by Business Insights , on 18.01.2019
2020 will bring the end of Windows 7, following Microsoft’s announcement that it will no longer offer support and updates for the operating system starting January 14, 2020. But companies appear to have had a good run with it and are not yet ready to say goodbye, a Kollective survey of 1,000 US and UK enterprise IT professionals has found. read more
by Luana PASCU, from IoT Security Insights , on 17.01.2019
The easygoing approach most companies take to data security and protection doesn’t influence the connected world or IoT investments. This year, IDC research predicts IoT spending will reach $745 billion thanks to the rapid advance of internet connectivity. But, to make the most of IoT deployment, companies need to change their perspective and focus on ...
The post Businesses Believe Blockchain Will Save the Day in IoT Security, Gemalto Found appeared first on Bitdefender.
by Filip Truta, from Business Insights , on 17.01.2019
The cost of attack mitigation is ascending, and so it the number of organizations under attack. Between 2018 and 2019, most organizations have experienced some type of attack, and only 7% have experienced no attack at all, according to new research. read more
by Cristina POPOV, from IoT Security Insights , on 17.01.2019
What is it? Houseparty is a social media app that allows group video chatting. It lets groups of two to eight people communicate through live video. Once logged in, a user will be instantly connected with Facebook friends using the app at the same time. Users can initiate a chat or, if friends are already ...
The post What parents need to know about Houseparty appeared first on Bitdefender.
by Filip TRUTA, from HotForSecurity , on 16.01.2019
The US Securities and Exchange Commission (SEC) has charged nine defendants in connection with a scheme to hack into SEC systems and profit from corporate information not yet released to the public. The defendants, a Ukrainian hacker, six traders in California, Ukraine and Russia, and two entities, allegedly participated in a scheme to hack into [and#8230;] read more
by Razvan Muresan, from Business Insights , on 16.01.2019
Some 71% of CISOs rank data security and compliance as the most important factor when choosing where to put their application workloads, according to a recent survey by Nutanix. read more
by Filip TRUTA, from IoT Security Insights , on 15.01.2019
Two incidents involving smart cars in less than a week should give prospective buyers something to think about: a server-side blunder prevented Nissan EV owners from accessing key vehicle functionality while a Tesla on autopilot allegedly hit an innocent robot on the street. Nissan EV app password reset Nissan’s UK arm migrated user data to ...
The post Smart cars veer into controversy again as Nissan spooks hacker-wary EV owners and a Tesla allegedly hits innocent robot [VIDEO] appeared first on Bitdefender.
by Filip TRUTA, from HotForSecurity , on 15.01.2019
A cryptocurrency exchange in New Zealand is suspected of having performed an exit scam after bluntly announcing an immediate halt due to an alleged hack. The first signs of trouble emerged on the afternoon of January 14, when Cryptopia announced on its Twitter page that the exchange was going through unscheduled maintenance. “We are currently [and#8230;] read more
by Luana PASCU, from HotForSecurity , on 15.01.2019
A California court has ruled that government agencies can’t compel suspects to unlock their smart devices with biometric authentication because it violates the self-incrimination clause in the Fifth Amendment, writes Forbes. This applies even if a warrant has been granted to search the person’s residence. The decision was made after law enforcement filed for a [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 15.01.2019
The business of compromising Internet-of-Things devices has moved to a new stage, where using default credentials to brute-force the access on the gadget is no longer the only method of attack. Crooks have started to use exploits for known security flaws affecting smart products. Vulnerabilities are now part of the mix, with cybercriminals hurling exploits ...
The post Hackers start probing your smart device minutes after you connect it appeared first on Bitdefender.