Reintroduced U.S. Bill Promises Improved Cybersecurity Standards for Cars and Aircraft

Reintroduced U.S. Bill Promises Improved Cybersecurity Standards for Cars and Aircraft

by Liviu ARSENE, from HotForSecurity , on 23.03.2017

U.S. Senator Edward J. Markey, who pointed in a 2014 report to major gaps in the security of connected features within cars, reintroduced legislation promising cybersecurity standards to address those challenges. The Security and Privacy in Your Car (SPY Car) Act aims to not inform the driver of the cybersecurity and privacy status of the […] read more

$100 Million Phishing Scam Lands Lithuanian Man in Prison

$100 Million Phishing Scam Lands Lithuanian Man in Prison

by Liviu ARSENE, from HotForSecurity , on 23.03.2017

A 48 year-old Lithuanian man was arrested for carrying out a sophisticated phishing scam on two multinational companies, which landed him more than $100 million in banking transactions. The scam involved tricking the two companies into thinking he was representing a legitimate hardware manufacturer in Asia and convincing them to wire money into accounts he […] read more

Detecting Attack Techniques Trumps Traditional Endpoint Security

Detecting Attack Techniques Trumps Traditional Endpoint Security

by Business Insights , on 22.03.2017

Recent surveys have revealed that 34 percent of companies have been breached in the past 12 months alone, with 74 percent of IT decision makers claiming they have little to no clue as to how the breach occurred. read more

Saks Fifth Avenue hit by hackers, exposes customer data

Saks Fifth Avenue hit by hackers, exposes customer data

by Luana PASCU, from HotForSecurity , on 21.03.2017

Dumb security mistakes on online shops enabled hackers to recently claim more victims in the fashion retail sector, including luxury department store Saks Fifth Avenue, Gilt and Lord and Taylor, according to BuzzFeed News. Personal data of “tens of thousands” of Saks Fifth Avenue customers was publicly exposed online due to weak encryption and because […] read more

Hackers claim they will wipe iPhones and iCloud accounts unless Apple pays ransom

Hackers claim they will wipe iPhones and iCloud accounts unless Apple pays ransom

by Graham CLULEY, from HotForSecurity , on 21.03.2017

A group of hackers are allegedly threatening to remotely wipe millions of iPhones and iCloud accounts, unless Apple agrees to pay a ransom by April 7th. As Motherboard reports, the hackers – who are calling themselves the “Turkish Crime Family” – are demanding Apple pay a ransom of $75,000 (in either the Bitcoin or Ethereum […] read more

IoT, biometrics revolutionizing the global payments industry

IoT, biometrics revolutionizing the global payments industry

by Luana PASCU, from HotForSecurity , on 21.03.2017

How many times have you paid with your phone — NFC for tap-and-go services, scanning QR codes on your electricity bill or paying via SMS? Industry giants are working on shifting to digital, and IoT innovation is helping them. For now, retail is the industry most focused on implementing mobile payments. They get immediate results […] read more

Remote Code Execution Vulnerability Affecting 318 Cisco Switches

Remote Code Execution Vulnerability Affecting 318 Cisco Switches

by Liviu ARSENE, from HotForSecurity , on 21.03.2017

Following the WikiLeaks massive Vault 7 data leak, a new critical remote code vulnerability affecting 318 Cisco Systems switches has been revealed. While the data leak allegedly comes from the CIA, the vulnerability is very real, and Cisco has already issued an advisory for it. The vulnerability involves the Cisco Cluster Management Protocol (CMP) that […] read more

Germans worried hackers will target parliamentary elections

Germans worried hackers will target parliamentary elections

by Luana PASCU, from HotForSecurity , on 20.03.2017

The next German parliamentary elections are on September 24 and, while most are interested in whether Angela Merkel will still be Chancellor, a German cybersecurity watchdog warns of possible cyberattacks meant to interfere with the outcome of the elections. “We are noticing attacks against government networks on a daily basis,” Arne Schoenbohm, president of the […] read more

Stop shifting the blame onto third parties. That breach is still your firm’s responsibility

Stop shifting the blame onto third parties. That breach is still your firm’s responsibility

by Graham Cluley, from Business Insights , on 20.03.2017

If it’s data that your customers gave you that’s breached, it’s your responsibility. read more

Real estate experts: Protect your smart home with Bitdefender BOX

Real estate experts: Protect your smart home with Bitdefender BOX

by Alex Ulmanu, from IoT Security Insights , on 17.03.2017

Making your smart home hack-proof is no easy task and#8212; but, according to high-end real estate magazine Mansion Global there has never been a greater need for solutions to protect your household against spies of all kinds. Besides keeping your devices up-to-date, regularly changing your passwords, using multi-factor authentication when possible and keeping IoT gadgets ... The post Real estate experts: Protect your smart home with Bitdefender BOX appeared first on Bitdefender. read more

Next >>