Official Contact Tracing App in England to Use Google – Apple Framework

Official Contact Tracing App in England to Use Google – Apple Framework

by Silviu STAHIE, from IoT Security Insights , on 13.08.2020

England is giving contact tracing apps another try. The jointly developed Google – Apple framework is the base for the new software solution. Contact-tracing apps should have been the perfect opportunity for the IoT industry to shine. It turns out, though, that having a working solution, software or hardware, to use in the tracing process ... The post Official Contact Tracing App in England to Use Google – Apple Framework appeared first on Bitdefender. read more

ISPs Should Offer Network Parental Controls and Customers Should Demand It

ISPs Should Offer Network Parental Controls and Customers Should Demand It

by Silviu Stahie, from Business Insights , on 13.08.2020

Parental Control is something that parents will eventually come to consider when their children start to interact with technology and the online world. Not only can ISPs help with that, but ISPs should consider offering extra features to its customers to stay ahead of the competition. read more

Cyber Security a Big Concern of Local and County Government Technology Leaders

Cyber Security a Big Concern of Local and County Government Technology Leaders

by Business Insights , on 13.08.2020

Cyber security and data loss prevention dominate the daily concerns of local and county government technology leaders, according to a survey report by the Computing Technology Industry Association (CompTIA) and the Public Technology Institute (PTI). read more

August Smart Lock Keeps Your House Safe But Not Your Wi-Fi Password

August Smart Lock Keeps Your House Safe But Not Your Wi-Fi Password

by Silviu STAHIE, from IoT Security Insights , on 12.08.2020

The August Smart Lock won't let people through the door, but a skilled hacker can find out the victim's Wi-Fi password. Physical privacy is protected, but people's digital lives are exposed. Smart locks are a great addition to personal security, as they free people from the burden of carrying keys. The hospitality industry is also ... The post August Smart Lock Keeps Your House Safe But Not Your Wi-Fi Password appeared first on Bitdefender. read more

Most BEC Attacks Come from a Small Pool of Malicious Accounts, Study Finds

Most BEC Attacks Come from a Small Pool of Malicious Accounts, Study Finds

by Silviu Stahie, from Business Insights , on 12.08.2020

Business email compromise (BEC) attacks tend to arrive from similar sources, affecting different companies. Barracuda's latest report reveals that 45 percent of all BEC attacks detected since April 1 come from malicious accounts. read more

Millions of Cameras Using P2P Protocols Are Now Exposed to Hackers

Millions of Cameras Using P2P Protocols Are Now Exposed to Hackers

by Silviu STAHIE, from IoT Security Insights , on 11.08.2020

A security researcher found that a couple of P2P protocols used by millions of IoT devices around the world have quite a few vulnerabilities that would allow attackers to intercept traffic, spy on video streams and more. One way that IoT devices communicate with their servers and with their users is through peer-to-peer protocols. While ... The post Millions of Cameras Using P2P Protocols Are Now Exposed to Hackers appeared first on Bitdefender. read more

12 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level

12 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level

by Business Insights , on 11.08.2020

Offensive security measures like penetration testing can help enterprises discover the common vulnerabilities and exploitable weaknesses that could put an them at risk of costly cybersecurity incidents. By pitting white hat hackers against an organization's deployed infrastructure, organizations can gain a better understanding of the flaws they should fix first—namely the ones most likely to be targeted by an everyday criminal. read more

Smoke Alarm Detection Enabled By Mistake in Google Home Devices

Smoke Alarm Detection Enabled By Mistake in Google Home Devices

by Silviu STAHIE, from IoT Security Insights , on 10.08.2020

Google Home should only listen when users speak the activation words. Users reported that their smart assistants started to pick up and register various sounds in people’s homes, wrongly, as smoke alarms. Smart speakers, powered by smart assistants, slowly become the norm. People tend to forget they are around, ready to answer and record. Google, ... The post Smoke Alarm Detection Enabled By Mistake in Google Home Devices appeared first on Bitdefender. read more

Cloud Breaches to Become Faster and Bigger, Research Suggests

Cloud Breaches to Become Faster and Bigger, Research Suggests

by Alina Bizga, from Business Insights , on 10.08.2020

Cloud breaches continue to riddle organizations’ threat landscape, with misconfigured cloud storage services and poor security practices leading to more than 200 breaches in the past two years, according to the latest Accurics report. read more

High-Wattage IoT Botnets Could Manipulate and Damage Energy Markets, New Research Shows

High-Wattage IoT Botnets Could Manipulate and Damage Energy Markets, New Research Shows

by Alina Daniela BIZGA, from IoT Security Insights , on 07.08.2020

Botnets powered by high-wattage IoT devices such as ovens, hot-water heaters, air-conditioners, and other appliances could be hijacked to manipulate energy demand, and potentially inflict financial damage on deregulated energy markets, a new report warns. Researchers from the Georgia Institute of Technology imagined an energy market manipulation cyberattack by turning compromised high-wattage IoT equipment on ... The post High-Wattage IoT Botnets Could Manipulate and Damage Energy Markets, New Research Shows appeared first on Bitdefender. read more

Next >>