Super Hub Routers Get Patch against Exploit Chain

Super Hub Routers Get Patch against Exploit Chain

by Ionut ILASCU, from IoT Security Insights , on 15.06.2017

The firmware for routers from one of the largest Internet Service Providers (ISPs) in the UK has been updated automatically for all online terminals to address a set of security oversights that, when combined, could lead to complete compromise of the device. Some of the issues have long been highlighted by the infosec community as ... The post Super Hub Routers Get Patch against Exploit Chain appeared first on Bitdefender. read more

US lawmakers seek expert advice on dangers of IoT, smartphones

US lawmakers seek expert advice on dangers of IoT, smartphones

by Filip TRUTA, from IoT Security Insights , on 15.06.2017

US Congress met Tuesday to hear from a panel of cyber security experts about the dangers posed by the spread of Internet of Things (IoT) devices and smartphones. Lawmakers expressed deep concern about cyber threats targeting mobile devices, The Hill reports, including the expanding attack surface generated by the ecosystem of Internet-connected devices and#8211; the ... The post US lawmakers seek expert advice on dangers of IoT, smartphones appeared first on Bitdefender. read more

Ransomware targets US SMBs due to weaker protection and greater willingness to pay up

Ransomware targets US SMBs due to weaker protection and greater willingness to pay up

by Razvan Muresan, from Business Insights , on 15.06.2017

Attackers are now targeting small and medium businesses to extort higher fees, a Bitdefender survey shows, meeting the company’s predictions for 2017. read more

Two-thirds of French CISOs say their companies could ‘definitely’ be a target of cyberespionage

Two-thirds of French CISOs say their companies could ‘definitely’ be a target of cyberespionage

by Razvan Muresan, from Business Insights , on 14.06.2017

More than two-thirds (71 percent) of IT security decision makers in France say their companies could ‘definitely’ be a target of cyberespionage campaigns using advanced persistent threats (APTs), according to a recent survey by security firm Bitdefender. These complex cyber tools are crafted for high-profile entities and operate by silently gathering sensitive data over long periods. Another 27 percent of respondents say their IT infrastructure could ‘possibly’ be targeted in high-level cyberespionage actions that exfiltrate intelligence systematically. read more

Survey: sensitive data companies would never move in the cloud

Survey: sensitive data companies would never move in the cloud

by Razvan Muresan, from Business Insights , on 13.06.2017

Companies care most about information related to clients (i.e. credit cards, demographics, contracts) and employees (i.e. income, salary, service fees, contact information, stakeholders), research data about new products and competition, and financial information, as shown in aBitdefender survey of more than 500 IT decision makers. read more

Zyxel, Huawei Issue Security Notice for Vulnerable WiMAX Routers

Zyxel, Huawei Issue Security Notice for Vulnerable WiMAX Routers

by Ionut ILASCU, from IoT Security Insights , on 13.06.2017

The firmware in WiMAX router models from multiple vendors includes a security flaw that allows a remote, unauthenticated attacker to change the login password and take full control of the network gateway. Zyxel and Huawei have confirmed the vulnerability in several products and offer suggestions to mitigate the risks. WiMAX (Worldwide Interoperability for Microwave Access) ... The post Zyxel, Huawei Issue Security Notice for Vulnerable WiMAX Routers appeared first on Bitdefender. read more

Everything you say can be used against you

Everything you say can be used against you

by Bitdefender Team, from IoT Security Insights , on 12.06.2017

Future generations of smart speakers will have better capabilities, such as the ability to distinguish between the voices of various family members. But putting a microphone in every home may have unwanted consequences. Since not all smart speakers are made equal, vendors might not have an upfront privacy policy of disclosing what data they collect ... The post Everything you say can be used against you appeared first on Bitdefender. read more

How hard is it to protect driverless cars from hackers?

How hard is it to protect driverless cars from hackers?

by Luana PASCU, from IoT Security Insights , on 12.06.2017

With connected devices forecast to grow to 8.4 billion this year, with expected spending of over $2 trillion, how hard is it to actually secure the internet of things? And why don't manufacturers focus more on delivering top-notch security for their products with longer shelf life? Two years ago, security researchers Charlie Miller and Chris ... The post How hard is it to protect driverless cars from hackers? appeared first on Bitdefender. read more

Top reasons why most companies choose a mix of cloud services and privately owned data centers

Top reasons why most companies choose a mix of cloud services and privately owned data centers

by Razvan Muresan, from Business Insights , on 12.06.2017

Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment. Mostcompanies choose to virtualize more hardware by substituting it with less expensive and more versatile software, as shown in a Bitdefender survey of more than 500 IT decision makers. US IT decision makers say hybrid environments allow more flexibility and room for expansion, while they also increase productivity and security. read more

<< Prev Next >>