by Graham CLULEY, from HotForSecurity , on 15.03.2018
MailChimp, a service that millions of people around the world use to send out email newsletters, is being abused by hackers to spam out malware. A typical attack involves hackers either compromising an existing MailChimp account, or setting up a fraudulent account, from which they then spam out scams or links to malicious content. Why [and#8230;] read more
by Business Insights , on 15.03.2018
Organizations already facing a tough time finding cybersecurity talent may find additional cybersecurity headwinds this year as the vast majority (84 percent) of cybersecurity workers say they are on the lookout for new job opportunities. read more
by Filip TRUTA, from HotForSecurity , on 14.03.2018
Calendar apps aren’t exactly the rage, but one developer has managed to squeeze in just enough functionality to get people to pay for it, and even to mine cryptocurrency for the seller in exchange for premium features. It’s the story of Calendar 2, a popular calendar utility created by Qbix, Inc. and distributed through Apple’s [and#8230;] read more
by Business Insights , on 14.03.2018
Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and how quickly they should be notified. In fact, it’s become somewhat of a mess. read more
by Liviu ARSENE, from HotForSecurity , on 14.03.2018
A pair of Russian developers were accused of developing and offering services that allowed malware coders to test their samples against popular security solutions before releasing them in the wild. Arrested in Latvia, Jurijs Martisevs pleaded guilty to a conspiracy charge, as well as to aiding and abetting computer intrusion. The dark web service operated [and#8230;] read more
by Razvan Muresan, from Business Insights , on 13.03.2018
Everyone in IT knows how much the cloud is becoming a central and strategic component of the modern technology infrastructure at many enterprises. Perhaps less well known is the fact that a lot of organizations have pulled workloads back from the cloud—in part because of concerns about data management and security. read more
by Graham CLULEY, from HotForSecurity , on 13.03.2018
Binance, one of the worldand#8217;s biggest cryptocurrency exchanges by trading volume, has offered a reward equivalent to $250,000 to anyone providing information that leads to the arrest of hackers who attacked the platform last week. For two minutes on March 7th, the Binance platform saw abnormal trading activity, which caused automatic protection systems to trigger, [and#8230;] read more
by Cristina POPOV, from IoT Security Insights , on 13.03.2018
If by ”alien” you mean ”extraterrestrial,” better ask NASA. They have been looking for aliens all over space. But have they carefully explored social media? Sometimes the things we are searching everywhere for are nearby, right? It's like you look for your favorite t-shirt all over the house, just to discover it under your bedand#8230; ...
The post CyberQuestions: #3 and#8211; If aliens existed, would they be on Facebook, too? appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 12.03.2018
Canadian researchers from human rights organization Citizen Lab uncovered a major computer espionage operation spreading across Turkey, Egypt and, indirectly, Syria. The operation, which started in 2017, is a nation-state-level network injection to deliver spyware. According to the research, deep packet inspection (DPI) middleboxes, hardware developed by Canadian-American company SandVine, were used by local ISPs [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 12.03.2018
A modern car’s resistance to hacking has been once again tested by security researchers, who have built a device to spy on internal communications and deliver commands to the vehicle. The piece of hardware has GSM support, allowing an attacker to activate available payloads by sending an SMS from anywhere in the world. An automobile ...
The post Hardware Backdoor for Remote Control over Cars appeared first on Bitdefender.