Hyundai Patches App against Info Exposure of User and Car

Hyundai Patches App against Info Exposure of User and Car

by Ionut ILASCU, from IoT Security Insights , on 28.04.2017

The latest update for Hyundai's Blue Link mobile vehicle management app fixes a couple of vulnerabilities that could have let a remote attacker track, unlock and start a car paired with the software. Versions affected by the issues are 3.9.4 and 3.9.5, which included a log transmission feature. Remote services offered through the Blue Link ... The post Hyundai Patches App against Info Exposure of User and Car appeared first on Bitdefender. read more

APTs and zero-days among top security concerns for IT pros, Bitdefender survey shows

APTs and zero-days among top security concerns for IT pros, Bitdefender survey shows

by Business Insights , on 27.04.2017

Advanced persistent threats (APTs) have once again made it into the spotlight with the latest cyberattacks associated with APT28, also known as Fancy Bear or Sofacy. The Kremlin-sponsored hacking group behind the Democratic Party breach scandal, the attacks against NATO or those on French TV network TV5 is now shifting attention towards Europe. Earlier this week the campaign of Emmanuel Macron, favorite to become France's next president, was allegedly targeted by the same cyber espionage group. read more

Learn from Mona about the dangerous life of smart devices

Learn from Mona about the dangerous life of smart devices

by Bitdefender Team, from IoT Security Insights , on 27.04.2017

It may be just a baby monitor, but it's a smart baby monitor (that is, connected to the internet) and#8212; and you can rely on it for a whole lot of tasks. First and foremost, it helps you keep an eye on your child, even when you are in a different room, or away from ... The post Learn from Mona about the dangerous life of smart devices appeared first on Bitdefender. read more

Stealth Bomber maker admits hackers stole workers’ W-2 tax forms

Stealth Bomber maker admits hackers stole workers’ W-2 tax forms

by Graham CLULEY, from HotForSecurity , on 26.04.2017

US military contractor Northrop Grumman has admitted that hackers managed to infiltrate its systems, and gained access to sensitive employee records. As The Register reports, the makers of America’s stealth bomber acknowledged in a letter sent to employees and the California Attorney General’s office that hackers infiltrated its online portal at various times over the […] read more

Power Grid Must be a High Priority When it Comes to Cyber Security

Power Grid Must be a High Priority When it Comes to Cyber Security

by Business Insights , on 26.04.2017

Few industries impact as many people and businesses around the world as the power and utilities sector. Virtually everyone relies on electricity on a daily basis, and to go without power can be a major hardship. Just ask anyone who has experienced an outage. From a business standpoint, a loss of power even for a few hours can deal a significant blow to operations. read more

Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

Patients trust doctors more than government, tech companies with their medical data, Accenture survey finds

by Luana PASCU, from HotForSecurity , on 26.04.2017

As many as 84% of English patients trust traditional healthcare providers with the security of their medical data, even though 1 in every 8 has had medical data stolen, according to a survey by Accenture. Meanwhile, only 59 percent of respondents said they trust cybersecurity measures adopted by the government, and just 42 percent believe […] read more

How the CIA Could Eavesdrop on a Samsung TV

How the CIA Could Eavesdrop on a Samsung TV

by Ionut ILASCU, from IoT Security Insights , on 26.04.2017

One device common to all modern homes is the smart TV. Apart from the WiFi connectivity specific to smart things, this gadget often comes with a built-in webcam and a microphone, for video calls or voice commands. These capabilities are what attackers want to control, for purposes ranging from sneaking inside the home network to ... The post How the CIA Could Eavesdrop on a Samsung TV appeared first on Bitdefender. read more

Google Strikes Back at Ransomware with Android 8.O

Google Strikes Back at Ransomware with Android 8.O

by Filip TRUTA, from HotForSecurity , on 25.04.2017

Google is adding an important extra layer of security in its all-new Android operating system. Android 8.0, to be unveiled at the company’s I/O conference next month, will be better at fending off ransomware – the #1 malware threat targeting Android users. For two years, Google has been trying hard to thwart ransomware attacks on […] read more

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

DevOps Practices Mature as Certificate Security Policies Remain Relaxed

by Liviu Arsene, from Business Insights , on 25.04.2017

Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates. read more

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up

by Graham CLULEY, from HotForSecurity , on 25.04.2017

Blackmailers are once again trying to make money out of the notorious Ashley Madison hack, which exposed the details of registered members of the cheating website in 2015. Robin Harris writes on ZDNet that he has received a blackmail threat, alerting him that unless he pays up $500 worth of Bitcoin his personal details will […] read more

Next >>