Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info

by Ionut ILASCU, from IoT Security Insights , on 25.04.2017

Security vulnerabilities in multiple Linksys router models can be exploited to extract sensitive information about their network ecosystem, knock users offline or take complete control over them. Affected devices puts are estimated to number 7,000, but these are only the units with their administrative panel exposed to the Internet. Tao Sauvage, a researcher at security ... The post Linksys Routers Vulnerable to Invisible Backdoor Accounts, Reveal Sensitive Internal Info appeared first on Bitdefender. read more

Businesses falling short when it comes to cybersecurity, says Government report

Businesses falling short when it comes to cybersecurity, says Government report

by Graham Cluley, from Business Insights , on 24.04.2017

A "sizable proportion" of businesses have still not put in place basic protection and policies to protect themselves from attack. read more

Baidu Open Sources Its Autonomous Driving Technology

Baidu Open Sources Its Autonomous Driving Technology

by Ionut ILASCU, from IoT Security Insights , on 21.04.2017

Baidu has announced that its new platform for building autonomous driving systems will be open sourced. Apart from driving progress in this segment, the move could improve defenses against interference from outside the car network. Apollo, the new project from the Chinese web services company, integrates all the components partners need to create their own ... The post Baidu Open Sources Its Autonomous Driving Technology appeared first on Bitdefender. read more

CISOs can’t prioritize threats; breaches go unaddressed, survey says

CISOs can’t prioritize threats; breaches go unaddressed, survey says

by Luana PASCU, from HotForSecurity , on 21.04.2017

Considering the complex mix of advanced threats, sponsored attacks and other risks facing companies, CISOs face a tough battle in keeping their enterprises safe from breaches. CISOs are overwhelmed by the increased in data breaches and few can keep up with the flurries of attacks on their organizations, according to a recent survey of 300 […] read more

Could behavioral biometrics eradicate online fraud?

Could behavioral biometrics eradicate online fraud?

by Business Insights , on 21.04.2017

Some sixpercent of Europeans per day use credit cards online, mostly to buy clothes and shoes, according to Masterindex statistics. Although more and more consumers show interest in online payments, they worry about fraud, which could slow down ecommerce globally. read more

Lawsuit Claims Bose Snoops on Users, Passes Data to Third Parties

Lawsuit Claims Bose Snoops on Users, Passes Data to Third Parties

by Filip TRUTA, from HotForSecurity , on 20.04.2017

Audio electronics giant Bose faces data mining charges over accusations that it has been covertly collecting its customers’ personal information, including tastes in music and podcasts, in cooperation with a San Francisco-based aggregator. A class action suit filed in Chicago on Tuesday claims Bose has been “secretly collecting, transmitting, and disclosing its customers’ private music and […] read more

Artificial intelligence algorithm predicts heart attacks and strokes

Artificial intelligence algorithm predicts heart attacks and strokes

by Luana PASCU, from HotForSecurity , on 20.04.2017

Even doctors can’t tell the future. But recent developments in artificial intelligence say technology might just solve that problem, at least in terms of health. Will artificial intelligence replace physicians? Maybe. For now, it predicts when a person will suffer a heart attack or stroke, as long as five years beforehand, says BBC News. To […] read more

Hypervisor Introspection defeated Eternalblue a priori

Hypervisor Introspection defeated Eternalblue a priori

by Business Insights , on 20.04.2017

Last Friday (April 14, 2017), just before Easter, an egg was laid by The Shadow Brokers, a group that hopped into the spotlight in mid-2016. This time, the group dropped an especially colorful release, in the form of Eternalblue. read more

Researchers Use Bluetooth to Stop Engine of Moving Car

Researchers Use Bluetooth to Stop Engine of Moving Car

by Ionut ILASCU, from IoT Security Insights , on 20.04.2017

Security researchers have identified issues in the Bosch on-board diagnostics (OBD) dongle and associated mobile app that would allow an attacker to stop the engine of a moving vehicle. They also reported the increased possibility that an attacker could send random instructions to physically affect the car and its passengers. Bosch Drivelog, a car management ... The post Researchers Use Bluetooth to Stop Engine of Moving Car appeared first on Bitdefender. read more

Oracle’s Solaris Gets 299 Security Fixes, Including One for NSA’s Solaris 10 Hijacking Tool

Oracle’s Solaris Gets 299 Security Fixes, Including One for NSA’s Solaris 10 Hijacking Tool

by Liviu ARSENE, from HotForSecurity , on 20.04.2017

Described as a Critical Patch Update (CPU), Oracle has released a cumulative patch addressing 299 security issues in Solaris, including one in Oracle 10 to which the NSA allegedly had a hijacking tool. The privilege escalation vulnerability believed to be exploited by the NSA tool targeted the Common Desktop Environment on Solaris 10. While Oracle’s […] read more

Next >>