Seller of hijacked camera in Colorado adds extra protection

Seller of hijacked camera in Colorado adds extra protection

by Luana PASCU, from IoT Security Insights , on 29.03.2017

Smart home devices are now more accessible than ever, and with them the security flaws. Surveillance cameras have dropped in price, as have IoT sensors used in industrial devices, making them more affordable to the regular homeowner. Once purchased, connected devices are linked to the home network and to each other. And all these devices ... The post Seller of hijacked camera in Colorado adds extra protection appeared first on Bitdefender. read more

Connected Dishwasher Has Security Smudge That Doesn’t Come Off

Connected Dishwasher Has Security Smudge That Doesn’t Come Off

by Ionut ILASCU, from IoT Security Insights , on 29.03.2017

A network-connected dishwasher from German manufacturer Miele has been found to harbor a security vulnerability that would allow an unauthenticated attacker access to system files. The issue is now public and no fix is known, since the company failed to engage in a responsible vulnerability disclosure process with the researcher who found the bug. Jens ... The post Connected Dishwasher Has Security Smudge That Doesn’t Come Off appeared first on Bitdefender. read more

Data of 3.7 million Hong Kong registered voters stolen

Data of 3.7 million Hong Kong registered voters stolen

by Luana PASCU, from HotForSecurity , on 28.03.2017

Carrie Lam Cheng Yuet-ngor has won the election for Hong Kong Chief Executive this Sunday, but this is not the historical event everyone in the region is talking about. Hong Kong is dealing with one of its biggest data breaches to date, involving the theft of sensitive personal information of 3.7 million registered voters, according […] read more

86 Percent Increase in Data Breaches in 2016 Led to 1.4 Billion Data Record Compromised

86 Percent Increase in Data Breaches in 2016 Led to 1.4 Billion Data Record Compromised

by Liviu Arsene, from Business Insights , on 28.03.2017

More than 1.4 billion data records are estimated to have been compromised in 2016 as a direct result of data breaches, spawning an 86 percent increase compared to 2015, according to a Gemalto’s Breach Level Index. With organizations continuously being targeted by cybercriminals either with sophisticated advanced threats or through infrastructure vulnerabilities, the main driver behind these attacks is often related to financial gains or gratification. read more

Cybercriminals Target Healthcare Anonymous FTP Servers, Says FBI

Cybercriminals Target Healthcare Anonymous FTP Servers, Says FBI

by Liviu ARSENE, from HotForSecurity , on 28.03.2017

The Federal Bureau of Investigation (FBI) has warned the healthcare industry that cybercriminals are actively scoping FTP servers that allow for “anonymous” remote connection, to steal protected health information (PHI) and personally identifiable information (PII). The FBI says it is aware of such attacks specifically involving medical and dental facilities, and that cybercriminals will intimidate, […] read more

Users leak sensitive data via Microsoft document-sharing site

Users leak sensitive data via Microsoft document-sharing site

by Graham CLULEY, from HotForSecurity , on 27.03.2017

“Think before you click!” That’s advice we’ve often shared to computer users to help protect them against dodgy links and malware-infected email attachments, but those aren’t the only times when you should take a few seconds to consider what you’re about to do when your finger is hovering over your mouse button. Take for instance, […] read more

Here Come Software-Defined Data Centers - What are the Security Implications?

Here Come Software-Defined Data Centers - What are the Security Implications?

by Business Insights , on 27.03.2017

For many enterprises, the software-defined data canter (SDDC) is the IT infrastructure of the future. And for innovative organizations it’s the data center of the present. Either way, SDDC offers a number of compelling potential benefits compared with traditional data center environments, such as reduced costs and greater agility. read more

UK government demands backdoors in end-to-end encryption

UK government demands backdoors in end-to-end encryption

by Luana PASCU, from HotForSecurity , on 27.03.2017

UK’s Home Secretary Amber Rudd is meeting with tech firms on Thursday to persuade them to cooperate in creating backdoors in end-to-end encryption of instant messaging tools for law enforcement to intercept private communication between terrorists. Rudd is so far displeased with their efforts and wants them to assume responsibility for terrorist situations, according to […] read more

Security is not a design requirement despite industry, government warnings

Security is not a design requirement despite industry, government warnings

by Luana PASCU, from IoT Security Insights , on 27.03.2017

Manufacturers are going out of their way to come up with the most innovative, fanciest gadgets to satisfy consumers' dreams, so why haven't they joined the security trend to develop devices that are safe to use and won't cause havoc? The US Department of Homeland Security has stepped up, announcing guidelines for manufacturers to produce ... The post Security is not a design requirement despite industry, government warnings appeared first on Bitdefender. read more

IoT apps and analytics to automate Brooklyn life

IoT apps and analytics to automate Brooklyn life

by Luana PASCU, from IoT Security Insights , on 27.03.2017

Brooklyn is New York's first borough to set up the Neighborhood Innovation Lab in Brownsville with the help of private-public partnerships. Brooklyn residents will now benefit from the wonders of IoT applications and analytics to live a better, more connected life. This is not a premiere; San Diego, Chicago, Sydney, Sweden, and India are only ... The post IoT apps and analytics to automate Brooklyn life appeared first on Bitdefender. read more

Next >>