by Luana PASCU, from IoT Security Insights , on 20.04.2018
Securing medical devices is a top priority after countless vulnerabilities have been detected in connected medical devices and hospital infrastructures. Not only are hospital networks exposed to remote hacker attacks and security breaches, but they also struggle with insider threats and major errors in healthcare equipment. The number of security incidents could be significantly reduced ...
The post Cybersecurity of smart medical devices, hospital networks is top priority for the FDA appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 20.04.2018
LinkedIn joins the data privacy breach club after a researcher detected a major vulnerability in the AutoFill plugin – that allows members to autofill their information in forms on other websites. The bug was detected by researcher Jack Cable who also released a proof-of-concept to explain how the vulnerability could be exploited through a cross-site [and#8230;] read more
by Business Insights , on 20.04.2018
It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I know there’s a difference between machine language and AI, but so many use the terms interchangeably now that the difference is blurring in the minds of many. read more
by Filip TRUTA, from HotForSecurity , on 19.04.2018
Networking behemoth Cisco has issued critical patches found in two of its widely used software products as prone to remote hacking. Users of WebEx and Unified Computing System (UCS) Director are urged to patch their software as soon as possible. Advisory CVE-2018-0112 states that Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx [and#8230;] read more
by Luana PASCU, from IoT Security Insights , on 19.04.2018
It feels like kids are stuck in a tech limbo. Everywhere you look, they are on their smartphones, laptops or tablets, completely engaged in a world that might seem complicated to their parents. Kids as young as 12 years old are familiar with smart devices and extremely active on social media, unaware of dangers such ...
The post How parents can help kids deal with cyberbullying appeared first on Bitdefender.
by Filip Truta, from Business Insights , on 19.04.2018
Less than two months before the European Union enforces its stringent General Data Protection Regulation (GDPR), businesses are rushing to achieve compliance, procedurally and technologically. read more
by Graham CLULEY, from HotForSecurity , on 19.04.2018
Chances are that youand#8217;ve never heard of Washington-based data firm LocalBlox. But that doesnand#8217;t mean that they havenand#8217;t heard of you. And it doesnand#8217;t mean that your personal information hasnand#8217;t been recklessly exposed through their sloppy disregard for the most basic security. As Zack Whittaker of ZDNet reports, Localblox scooped up information from the personal [and#8230;] read more
by Luana PASCU, from HotForSecurity , on 19.04.2018
A former employee of Alaskan regional airline PenAir has pleaded guilty to felony fraud associated with hacking attacks against the company’s ticketing and reservation system in the spring of 2017, announced the US Department of Justice. Suzette Kugler, 59, was sentenced to five years of probation and 250 hours of community service. After working for [and#8230;] read more
by Luana PASCU, from HotForSecurity , on 18.04.2018
Some 120 closed cybercrime and scam groups were identified on Facebook by security journalist Brian Krebs in just two hours of research on April 12. Although Facebook deleted them hours after they were reported, research would likely turn up more groups, as few even bother to hide their schemes and most promote them openly. “We [and#8230;] read more
by Filip Truta, from Business Insights , on 18.04.2018
Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 67 organizations. read more