Aircraft Component Maker ASCO Hit by Ransomware, Shuts Down Global Production

Aircraft Component Maker ASCO Hit by Ransomware, Shuts Down Global Production

by Luana PASCU, from HotForSecurity , on 14.06.2019

Belgian company ASCO Industries, a key leader in manufacturing components for both civilian and military planes, fell victim to a ransomware attack on June 7 that shut down production around the world, writes ZDNet. With all IT systems incapacitated, some 1,000 of 1,400 employees were sent home. “Employees of the Asco company in Zaventem are [and#8230;] read more

In Incident Response, Speed Is Everything

In Incident Response, Speed Is Everything

by Filip Truta, from Business Insights , on 14.06.2019

Data breaches, a rare occurrence not too long ago, have become the norm, forcing enterprises worldwide to adopt a paranoid posture with regards to the likelihood of disruption and loss of business. read more

Data Sharing and Collection Practices Lead Users to Feel Smart Devices Are ‘Creepy,’ Survey Finds

Data Sharing and Collection Practices Lead Users to Feel Smart Devices Are ‘Creepy,’ Survey Finds

by Luana PASCU, from IoT Security Insights , on 13.06.2019

Data privacy and security issues increase consumers’ lack of trust in smart devices. More than half of consumers think the data collection process used by connected devices makes them “creepy” and 75 percent don’t trust the way their data is handled and possibly shared with third parties, according to a survey conducted by Ipsos MORI ... The post Data Sharing and Collection Practices Lead Users to Feel Smart Devices Are ‘Creepy,’ Survey Finds appeared first on Bitdefender. read more

Incident Response Is the Weakest Link in the Threat-Handling Chain, Study Shows

Incident Response Is the Weakest Link in the Threat-Handling Chain, Study Shows

by Filip Truta, from Business Insights , on 12.06.2019

Faced with a growing army of cyber criminals constantly after their data, businesses are investing heavily in new technology and professionals to close the cybersecurity gap. While this sounds promising, most organizations are making very slow progress towards cyber resilience. read more

La Liga fined €250,000 after Android app spied on football fans

La Liga fined €250,000 after Android app spied on football fans

by Graham CLULEY, from HotForSecurity , on 12.06.2019

The Spanish football league La Liga has been hit with a fine of 250,000 euros (approximately US $280,000) after its official Android app was found to be sneakily listening to peopleand#8217;s surroundings when soccer matches were being played. According to reports, audio recorded through the Android smartphoneand#8217;s microphone was combined with GPS location data in [and#8230;] read more

Ransomware attack paralyses Lake City email, landlines and credit card services

Ransomware attack paralyses Lake City email, landlines and credit card services

by Filip TRUTA, from HotForSecurity , on 12.06.2019

Lake City and#160;has warned citizens that administrative systems, including email and credit card systems, are down following a ransomware attack on the Florida municipality. The attack, called “Triple Threat” in a press release issued by the city, reportedly combined three attack vectors to infect government endpoints, crippling the city’s administrative email systems, as well as [and#8230;] read more

You Ask We Answer 9. How does IoT work?

You Ask We Answer 9. How does IoT work?

by Ionut ILASCU, from IoT Security Insights , on 12.06.2019

Internet-of-Things devices are small electronic systems that act automatically for the benefit of the user. To achieve their goal, they rely on distinct components, each responsible for specific parts of the job: from collecting ground data to interpreting it for making the right call. The process of automating an action starts with sensors and#8211; the ... The post You Ask We Answer 9. How does IoT work? appeared first on Bitdefender. read more

Radiohead Releases Music Online Instead of Giving in to Blackmailer Demands

Radiohead Releases Music Online Instead of Giving in to Blackmailer Demands

by Luana PASCU, from HotForSecurity , on 12.06.2019

Radiohead was breached but, instead of paying ransom, the English rock band decided to release a collection of 18 hours of unheard music on Bandcamp for charity, the band’s guitarist Jonny Greenwood announced on Twitter on Tuesday. According to Greenwood, someone “stole Tom’s [York] minidisk archive from around the time of OK Computer” – an [and#8230;] read more

Cyberattack Compromises US Customs and Border Protection Photo Database

Cyberattack Compromises US Customs and Border Protection Photo Database

by Luana PASCU, from HotForSecurity , on 11.06.2019

Photos of people crossing the US border, taken over a month and a half, including images of their faces and vehicle numbers, were compromised in a malware attack on a subcontractor working with the US Customs and Border Protection (CBP), writes the Washington Post. The agency was alerted to the data breach on May 31, [and#8230;] read more

UK Tax Department Investigated over 2.6 Million Phishing Attacks in Three Years

UK Tax Department Investigated over 2.6 Million Phishing Attacks in Three Years

by Luana PASCU, from HotForSecurity , on 10.06.2019

UK’s HMRC (Her Majestyand#8217;s Revenue and Customs) has been investigating taxpayer complaints about a surge in phishing attacks. After implementing DMARC for extra email protection in 2016, the tax collection service intercepted and blocked 300 million phishing emails, Infosecurity reports. According to a report from UK think tank Parliament Street, the country’s taxpayers are still [and#8230;] read more

Next >>