Wearables Push the Boundaries of Tech for Consumers

Wearables Push the Boundaries of Tech for Consumers

by Ionut ILASCU, from IoT Security Insights , on 19.01.2018

Some may argue that wearables were sparse at this year’s Consumer Electronics Show in Las Vegas and#8212; those gadgets that take an undaunted approach to improving our overall comfort. Some of them are already on the market, while others need further refinement before becoming ready for consumers. Smartwatches as we know them continued to evolve ... The post Wearables Push the Boundaries of Tech for Consumers appeared first on Bitdefender. read more

Bug bounty program offers $100 million for ‘ethical hackers’ to earn by 2020

Bug bounty program offers $100 million for ‘ethical hackers’ to earn by 2020

by Filip TRUTA, from HotForSecurity , on 18.01.2018

HackerOne has put $100 million up for grabs in bug bounty rewards for “ethical hackers” over the next two years, the bug bounty platform said in a press release announcing the results of its 2018 Hacker Report. Many other programs are also available, making ethical hacking a lucrative business for some. Ethical hacking, formally described [and#8230;] read more

Twitter accused of breaking privacy claims by conservative media group

Twitter accused of breaking privacy claims by conservative media group

by Luana PASCU, from HotForSecurity , on 18.01.2018

Social media giant Twitter is in the midst of a scandal following accusations of breaking privacy claims. Pro-Trump group Project Veritas released three videos in which Clay Haynes,  a senior engineer at Twitter, is recorded without his consent in a bar making various statements about the company’s policy on disclosing sensitive tweets and DMs. Speaking [and#8230;] read more

Any organization could be the target of a data breach in 2018, digital identity experts say

Any organization could be the target of a data breach in 2018, digital identity experts say

by Filip Truta, from Business Insights , on 17.01.2018

Fraudsters have moved from making a fast buck to crafting more ambitious, targeted attacks that produce long-term profits, according to an extensive analysis of real-world cybercrime attacks. read more

Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

by Luana PASCU, from HotForSecurity , on 17.01.2018

If you download content through the popular Transmission BitTorrent client, take a closer look at its security settings: a critical vulnerability has been detected by Google’s Project Zero reporting team. According to the report published Tuesday, the flaw lets hackers execute malicious code and gain remote control of user PCs through their web browsers. 40 [and#8230;] read more

Data protection is a prime concern for Italian IT execs that embrace data center modernization

Data protection is a prime concern for Italian IT execs that embrace data center modernization

by Razvan Muresan, from Business Insights , on 17.01.2018

Italian IT decision makers perceive security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a primeconcern. read more

Hawaii’s missile alert agency keeps its password on a Post-it note

Hawaii’s missile alert agency keeps its password on a Post-it note

by Graham CLULEY, from HotForSecurity , on 17.01.2018

Last Saturday the people of Hawaii received a terrifying alert about a ballistic missile heading its way. Fortunately the alert was a false alarm, caused by a worker who was supposed to send an internal test, and accidentally chose the wrong menu item. It took a full 38 minutes for the Hawaii Emergency Management Agency [and#8230;] read more

Over $400,0000 worth of Stellar Lumen Cryptocurrency Stolen in BlackWallet DNS Hijack

Over $400,0000 worth of Stellar Lumen Cryptocurrency Stolen in BlackWallet DNS Hijack

by Liviu ARSENE, from HotForSecurity , on 16.01.2018

Following a recent hijack of BlackWallet’s DNS server, hackers have allegedly stolen almost 670,000 Lumens from users’ wallets, estimated to be worth around $400,000. BlackWallet.co is a web-based wallet application that lets users manage their Stellar Lumen Cryptocurrency (XLM). The DNS hijack allowed cybercriminals to redirect victims to an attacker-controlled server, from which they could [and#8230;] read more

Canadian behind leaked credentials website appears in court

Canadian behind leaked credentials website appears in court

by Luana PASCU, from HotForSecurity , on 16.01.2018

The Canadian arrested for running leaked credentials site and allegedly selling billions of passwords from major data breaches appeared in his first court hearing on Monday. The man is accused of trafficking in identity information, unauthorized use of computer (s. 342.1 of the Criminal Code), mischief to data and possession of property obtained by crime, [and#8230;] read more

Human error identified as the #1 reason behind most cyberattacks

Human error identified as the #1 reason behind most cyberattacks

by Filip Truta, from Business Insights , on 16.01.2018

A survey of 612 Chief Information Security Officers suggests CISOs have a tough road ahead in an ongoing climate of high-profile data breaches. read more

Next >>