by Silviu STAHIE, from IoT Security Insights , on 13.08.2020
England is giving contact tracing apps another try. The jointly developed Google – Apple framework is the base for the new software solution. Contact-tracing apps should have been the perfect opportunity for the IoT industry to shine. It turns out, though, that having a working solution, software or hardware, to use in the tracing process ...
The post Official Contact Tracing App in England to Use Google – Apple Framework appeared first on Bitdefender.
by Silviu Stahie, from Business Insights , on 13.08.2020
Parental Control is something that parents will eventually come to consider when their children start to interact with technology and the online world. Not only can ISPs help with that, but ISPs should consider offering extra features to its customers to stay ahead of the competition. read more
by Business Insights , on 13.08.2020
Cyber security and data loss prevention dominate the daily concerns of local and county government technology leaders, according to a survey report by the Computing Technology Industry Association (CompTIA) and the Public Technology Institute (PTI). read more
by Silviu STAHIE, from IoT Security Insights , on 12.08.2020
The August Smart Lock won't let people through the door, but a skilled hacker can find out the victim's Wi-Fi password. Physical privacy is protected, but people's digital lives are exposed. Smart locks are a great addition to personal security, as they free people from the burden of carrying keys. The hospitality industry is also ...
The post August Smart Lock Keeps Your House Safe But Not Your Wi-Fi Password appeared first on Bitdefender.
by Silviu Stahie, from Business Insights , on 12.08.2020
Business email compromise (BEC) attacks tend to arrive from similar sources, affecting different companies. Barracuda's latest report reveals that 45 percent of all BEC attacks detected since April 1 come from malicious accounts. read more
by Silviu STAHIE, from IoT Security Insights , on 11.08.2020
A security researcher found that a couple of P2P protocols used by millions of IoT devices around the world have quite a few vulnerabilities that would allow attackers to intercept traffic, spy on video streams and more. One way that IoT devices communicate with their servers and with their users is through peer-to-peer protocols. While ...
The post Millions of Cameras Using P2P Protocols Are Now Exposed to Hackers appeared first on Bitdefender.
by Business Insights , on 11.08.2020
Offensive security measures like penetration testing can help enterprises discover the common vulnerabilities and exploitable weaknesses that could put an them at risk of costly cybersecurity incidents. By pitting white hat hackers against an organization's deployed infrastructure, organizations can gain a better understanding of the flaws they should fix first—namely the ones most likely to be targeted by an everyday criminal. read more
by Silviu STAHIE, from IoT Security Insights , on 10.08.2020
Google Home should only listen when users speak the activation words. Users reported that their smart assistants started to pick up and register various sounds in people’s homes, wrongly, as smoke alarms. Smart speakers, powered by smart assistants, slowly become the norm. People tend to forget they are around, ready to answer and record. Google, ...
The post Smoke Alarm Detection Enabled By Mistake in Google Home Devices appeared first on Bitdefender.
by Alina Bizga, from Business Insights , on 10.08.2020
Cloud breaches continue to riddle organizations’ threat landscape, with misconfigured cloud storage services and poor security practices leading to more than 200 breaches in the past two years, according to the latest Accurics report. read more
by Alina Daniela BIZGA, from IoT Security Insights , on 07.08.2020
Botnets powered by high-wattage IoT devices such as ovens, hot-water heaters, air-conditioners, and other appliances could be hijacked to manipulate energy demand, and potentially inflict financial damage on deregulated energy markets, a new report warns. Researchers from the Georgia Institute of Technology imagined an energy market manipulation cyberattack by turning compromised high-wattage IoT equipment on ...
The post High-Wattage IoT Botnets Could Manipulate and Damage Energy Markets, New Research Shows appeared first on Bitdefender.