by Graham CLULEY, from HotForSecurity , on 21.10.2017
Google has announced a new bug bounty program that aims to uncover security holes in high-profile Android apps. Perhaps surprisingly, however, the apps that Google wants you to examine for vulnerabilities as part of its and#8220;Google Play Security Reward Programand#8221; are not just their own creations in the official Android app store, but also those [and#8230;] read more
by Filip TRUTA, from HotForSecurity , on 20.10.2017
New research conducted by a payments provider suggests the British are increasingly educating themselves in security matters, and rapidly so, with the GDPR around the corner and Brexit also not too far off. The UK is making notable strivings in aligning itself with new rules and regulations taking effect next year. And if a recent [and#8230;] read more
by Luana PASCU, from HotForSecurity , on 20.10.2017
University of Kansas is the latest victim of a cybersecurity breach which may lead to further problems in the higher education sector. University of Kansas professors are concerned their data may be at risk, after an engineering student used a keylogger to change his failing grades to straight A’s, after stealing their login credentials to [and#8230;] read more
by Luana PASCU, from IoT Security Insights , on 20.10.2017
Consumers are showing increased interest in implementing smart sensors to control and automate lighting, heating, air conditioning systems, electrical home appliances, entertainment systems and cars, all devices part of the IoT umbrella. Usually, these devices are connected to a gateway controlled through an interface and WI-FI that exposes them to a number of risks. The ...
The post European home automation market to reach $806.1 million by 2022, report says appeared first on Bitdefender.
by Filip TRUTA, from IoT Security Insights , on 20.10.2017
In a bid to “promote good security practices, and understand vulnerability risk,” the Carnegie-Mellon University's Software Engineering Institute has conducted a study to look at the potential threats posed by autonomous transport systems, machine learning and smart devices in general. Their forecast is not good. The Emerging Technology Domains Risk Survey is at its third ...
The post Fully autonomous smart tech can kill us, researchers warn appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 19.10.2017
A data leak exposed more than 30 million unique personal records of South Africans following an alleged breach that took place around May 2017, according to an investigation by security researcher Troy Hunt. Hunt received a 27GB file that, he believes, “is definitely floating around between traders.” Based on the headers published on Pastebin, the [and#8230;] read more
by Razvan Muresan, from Business Insights , on 19.10.2017
It seems as though CISOs and CSOs are constantly battling with challenges, whether it’s newly discovered threats and vulnerabilities, growing demand for cyber security skills and not enough qualified people to deliver them, complaints from business users about disruptive security tools, or some other issue, read more
by Filip TRUTA, from HotForSecurity , on 18.10.2017
Earlier this week, a researcher from the University of Leuven discovered a critical flaw in the WPA2 wireless communication standard that leaves all Wi-Fi-connected devices vulnerable to attacks. Now, we will lay out simple steps users can take to mitigate risk until the Wi-Fi Alliance comes up with a fix. As we wrote yesterday, researcher [and#8230;] read more
by Liviu ARSENE, from HotForSecurity , on 18.10.2017
With more than 2 billion active Android devices in the world, Google’s mobile OS is easily one of the most popular. With users actively using their mobile devices in all aspects of their personal lives and business activities, a lot of information is stored and managed by these Android devices. Consequently, cybercriminals have shifted their [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 18.10.2017
Of the many methods hackers can use, they will go with the simplest ones when they can. They won’t bother with complicated hacks into systems or web infrastructures when insufficient code checks and misdirection allow them to run malicious scripts. Cross-site scripting, or XSS, is a web-based vulnerability that an attacker can use to add ...
The post Code Injection Attack Can Steal Your Web Life appeared first on Bitdefender.