Climbing the Privilege Ladder Comes with Serious Risks

Climbing the Privilege Ladder Comes with Serious Risks

by Ionut ILASCU, from IoT Security Insights , on 23.10.2017

You may think you are in full control of the connected devices on your home network, but this is not always the case. IoT gadgets come with multiples levels of access that grant rights for specific actions. Hackers know that, after they breach a smart product, they may need a higher clearance to run their ... The post Climbing the Privilege Ladder Comes with Serious Risks appeared first on Bitdefender. read more

Found a flaw in a popular Android app? Google might give you $1000

Found a flaw in a popular Android app? Google might give you $1000

by Graham CLULEY, from HotForSecurity , on 21.10.2017

Google has announced a new bug bounty program that aims to uncover security holes in high-profile Android apps. Perhaps surprisingly, however, the apps that Google wants you to examine for vulnerabilities as part of its and#8220;Google Play Security Reward Programand#8221; are not just their own creations in the official Android app store, but also those [and#8230;] read more

Research: 52% of UK shoppers believe online fraud is inevitable

Research: 52% of UK shoppers believe online fraud is inevitable

by Filip TRUTA, from HotForSecurity , on 20.10.2017

New research conducted by a payments provider suggests the British are increasingly educating themselves in security matters, and rapidly so, with the GDPR around the corner and Brexit also not too far off. The UK is making notable strivings in aligning itself with new rules and regulations taking effect next year. And if a recent [and#8230;] read more

University of Kansas student used keylogger to change grades

University of Kansas student used keylogger to change grades

by Luana PASCU, from HotForSecurity , on 20.10.2017

University of Kansas is the latest victim of a cybersecurity breach which may lead to further problems in the higher education sector. University of Kansas professors are concerned their data may be at risk, after an engineering student used a keylogger to change his failing grades to straight A’s, after stealing their login credentials to [and#8230;] read more

European home automation market to reach $806.1 million by 2022, report says

European home automation market to reach $806.1 million by 2022, report says

by Luana PASCU, from IoT Security Insights , on 20.10.2017

Consumers are showing increased interest in implementing smart sensors to control and automate lighting, heating, air conditioning systems, electrical home appliances, entertainment systems and cars, all devices part of the IoT umbrella. Usually, these devices are connected to a gateway controlled through an interface and WI-FI that exposes them to a number of risks. The ... The post European home automation market to reach $806.1 million by 2022, report says appeared first on Bitdefender. read more

Fully autonomous smart tech can kill us, researchers warn

Fully autonomous smart tech can kill us, researchers warn

by Filip TRUTA, from IoT Security Insights , on 20.10.2017

In a bid to “promote good security practices, and understand vulnerability risk,” the Carnegie-Mellon University's Software Engineering Institute has conducted a study to look at the potential threats posed by autonomous transport systems, machine learning and smart devices in general. Their forecast is not good. The Emerging Technology Domains Risk Survey is at its third ... The post Fully autonomous smart tech can kill us, researchers warn appeared first on Bitdefender. read more

South Africans exposed; 30 million unique records leaked

South Africans exposed; 30 million unique records leaked

by Luana PASCU, from HotForSecurity , on 19.10.2017

A data leak exposed more than 30 million unique personal records of South Africans following an alleged breach that took place around May 2017, according to an investigation by security researcher Troy Hunt. Hunt received a 27GB file that, he believes, “is definitely floating around between traders.” Based on the headers published on Pastebin, the [and#8230;] read more

Here’s Some Good News: Investment in Cyber Security Technology Continues to Rise

Here’s Some Good News: Investment in Cyber Security Technology Continues to Rise

by Razvan Muresan, from Business Insights , on 19.10.2017

It seems as though CISOs and CSOs are constantly battling with challenges, whether it’s newly discovered threats and vulnerabilities, growing demand for cyber security skills and not enough qualified people to deliver them, complaints from business users about disruptive security tools, or some other issue, read more

How to protect yourself from the ‘KRACK’ Wi-Fi attack

How to protect yourself from the ‘KRACK’ Wi-Fi attack

by Filip TRUTA, from HotForSecurity , on 18.10.2017

Earlier this week, a researcher from the University of Leuven discovered a critical flaw in the WPA2 wireless communication standard that leaves all Wi-Fi-connected devices vulnerable to attacks. Now, we will lay out simple steps users can take to mitigate risk until the Wi-Fi Alliance comes up with a fix. As we wrote yesterday, researcher [and#8230;] read more

The ABC of Cybersecurity – Android Threats: S is for Spyware

The ABC of Cybersecurity – Android Threats: S is for Spyware

by Liviu ARSENE, from HotForSecurity , on 18.10.2017

With more than 2 billion active Android devices in the world, Google’s mobile OS is easily one of the most popular. With users actively using their mobile devices in all aspects of their personal lives and business activities, a lot of information is stored and managed by these Android devices. Consequently, cybercriminals have shifted their [and#8230;] read more

Next >>