-service attack against Boston Childrenand#8217;s Hospital. The sentencing of Martin Gottesfeld, from Somerville, Massachusetts, comes almost three years after he attempted to escape to Cuba and#8211; a plan that failed after his speedboat [and#8230;] read more

Container Security Incidents to Rise in 2019 as Companies Knowingly Deploy Vulnerable Containers

Container Security Incidents to Rise in 2019 as Companies Knowingly Deploy Vulnerable Containers

by Business Insights , on 14.01.2019

The popularity of container technology has grown fast in software engineering, but 60 percent of organizations suffered at least one container-related security incident in 2018, mostly caused by the advancement of DevOps teams, according to Tripwire’s State of Container Security Report. 71 percent anticipate an increase in container security incidents in 2019, most likely raising the costs of hybrid cloud security. read more

How to secure your cloud file storage with 5 simple tricks

How to secure your cloud file storage with 5 simple tricks

by Filip TRUTA, from HotForSecurity , on 11.01.2019

File hosting / cloud storage services today are a dime a dozen. Players in this vertical constantly top each other with free storage offerings, business features, and custom plans, all designed to cater to every possible audience. But they all have one thing in common: the cloud. Cloud storage is somewhat of a double-edged sword: [and#8230;] read more

RCPCH guide: 4 questions to help parents manage screen time within the family

RCPCH guide: 4 questions to help parents manage screen time within the family

by Cristina POPOV, from IoT Security Insights , on 11.01.2019

What are your screen time resolutions for the new year? The first guide on the health impacts of screen time, made by the Royal College of Paediatrics and Child Health UK (RCPCH), brings screen time into the news. Although there is no compelling evidence yet that screen time is harmful itself, the guide suggests that ... The post RCPCH guide: 4 questions to help parents manage screen time within the family appeared first on Bitdefender. read more

Next >>