How to protect yourself from the ‘KRACK’ Wi-Fi attack

How to protect yourself from the ‘KRACK’ Wi-Fi attack

by Filip TRUTA, from HotForSecurity , on 18.10.2017

Earlier this week, a researcher from the University of Leuven discovered a critical flaw in the WPA2 wireless communication standard that leaves all Wi-Fi-connected devices vulnerable to attacks. Now, we will lay out simple steps users can take to mitigate risk until the Wi-Fi Alliance comes up with a fix. As we wrote yesterday, researcher [and#8230;] read more

The ABC of Cybersecurity – Android Threats: S is for Spyware

The ABC of Cybersecurity – Android Threats: S is for Spyware

by Liviu ARSENE, from HotForSecurity , on 18.10.2017

With more than 2 billion active Android devices in the world, Google’s mobile OS is easily one of the most popular. With users actively using their mobile devices in all aspects of their personal lives and business activities, a lot of information is stored and managed by these Android devices. Consequently, cybercriminals have shifted their [and#8230;] read more

Code Injection Attack Can Steal Your Web Life

Code Injection Attack Can Steal Your Web Life

by Ionut ILASCU, from IoT Security Insights , on 18.10.2017

Of the many methods hackers can use, they will go with the simplest ones when they can. They won’t bother with complicated hacks into systems or web infrastructures when insufficient code checks and misdirection allow them to run malicious scripts. Cross-site scripting, or XSS, is a web-based vulnerability that an attacker can use to add ... The post Code Injection Attack Can Steal Your Web Life appeared first on Bitdefender. read more

Hackers Can Wreak Havoc with Code Execution Flaws

Hackers Can Wreak Havoc with Code Execution Flaws

by Ionut ILASCU, from IoT Security Insights , on 18.10.2017

When a hacker’s mission is to take control of the target system, the success of the task usually depends on the ability to run programs and scripts of the attacker’s choice. Achieving this by leveraging a vulnerability is commonly known in the security industry as arbitrary code execution, and it is one of the most ... The post Hackers Can Wreak Havoc with Code Execution Flaws appeared first on Bitdefender. read more

Businesses using GDPR as catalyst to enhance cyber risk management

Businesses using GDPR as catalyst to enhance cyber risk management

by Filip Truta, from Business Insights , on 17.10.2017

A survey of 1,300 senior executives at companies doing business in the EU reveals that the most-prepared firms are using the General Data Protection Regulation (GDPR) as a catalyst to up their game in cyber risk management. read more

WPA2 bug leaves virtually all WiFi networks at risk of hacking, research shows

WPA2 bug leaves virtually all WiFi networks at risk of hacking, research shows

by Filip TRUTA, from HotForSecurity , on 16.10.2017

A Belgian researcher has discovered disconcerting weaknesses in the 14-year-old WPA2 protocol and#38; security certification program devised by the Wi-Fi Alliance to secure all modern protected wireless computer networks. “An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs),” Mathy Vanhoef of KU Leuven University writes on a website [and#8230;] read more

Drone hits plane over Canada; operator could face prison time (if caught)

Drone hits plane over Canada; operator could face prison time (if caught)

by Filip TRUTA, from IoT Security Insights , on 16.10.2017

Canada’s Minister of Transport on Sunday released a worrying statement about a drone incident in Quebec City. A commercial plane was struck by a drone while landing in Jean Lesage International Airport in the first such incident for Canada. The rising popularity of drones has revolutionized inspection and#38; monitoring, mapping, surveillance, precision agriculture, art and, ... The post Drone hits plane over Canada; operator could face prison time (if caught) appeared first on Bitdefender. read more

Pizza Hut waits two weeks to tell customers their card data was leaked

Pizza Hut waits two weeks to tell customers their card data was leaked

by Luana PASCU, from HotForSecurity , on 16.10.2017

Restaurant chain Pizza Hut was breached and waited two weeks before announcing its customers via email that it suffered a “temporary security intrusion.” Even before the announcement, users had reported on Twitter numerous fraudulent transactions from their accounts, suspecting a breach. A hacker is reported to have stolen names, billing ZIP codes, delivery addresses, email [and#8230;] read more

Kremlin uses social media, Pokemon Go to stir up racial tension in US

Kremlin uses social media, Pokemon Go to stir up racial tension in US

by Luana PASCU, from HotForSecurity , on 16.10.2017

Russian agents linked to the country’s Internet Research Agency infiltrated social media channels and popular artificial intelligence game Pokemon Go to meddle in US politics and incite racial conflicts by creating fake campaigns and profiles associated with the Black Lives Matter movement, according to a CNN investigation. The campaign, called Don’t Shoot Us, was actively [and#8230;] read more

Today's Predictions for Tomorrow's Internet

Today's Predictions for Tomorrow's Internet

by Business Insights , on 16.10.2017

In observance of National Cyber Security Awareness Month, Bitdefender offers a series of articles on hot topics such as best practices in online safety and protecting your company’s assets and integrity. We also suggest prerequisites to consider before seeking a career in cybersecurity. We encourage you to bookmark this blog or connect with Bitdefender on LinkedIn or Twitter to receive follow-on articles (filled with security tips) as they are published. read more

Next >>