by Silviu Stahie, from Business Insights , on 12.08.2020
Business email compromise (BEC) attacks tend to arrive from similar sources, affecting different companies. Barracuda's latest report reveals that 45 percent of all BEC attacks detected since April 1 come from malicious accounts. read more
by Business Insights , on 11.08.2020
Offensive security measures like penetration testing can help enterprises discover the common vulnerabilities and exploitable weaknesses that could put an them at risk of costly cybersecurity incidents. By pitting white hat hackers against an organization's deployed infrastructure, organizations can gain a better understanding of the flaws they should fix first—namely the ones most likely to be targeted by an everyday criminal. read more
by Alina Bizga, from Business Insights , on 07.08.2020
The August 2020 edition of the Netskope Cloud and Threat Report highlights a 161% increase in visits to high-risk apps and sites brought on by a 64% remote workforce. read more
by Alina Bizga, from Business Insights , on 06.08.2020
Nearly three quarters of large businesses are convinced that the shift to remote work makes them more vulnerable to cyberattacks, a new ATandT survey has revealed. read more
by Alina Bizga, from Business Insights , on 05.08.2020
According to a report published by Reboot Digital, one in five business owners would consider sabotaging an online competitor if they knew they could get away with it. read more
by Business Insights , on 05.08.2020
Even in the COVID era, August can't officially start for the cybersecurity community without Black Hat USA researchers offering up some juicy exploit announcements and dropping useful security tools onto GitHub. This year's event is fully virtual, which means no rockin' Vegas parties—but still plenty of interesting research lined up. read more
by Filip Truta, from Business Insights , on 04.08.2020
A growing divide in breach costs separates businesses that implement advanced security technologies from laggards, according to a new report. read more
by Silviu STAHIE, from IoT Security Insights , on 11.08.2020
A security researcher found that a couple of P2P protocols used by millions of IoT devices around the world have quite a few vulnerabilities that would allow attackers to intercept traffic, spy on video streams and more. One way that IoT devices communicate with their servers and with their users is through peer-to-peer protocols. While ...
The post Millions of Cameras Using P2P Protocols Are Now Exposed to Hackers appeared first on Bitdefender.
by Silviu STAHIE, from IoT Security Insights , on 10.08.2020
Google Home should only listen when users speak the activation words. Users reported that their smart assistants started to pick up and register various sounds in people’s homes, wrongly, as smoke alarms. Smart speakers, powered by smart assistants, slowly become the norm. People tend to forget they are around, ready to answer and record. Google, ...
The post Smoke Alarm Detection Enabled By Mistake in Google Home Devices appeared first on Bitdefender.
by Alina Bizga, from Business Insights , on 10.08.2020
Cloud breaches continue to riddle organizations’ threat landscape, with misconfigured cloud storage services and poor security practices leading to more than 200 breaches in the past two years, according to the latest Accurics report. read more